Passive Techniques of Digital Image Forgery Detection: Developments and Challenges

Photographs and images play an important role in our lives but, in this technology era, equipped with powerful, low cost, and easy to use photo editing tools, people often forge photographs. This practice has posed a question mark on the trustworthiness o

  • PDF / 285,725 Bytes
  • 10 Pages / 439.37 x 666.142 pts Page_size
  • 17 Downloads / 208 Views

DOWNLOAD

REPORT


Abstract Photographs and images play an important role in our lives but, in this technology era, equipped with powerful, low cost, and easy to use photo editing tools, people often forge photographs. This practice has posed a question mark on the trustworthiness of images necessitating separation of original images from the tampered lot. Because carefully edited and forged images are very hard to be distinguished from their genuine copies therefore, forgery detection and separation of the forged images from the innocent and genuine ones has become a challenging issue for image analysts. Image forgery detection procedures are generally classified into two broad categories; the active and the passive detection techniques. This paper presents a state of the art review of different passive forgery detection techniques those are proposed by different authors over time. Keywords Copy–move forgery

 Cloning  Splicing  Watermark

1 Introduction Today, photo editing has become a common practice with the availability of free and easy to use image editing tools. Though, all edited images do not fall into forged category, some of those do. When forged images are available in huge numbers, it becomes very much important to detect and classify the genuine and the forged ones. Image forgery detection and classification can be done using active and/ or the passive detection methods. The active methods, also known as image authentication techniques, are generally based on digital signatures or watermarks. In these techniques, for verification of authenticity of an image, a watermark or a S. Panda  M. Mishra (&) P. G. Department of Information & Communication Technology, Fakir Mohan University, Balasore, Odisha, India e-mail: [email protected] S. Panda e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2018 A. Kalam et al. (eds.), Advances in Electronics, Communication and Computing, Lecture Notes in Electrical Engineering 443, https://doi.org/10.1007/978-981-10-4765-7_29

281

282

S. Panda and M. Mishra

digital signature is embedded into an image at the time of capture or immediately after the image is captured. This is the major drawback of the active authentication technique first, because it is not possible to embed watermarks/signatures to every captured image and second, the degradation in image quality that will be caused due to this embedding may not be acceptable by the users [1]. Passive forgery detection is an alternative to active authentication which requires no active information for the purpose of authentication. These techniques detect forgery analyzing the image statistics in the absence of any watermark/digital signature as well as in the absence of the original image for comparison.

1.1

Image Manipulation Techniques

Though all image manipulation or image editing procedures do not fall into the image forgery category, it is certain that all forged images undergo some sort of manipulation. The corrective manipulation techniques or the image enhancement techniques such as contrast and b