Abstract

In recent years, digital image forgery detection has become one of the hardest studying area for researchers investigations in the field of information security and image processing. Image forgery detection methods can be divided into two extensive groups such as Active methods and Passive (Blind) methods. Active methods have been used data hiding techniques like watermarking and digital signatures. Passive forensic methods (or Blind) use image statistics or they investigate the attributes of the image to determine the forgeries. Passive detection techniques are also split into three branches; image splicing, image retouching, copy-move. Such image forgery detection methods are focus of this paper.

Highlights

  • Widespread of the digital cameras and the image editing tools like Adobe Photoshop, Microsoft Paint that gives for people doctored images for the bad aims

  • Image Forgery Detection is a new studying area which goals confirm the authenticity of image by collected information their feature

  • A brief survey of the image forgery detection(IFD) methods will be help the researcher in this studying area

Read more

Summary

Introduction

Widespread of the digital cameras and the image editing tools like Adobe Photoshop, Microsoft Paint that gives for people doctored images for the bad aims. Increasing in image forensics has given boosting to special techniques for the detection of changing image. Image Forgery Detection is a new studying area which goals confirm the authenticity of image by collected information their feature. Digital image forgery methods can be classified two main categories. Active methods must be have preembedded information, such as digital watermarking and steganography. Digital watermarking is a method embedding secret information in the data, can be divided two categories, visible and invisible [1]. Copy-move forgery detection methods are following three groups. Block based techniques use like this algorithms; DCT(Discrete Cosine Transform)[7], PCA(Principle Component Analysis) [8], SVD(Singular Value Decomposition)[8], DWT (Discrete Wavelet Transform)[10]. Keypoint based techniques use like this algorithms; SIFT(Scale Invariant feature transform), SURF(Speeded-up Robust features).

Basic Steps of the Methods
Comparison of the Related Work
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call