Author : Jitesh Kumar Bhatia 1
Date of Publication :22nd February 2018
Abstract: In the today’s era, nearly all of us rely on the images of the memories of our lives and loved ones. The images are useful in proving anything in the court of law by showing them as an evidence of the event, getting insurance of a mishappening, getting appreciation, or for conveying personal lifestyle to their friends through social media. However, various Image editing tools like Adobe Photoshop, Picasa, and Lightroom, etc. can produce forged images, thus changing the perspective of the viewer about the event. Image Forgery has become much prominent nowadays and is being done either for fun or for an intention. Many researchers have worked in finding techniques that can classify the forged and authentic images. This objective of this paper is to provide a glimpse of work done so far in the field of Image Forgery detection.In the today’s era, nearly all of us rely on the images of the memories of our lives and loved ones. The images are useful in proving anything in the court of law by showing them as an evidence of the event, getting insurance of a mishappening, getting appreciation, or for conveying personal lifestyle to their friends through social media. However, various Image editing tools like Adobe Photoshop, Picasa, and Lightroom, etc. can produce forged images, thus changing the perspective of the viewer about the event. Image Forgery has become much prominent nowadays and is being done either for fun or for an intention. Many researchers have worked in finding techniques that can classify the forged and authentic images. This objective of this paper is to provide a glimpse of work done so far in the field of Image Forgery detection.
Reference :
-
- H. Farid, “Digital doctoring: how to tell the real from the fake,” Significance, vol. 3, no. 4, pp. 162–166, 2006.
- H. Farid, “Image forgery detection,” IEEE Signal processing magazine, vol. 26, no. 2, pp. 16–25, 2009.
- P. K. Atrey, W.-Q. Yan, and M. S. Kankanhalli, “A scalable signature scheme for video authentication,” Multimedia Tools and Applications, vol. 34, no. 1, pp. 107–135, 2007.
- Y.-F. Hsu and S.-F. Chang, “Detecting image splicing using geometry invariants and camera characteristics consistency,” in Multimedia and Expo, 2006 IEEE International Conference on, pp. 549–552, IEEE, 2006.
- D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, “Comofod - new database for copy-move forgery detection,” in ELMAR, 2013 55th international symposium, pp. 49–54, IEEE, 2013.
- A. C. Popescu and H. Farid, “Statistical Tools for Digital Forensics,” 6th International Workshop on Information Hiding, Toronto, pp. 128-147, 2004.