Skip to main content

Image Forgery Detection

  • Chapter
  • First Online:
Introductory Computer Forensics
  • 167k Accesses

Abstract

The objectives of this chapter are to:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.bbc.com/news/blogs-trending-31970420

  2. https://www.cnn.com/2014/09/19/us/california-lawyer-suspension-fake-celebrity-photos/index.html

  3. H. Farid. Digital Image Forensics, http://www.cs.dartmouth.edu/farid/downloads/tutorials/digitalimageforensics.pdf

  4. J. Redi, W. Taktak, J.-L. Dugelay. Digital Image Forensics: a booklet for beginners Multimedia Tools and Applications, vol. 51, pp. 133–162, October 2011

    Article  Google Scholar 

  5. Gajanan K. Birajdar, Vijay H. Mankar,Digital image forgery detection using passive techniques: A survey, Digital Investigation, 2013, vol. 10, pp. 226–245.

    Article  Google Scholar 

  6. C. I. Podilchuk and E. J. Delp, Digital watermarking: Algorithms and applications, IEEE Signal Processing Magazine, 2001, pp. 33–46.

    Article  Google Scholar 

  7. C. Paar and J. Pelzl, Understanding Cryptography—A Textbook for Students and Practitioners. Berlin, Germany: Springer-Verlag, 2010.

    Book  Google Scholar 

  8. X. Hou, J. Harel, and C. Koch, Image Signature: Highlighting Sparse Salient Regions, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 1, 2012.

    Google Scholar 

  9. N. Warif, A. Wahab, M. Idris, R. Ramli, R. Salleh, S. Shamshirband, K.-K. Choo, Copy-move forgery detection: Survey, challenges and future directions, Journal of Network and Computer Applications, vol. 75, pp. 259–278, 2016.

    Article  Google Scholar 

  10. W. Luo, Z. Qu, F. Pan, J. Huang. A survey of passive technology for digital image forensics. Frontiers of Computer Science in China, vol. 1, no. 2, pp. 166-179, 2007.

    Article  Google Scholar 

  11. M.K. Johnson and H. Farid. Exposing Digital Forgeries Through Chromatic Aberration. ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006

    Google Scholar 

  12. A. Popescu, H. Farid, Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Process 2005, vol. 53, no. 2, pp. 758–67.

    Article  MathSciNet  Google Scholar 

  13. C. Song, X. Lin. Natural Image Splicing Detection Based on Defocus Blur at Edges. Proc. IEEE/CIC International Conference on Communications in China (ICCC), Shanghai, China, 2014.

    Google Scholar 

  14. L. B. Lucy. An iterative technique for the rectification of observed distributions. The astronomical journal, vol. 79, no. 6, pp. 745–754, 1974

    Google Scholar 

  15. N. Wiener. Extrapolation, interpolation, and smoothing of stationary time series, vol 2. Cambridge, MA: MIT press, 1949

    Google Scholar 

  16. R. Fergus, B. Singh, A. Hertzmann, S. Roweis, W. Freeman. Removing camera shake from a single photograph. In: Proceedings of ACM SIGGRAPH, pp 787–794, 2006

    Google Scholar 

  17. T. Kenig, Z. Kam, A. Feuer. Blind image deconvolution using machine learning for three-dimensional microscopy. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 12. pp. 2191–2204, 2010

    Article  Google Scholar 

  18. Anat Levin, Yair Weiss, Frédo Durand, William T. Freeman: Understanding Blind Deconvolution Algorithms. IEEE Trans. Pattern Anal. Mach. Intell. vol. 33, no. 12, pp. 2354-2367, 2011

    Article  Google Scholar 

  19. E. Kee, M.K. Johnson, and H. Farid. Digital image authentication from JPEG headers. IEEE Transactions on Information Forensics and Security, 2011, vol. 6, no. 3, pp. 1066-1075.

    Article  Google Scholar 

  20. H. Farid, A survey of image forgery detection, IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 16–25, 2009.

    Article  Google Scholar 

  21. W. Luo, Z. Qu, J. Huang, and G. Qiu, A novel method for detecting cropped and recompressed image block, IEEE Conference on Acoustics, Speech and Signal Processing, Honolulu, HI, 2007, pp. 217–220.

    Google Scholar 

  22. S. Ye, Q. Sun, and E. C. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, IEEE International Conference on Multimedia and Expo, Beijing, China, 2007, pp. 12–15.

    Google Scholar 

  23. Y. Huang, W. Lu, W. Sun, D. Long. Improved DCT-based detection of copy-move forgery in images. Forensic Science International, vol. 206, no. 1-3, pp. 178–184, 2011

    Article  Google Scholar 

  24. J. Fridrich, D. Soukalm, J. Luka, Detection of Copy-Move Forgery in Digital Images, Proc. of DFRWS 2003, Cleveland, OH, USA, August 5-8 2003

    Google Scholar 

  25. http://jaco-watermark.sourceforge.net/

  26. D. Tralic, I. Zupancic, S. Grgic, M. Grgic, "CoMoFoD - New Database for Copy-Move Forgery Detection", in Proc. 55th International Symposium ELMAR-2013, pp. 49-54, September 2013

    Google Scholar 

  27. CoMoFoD - Image Database for Copy-Move Forgery Detection. http://www.vcl.fer.hr/comofod/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lin, X. (2018). Image Forgery Detection. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00581-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00580-1

  • Online ISBN: 978-3-030-00581-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics