Table of Contents
ISRN Signal Processing
Volume 2013, Article ID 496701, 22 pages
http://dx.doi.org/10.1155/2013/496701
Review Article

An Overview on Image Forensics

Department of Electronics and Telecommunications, University of Florence, Via S. Marta 3, 50139 Firenze, Italy

Received 6 November 2012; Accepted 26 November 2012

Academic Editors: L. Fan and S. Kwong

Copyright © 2013 Alessandro Piva. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. W. Meyer, H. E. Rushmeier, M. F. Cohen, D. P. Greenberg, and K. E. Torrance, “An experimental evaluation of computer graphics imagery,” ACM Transactions on Graphics, vol. 5, no. 1, pp. 30–50, 1986. View at Google Scholar
  2. “Fake or foto,” 2012, http://area.autodesk.com/fakeorfoto.
  3. H. Farid, “Digital doctoring: how to tell the real from the fake,” Significance, vol. 3, no. 4, pp. 162–166, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Zhu, M. Swanson, and A. Tewfik, “When seeing isn't believing [multimedia authentication technologies],” IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 40–49, 2004. View at Google Scholar
  5. “Photo tampering throughout history,” 2012, http://www.fourandsix.com/photo-tampering-history/.
  6. G. L. Friedman, “Trustworthy digital camera: restoring credibility to the photographic image,” IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905–910, 1993. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Blythe and J. Fridrich, “Secure digital camera,” in Proceedings of the Digital Forensic Research Workshop (DFRWS '04), pp. 17–19, 2004.
  8. I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, 2001.
  9. M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Signal Processing and Communications, Marcel Dekker, 2004.
  10. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Water—Marking and Steganography, Morgan Kaufmann, San Francisco, Calif, USA, 2nd edition, 2008.
  11. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Scopus
  12. A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla, USA, 1st edition, 1996.
  13. H. Farid, “Image forgery detection,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16–25, 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Van Lanh, K. S. Chong, S. Emmanuel, and M. S. Kankanhalli, “A survey on digital camera image forensic methods,” in Proceedings of the IEEE International Conference onMultimedia and Expo (ICME '07), pp. 16–19, July 2007. View at Scopus
  15. B. Mahdian and S. Saic, “A bibliography on blind methods for identifying image forgery,” Signal Processing: Image Communication, vol. 25, no. 6, pp. 389–399, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. M. K. Johnson and H. Farid, “Exposing digital forgeries through chromatic aberration,” in Proceedings of the 8th workshop on Multimedia & Security, S. Voloshynovskiy, J. Dittmann, and J. J. Fridrich, Eds., pp. 48–55, ACM, Geneva, Switzerland, September 2006.
  17. L. T. Van, S. Emmanuel, and M. S. Kankanhalli, “Identifying source cell phone using chromatic aberration,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '07), pp. 883–886, Beijing, China, July 2007. View at Scopus
  18. K. S. Choi, E. Y. Lam, and K. K. Y. Wong, “Automatic source camera identification using the intrinsic lens radial distortion,” Optics Express, vol. 14, pp. 11551–11565, 2006. View at Google Scholar
  19. A. E. Dirik, H. T. Senear, and N. Memon, “Digital single lens reflex camera identification from traces of sensor dust,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 539–552, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. I. Yerushalmy and H. Hel-Or, “Digital image forgery detection based on lens and sensor aberration,” International Journal of Computer Vision, vol. 92, no. 1, pp. 71–91, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Janesick, Scientific Charge-Coupled Devices, Spie Press Monograph, SPIE Press, 2001.
  22. J. Fridrich, “Digital image forensic using sensor noise,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 26–37, 2009. View at Google Scholar
  23. M. Chen, J. Fridrich, M. Goljan, and J. Lukáš, “Determining image origin and integrity using sensor noise,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74–90, 2008. View at Publisher · View at Google Scholar · View at Scopus
  24. I. Amerini, R. Caldelli, V. Cappellini, F. Picchioni, and A. Piva, “Estimate of PRNU noise based on different noise models for source camera Identification,” International Journal of Digital Crime and Forensics, vol. 2, no. 2, pp. 21–33, 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. K. Rosenfeld and H. T. Sencar, “A study of the robustness of PRNU-based camera identification,” in Proceedings of the Media Forensics and Security I, part of the IS&T-SPIE Electronic Imaging Symposium, vol. 7254 of Proceedings of SPIE, San Jose, Calif, USA, January 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. C.-T. Li and Y. Li, “Digital camera identification using colourdecoupled photo response non-uniformity noise pattern,” in Proceedings of the International Symposium on Circuits and Systems (ISCAS '10), pp. 3052–3055, IEEE, Paris, France, May 2010.
  27. C.-T. Li and Y. Li, “Color-decoupled photo response non-uniformity for digital image forensics,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, pp. 260–271, 2012. View at Google Scholar
  28. B.-B. Liu, Y. Hu, and H.-K. Lee, “Source camera identification from significant noise residual regions,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 1749–1752, IEEE, Hong Kong, China, September 2010.
  29. C.-T. Li, “Source camera identification using enahnced sensor pattern noise,” in Proceedings of the IEEE International Conference on Image Processing (ICIP '09), pp. 1509–1512, IEEE, Cairo, Egypt, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. C.-T. Li, “Source camera identification using enhanced sensor pattern noise,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 280–287, 2010. View at Google Scholar
  31. T. Filler, J. Fridrich, and M. Goljan, “Using sensor pattern noise for camera model identification,” in Proceedings of the International Conference on Image Processing (ICIP '08), pp. 1296–1299, IEEE, San Diego, Calif, USA, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. M. Goljan, J. Fridrich, and T. Filler, “Managing a large database of camera fingerprints,” in Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010. View at Publisher · View at Google Scholar · View at Scopus
  33. A. C. Popescu and H. Farid, “Exposing digital forgeries in color filter array interpolated images,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3948–3959, 2005. View at Publisher · View at Google Scholar · View at Scopus
  34. A. C. Gallagher, “Detection of linear and cubic interpolation in JPEG compressed images,” in Proceedings of the Canadian Conference on Computer and Robot Vision, pp. 65–72, May 2005. View at Publisher · View at Google Scholar
  35. A. C. Gallagher and T. Chen, “Image authentication by detecting traces of demosaicing,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '08), pp. 1–8, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  36. A. E. Dirik and N. Memon, “Image tamper detection based on demosaicing artifacts,” in Proceedings of the International Conference on Image Processing (ICIP '09), pp. 1497–1500, IEEE, Cairo, Egypt, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  37. S. Bayram, H. T. Sencar, N. Memon, and I. Avcibas, “Source camera identification based on CFA interpolation,” in Proceedings of the IEEE International Conference on Image Processing 2005 ( ICIP '05), pp. 69–72, September 2005. View at Publisher · View at Google Scholar · View at Scopus
  38. A. Swaminathan, M. Wu, and K. J. R. Liu, “Nonintrusive component forensics of visual sensors using output images,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 91–105, 2007. View at Publisher · View at Google Scholar · View at Scopus
  39. A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101–117, 2008. View at Publisher · View at Google Scholar · View at Scopus
  40. S. Bayram, H. T. Sencar, and N. Memon, “Classification of digital camera-models based on demosaicing artifacts,” Digital Investigation, vol. 5, no. 1-2, pp. 49–59, 2008. View at Publisher · View at Google Scholar · View at Scopus
  41. C. McKay, A. Swaminathan, H. Gou, and M. Wu, “Image acquisition forensics: forensic analysis to identify imaging source,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '08), pp. 1657–1660, IEEE, Las Vegas, Nev, USA, March-April 2008. View at Publisher · View at Google Scholar · View at Scopus
  42. H. Cao and A. C. Kot, “Accurate detection of demosaicing regularity from output images,” in Proceedings of the International Symposium on Circuits and Systems (ISCAS '09), pp. 497–500, IEEE, 2009.
  43. H. Cao and A. C. Kot, “Accurate detection of demosaicing regularity for digital image forensics,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 899–910, 2009. View at Publisher · View at Google Scholar · View at Scopus
  44. N. Fan, C. Jin, and Y. Huang, “A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation,” in Proceedings of the 11th ACM Workshop on Multimedia Security (MM&Sec '09), pp. 125–129, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  45. M. Kirchner, “Efficient estimation of cfa pattern configuration in digital camera images,” in Proceedings of the Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010, 754111.
  46. P. Ferrara, T. Bianchi, A. de Rosa, and A. Piva, “Image forgery localization via fine-grained analysis of cfa artifacts,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1566–1577, 2012. View at Google Scholar
  47. S. Lin and L. Zhang, “Determining the radiometric response function from a single grayscale image,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '05), vol. 2, pp. 66–73, June 2005.
  48. T. T. Ng, S. F. Chang, and M. P. Tsui, “Using geometry invariants for camera response function estimation,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '07), pp. 1–8, Minneapolis, Minn, USA, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  49. T.-T. Ng, S.-F. Chang, J. Hsu, L. Xie, and M.-P. Tsui, “Physics-motivated features for distinguishing photographic images and computer graphics,” in Proceedings of the 13th Annual ACM International Conference on Multimedia, H. Zhang, T.-S. Chua, R. Steinmetz, M. S. Kankanhalli, and L. Wilcox, Eds., pp. 239–248, ACM, 2005.
  50. Y. F. Hsu and S. F. Chang, “Camera response functions for image forensics: an automatic algorithm for splicing detection,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 816–825, 2010. View at Publisher · View at Google Scholar · View at Scopus
  51. H. Cao and A. C. Kot, “Identification of recaptured photographs on lcd screens,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1790–1793, IEEE, Dallas, Tex, USA, March 2010.
  52. H. Yu, T.-T. Ng, and Q. Sun, “Recaptured photo detection using specularity distribution,” in Proceedings of the International Conference on Image Processing (ICIP '08), pp. 3140–3143, IEEE, San Diego, Calif, USA, October 2008.
  53. X. Gao, T.-T. Ng, B. Qiu, and S. F. Chang, “Single-view recaptured image detection based on physics-based features,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '10), pp. 1469–1474, IEEE, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  54. M. Goljan, J. Fridrich, and J. Lukáš, “Camera identification from printed images,” in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, E. J. Delp III, P. W. Wong, J. Dittmann, and N. D. Memon, Eds., vol. 6819 of Proceedings SPIE, San Jose, Calif, USA, January 2008.
  55. X. Gao, B. Qiu, J. Shen, T. T. Ng, and Y. Q. Shi, “A smart phone image database for single image recapture detection,” in Proceedings of the 9th International Workshop on Digital Watermarking (IWDW '10), H.-J. Kim, Y. Q. Shi, and M. Barni, Eds., vol. 6526 of Lecture Notes in Computer Science, Springer, Seoul, Korea, October 2010.
  56. H. Gou, A. Swaminathan, and M. Wu, “Intrinsic sensor noise features for forensic analysis on scanners and scanned images,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 476–491, 2009. View at Publisher · View at Google Scholar · View at Scopus
  57. C.-H. Choi, M.-J. Lee, and H.-K. Lee, “Scanner identification using spectral noise in the frequency domain,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 2121–2124, IEEE, Hong Kong, China, September 2010.
  58. N. Khanna and E. J. Delp, “Intrinsic signatures for scanned documents forensics: effect of font shape and size,” in Proceedings of the International Symposium on Circuits and Systems (ISCAS '10), pp. 3060–3063, IEEE, Paris, France, May-June 2010. View at Publisher · View at Google Scholar · View at Scopus
  59. A. E. Dirik, H. T. Sencar, and N. Memon, “Flatbed scanner identification based on dust and scratches over scanner platen,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 1385–1388, IEEE, Taipei, Taiwan, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  60. S. Dehnie, T. Sencar, and N. Memon, “Digital image forensics for identifying computer generated and digital camera images,” in Proceedings of the IEEE International Conference on Image Processing I(CIP '06), pp. 2313–2316, IEEE, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  61. W. Li, T. Zhang, E. Zheng, and X. Ping, “Identifying photorealistic computer graphics using second-order difference statistics,” in Proceedings of the International Conference on Fuzzy Systems and Knowledge Discovery (FSKD '10), M. Li, Q. Liang, L. Wang, and Y. Song, Eds., pp. 2316–2319, IEEE, 2010.
  62. A. E. Dirik, S. Bayram, H. T. Sencar, and N. D. Memon, “New features to identify computer generated images,” in Proceedings of the IEEE International Conference on Image Processing (ICIP '07), vol. 4, pp. 433–436, IEEE, 2007.
  63. F. Pan and J. Huang, “Discriminating computer graphics images and natural images using hidden markov tree model,” in Proceedings of the 9th International Workshop on Digital Watermarking (IWDW '10), H.-J. Kim, Y. Q. Shi, and M. Barni, Eds., vol. 6526 of Lecture Notes in Computer Science, pp. 23–28, Springer, Seoul, Korea, October 2010.
  64. G. K. Wallace, “The JPEG still picture compression standard,” IEEE Transactions on Consumer Electronics, vol. 38, no. 1, 1992. View at Publisher · View at Google Scholar · View at Scopus
  65. Z. Fan and R. de Queiroz, “Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history,” in Proceedings of the International Conference on Image Processing (ICIP '00), pp. 948–951, September 2000. View at Scopus
  66. Z. Fan and R. L. de Queiroz, “Identification of bitmap compression history: JPEG detection and quantizer estimation,” IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 230–235, 2003. View at Publisher · View at Google Scholar · View at Scopus
  67. Z. Wang, A. C. Bovik, and B. L. Evans, “Blind measurement of blocking artifacts in images,” in Proceedings of the International Conference on Image Processing (ICIP '00), vol. 3, pp. 981–984, 2000.
  68. H. Liu and I. Heynderickx, “A no-reference perceptual blockiness metric,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '08), pp. 865–868, March- April 2008. View at Publisher · View at Google Scholar · View at Scopus
  69. S. Tjoa, W. S. Lin, H. V. Zhao, and K. J. R. Liu, “Block size forensic analysis in digital images,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '07), pp. I633–I636, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  70. W. Luo, J. Huang, and G. Qiu, “JPEG error analysis and its applications to digital image forensics,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 480–491, 2010. View at Publisher · View at Google Scholar · View at Scopus
  71. W. S. Lin, S. K. Tjoa, H. V. Zhao, and K. J. R. Liu, “Digital image source coder forensics via intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 460–475, 2009. View at Publisher · View at Google Scholar · View at Scopus
  72. S. Ye, Q. Sun, and E. C. Chang, “Detecting digital image forgeries by measuring inconsistencies of blocking artifact,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '07), pp. 12–15, IEEE, Beijing, China, July 2007. View at Scopus
  73. R. Neelamani, R. de Queiroz, Z. Fan, S. Dash, and R. G. Baraniuk, “JPEG compression history estimation for color images,” IEEE Transactions on Image Processing, vol. 15, no. 6, pp. 1365–1378, 2006. View at Publisher · View at Google Scholar · View at Scopus
  74. F. Benford, “The law of anomalous numbers,” Proceedings of the American Philosophical Society, vol. 78, no. 4, pp. 551–572, 1938. View at Google Scholar
  75. D. Fu, Y. Q. Shi, and W. Su, “A generalized Benford's law for JPEG coefficients and its applications in image forensics,” in Proceedings of the 9th Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol. 6505 of Proceedings SPIE, pp. 1–11, San Jose, Calif, USA, January 2007.
  76. B. Li, Y. Q. Shi, and J. Huang, “Detecting doubly compressed JPEG images by using mode based first digit features,” in Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing (MMSP '08), pp. 730–735, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  77. X. Feng and G. Doërr, “JPEG recompression detection,” in Media Forensics and Security II, vol. 7541 of Proceedings of the SPIE, January 2010, 75410J.
  78. T. Pevný and J. Fridrich, “Detection of double-compression for applications in steganography,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 247–258, 2008. View at Google Scholar
  79. J. Lukáš and J. Fridrich, “Estimation of primary quantization matrix in double compressed JPEG images,” in Proceedings of the Digital Forensics Research Conference (DFRWS '03), 2003.
  80. A. C. Popescu and H. Farid, “Statistical tools for digital forensics,” in Proceedings of the 6th International Workshop on Information Hiding, pp. 128–147, Springer, Berlin, Germany, 2004.
  81. J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images via DCT coefficient analysis,” Lecture Notes in Computer Science, vol. 3953, pp. 423–435, 2006. View at Google Scholar · View at Scopus
  82. T. Pevny and J. Fridrich, “Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images,” in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819 of Proceedings of SPIE, January 2008, 681911. View at Publisher · View at Google Scholar
  83. Z. Lin, J. He, X. Tang, and C. K. Tang, “Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis,” Pattern Recognition, vol. 42, no. 11, pp. 2492–2501, 2009. View at Publisher · View at Google Scholar · View at Scopus
  84. T. Bianchi, A. D. Rosa, and A. Piva, “Improved DCT coefficient analysis for forgery localization in JPEG images,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '11), pp. 2444–2447, May 2011.
  85. H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 154–160, 2009. View at Publisher · View at Google Scholar · View at Scopus
  86. W. Luo, Z. Qu, J. Huang, and G. Qiu, “A novel method for detecting cropped and recompressed image block,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '07), vol. 2, pp. 217–220, April 2007.
  87. M. Barni, A. Costanzo, and L. Sabatini, “Identification of cut & paste tampering by means of double-JPEG detection and image segmentation,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '10), pp. 1687–1690, IEEE, Paris, France, May-June 2010. View at Publisher · View at Google Scholar · View at Scopus
  88. Y. L. Chen and C. T. Hsu, “Image tampering detection by blocking periodicity analysis in JPEG compressed images,” in Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing (MMSP '08), pp. 803–808, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  89. Z. Qu, W. Luo, and J. Huang, “A convolutive mixing model for shifted double JPEG compression with application to passive image authentication,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '08), pp. 1661–1664, IEEE, Las Vegas, Nev, USA, March-April 2008. View at Publisher · View at Google Scholar · View at Scopus
  90. T. Bianchi and A. Piva, “Detection of non-aligned double jpeg compression with estimation of primary compression parameters,” in Proceedings of the 18th IEEE International Conference on Image Processing (ICIP '11), pp. 1929–11932, September 2011.
  91. T. Bianchi and A. Piva, “Detection of nonaligned double jpeg compression based on integer periodicity maps,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 842–848, 2012. View at Google Scholar
  92. T. Bianchi and A. Piva, “Analysis of non-aligned double jpeg artifacts for the localization of image forgeries,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '11), pp. 1–6, November-December 2011.
  93. M. Xian-zhe, N. Shao-zhang, and Z. Jian-chen, “Tamper detection for shifted double jpeg compression,” in Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '10), pp. 434–437, October 2010.
  94. Y. L. Chen and C. T. Hsu, “Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 396–406, 2011. View at Publisher · View at Google Scholar · View at Scopus
  95. T. Bianchi and A. Piva, “Image forgery localization via block-grained analysis of jpeg artifacts,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1003–1017, 2012. View at Google Scholar
  96. A. J. Fridrich, B. D. Soukal, and A. J. Lukáš, “Detection of copymove forgery in digital images,” in Proceedings of the Digital Forensic Research Workshop, 2003.
  97. W. Q. Luo, J. W. Huang, and G. P. Qiu, “Robust detection of regionduplication forgery in digital image,” in Proceedings of the International Conference on Pattern Recognition (ICPR '06), pp. 746–749, 2006.
  98. A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Tech. Rep. TR2004-515, Dartmouth College, Computer Science, Hanover, NH, USA, 2004. View at Google Scholar
  99. S. Bayram, H. T. Sencar, and N. Memon, “An efficient and robust method for detecting copy-move forgery,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 1053–1056, IEEE, Taipei, Taiwan, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  100. Q. Wu, S. Wang, and X. Zhang, “Detection of image regionduplication with rotation and scaling tolerance,” in Proceedings of the International Conference on Computer and Computational Intelligence (ICCCI '10), J.-S. Pan, S.-M. Chen, and N. T. Nguyen, Eds., vol. 6421 of Lecture Notes in Computer Science, pp. 100–108, 2010.
  101. H. Hailing, G. Weiqiang, and Z. Yu, “Detection of copy-move forgery in digital images using sift algorithm,” in Proceedings of the Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA '08), vol. 2 of IEEE Computer Society, pp. 272–276, Wuhan, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  102. D. G. Lowe, “Object recognition from local scale-invariant features,” in Proceedings of the International Conference on Computer Vision (ICCV '99), pp. 1150–1157, 1999.
  103. I. Amerini, L. Ballan, R. Caldelli, A. del Bimbo, and G. Serra, “Geometric tampering estimation by means of a sift-based forensic analysis,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1702–1705, IEEE, Dallas, Tex, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  104. X. Pan and S. Lyu, “Detecting image region duplication using sift features,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1706–1709, IEEE, Dallas, Tex, USA, March 2010.
  105. A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, 2005. View at Publisher · View at Google Scholar · View at Scopus
  106. M. Kirchner, “Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue,” in Proceedings of the 10th ACM Workshop on Multimedia and Security (MM&Sec '08), A. D. Ker, J. Dittmann, and J. J. Fridrich, Eds., pp. 11–20, ACM, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  107. M. Kirchner and T. Gloe, “On resampling detection in re-compressed images,” in Proceedings of the 1st IEEE International Workshop on Information Forensics and Security (WIFS '09), pp. 21–25, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  108. M. Kirchner, “On the detectability of local resampling in digital images,” in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, E. J. Delp, P. W. Wong, J. Dittmann, and N. Memon, Eds., vol. 6819 of Proceedings of SPIE, February 2008.
  109. M. Kirchner, “Linear row and column predictors for the analysis of resized images,” in Proceedings of the 12th ACM Multimedia Security Workshop (MM&Sec '10), pp. 13–18, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  110. S. Prasad and K. R. Ramakrishnan, “On resampling detection and its application to detect image tampering,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '06), pp. 1325–1328, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  111. B. Mahdian and S. Saic, “On periodic properties of interpolation and their application to image authentication,” in Proceedings of the International Symposium on Information Assurance and Security, pp. 439–446, 2007.
  112. W. Weimin, W. Shuozhong, and T. Zhenjun, “Estimation of rescaling factor and detection of image splicing,” in Proceedings of the 11th IEEE International Conference on Communication Technology (ICCT '08), pp. 676–679, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  113. N. Dalgaard, C. Mosquera, and F. Pérez-González, “On the role of differentiation for resampling detection,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 1753–1756, The Institute of Electrical and Electronics Engineers, Hong Kong, China, September 2010.
  114. G. S. Song, Y. I. Yun, and W. H. Lee, “A new estimation approach of resampling factors using threshold-based peak detection,” in Proceedings of the IEEE International Conference on Consumer Electronics (ICCE '11), pp. 731–732, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  115. B. Mahdian and S. Saic, “Blind authentication using periodic properties of interpolation,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 529–538, 2008. View at Publisher · View at Google Scholar · View at Scopus
  116. B. Mahdian and S. Saic, “A cyclostationarity analysis applied to image forensics,” in Proceedings of the Workshop on Applications of Computer Vision (WACV '09), pp. 1–6, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  117. D. Vazquez-Padín, C. Mosquera, and F. Pérez-González, “Two-dimensional statistical test for the presence of almost cyclostationarity on images,” in Proceedings of the 17th IEEE International Conference on Image Processing (ICIP '10), pp. 1745–1748, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  118. D. Vazquez-Padín and F. Pérez-González, “Prefilter design for forensic resampling estimation,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '11), November-December 2011.
  119. M. Kirchner and J. J. Fridrich, “On detection of median filtering in digital images,” in Memon et al,” in Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010, 754110.
  120. T. Pevny, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol. 5, pp. 215–2224, 2010. View at Google Scholar
  121. H.-D. Yuan, “Blind forensics of median filtering in digital images,” IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1335–11345, 2011. View at Google Scholar
  122. M. C. Stamm and K. J. R. Liu, “Blind forensics of contrast enhancement in digital images,” in Proceedings of the International Conference on Image Processing (ICIP '08), pp. 3112–3115, IEEE, San Diego, Calif, USA, October 2008.
  123. M. C. Stamm and K. J. R. Liu, “Forensic estimation and reconstruction of a contrast enhancement mapping,” in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1698–1701, IEEE, Dallas, Tex, USA, March 2010.
  124. M. C. Stamm and K. J. R. Liu, “Forensic detection of image manipulation using statistical intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 492–506, 2010. View at Publisher · View at Google Scholar · View at Scopus
  125. S. Avidan and A. Shamir, “Seam carving for content-aware image resizing,” ACM Transactions on Graphics, vol. 26, no. 3, article 10, 2007. View at Publisher · View at Google Scholar · View at Scopus
  126. A. Sarkar, L. Nataraj, and B. S. Manjunath, “Detection of seam carving and localization of seam insertions in digital images,” in Proceedings of the 11th ACM Multimedia Security Workshop (MM&Sec '09), pp. 107–116, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  127. C. Fillion and G. Sharma, “Detecting content adaptive scaling of images for forensic applications,” in Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp, Eds., vol. 7541 of Proceedings of SPIE, San Jose, Calif, USA, January 2010, 75410.
  128. I. Avcibas, S. Bayram, N. Memon, M. Ramkumar, and B. Sankur, “A classifier design for detecting image manipulations,” in Proceedings of the International Conference on Image Processing (ICIP '04), pp. 2645–2648, October 2004. View at Scopus
  129. W. Chen, Y. Q. Shi, and W. Su, “Image splicing detection using 2-D phase congruency and statistical moments of characteristic function,” in Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, February 2007. View at Scopus
  130. Y. Q. Shi, C. Chen, and W. Chen, “A natural image model approach to splicing detection,” in Proceedings of the ACM Workshop on Multimedia Security (MM&Sec '07), D. Kundur, B. Prabhakaran, J. Dittmann, and J. J. Fridrich, Eds., pp. 51–62, ACM, 2007.
  131. M. K. Johnson and H. Farid, “Exposing digital forgeries by detecting inconsistencies in lighting,” in Proceedings of the ACM Workshop on Multimedia and Security, pp. 1–10, 2005.
  132. M. K. Johnson and H. Farid, “Exposing digital forgeries through specular highlights on the eye,” in Proceedings of the 9th International Conference on Information Hiding, T. Furon, F. Cayre, G. J. Doërr, and P. Bas, Eds., vol. 4567 of Lecture Notes in Computer Science, pp. 311–325, Springer, 2007.
  133. M. K. Johnson and H. Farid, “Exposing digital forgeries in complex lighting environments,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 450–461, 2007. View at Publisher · View at Google Scholar · View at Scopus
  134. C. Riess and E. Angelopoulou, “Scene illumination as an indicator of image manipulation,” in Proceedings of the International Conference on Information Hiding, pp. 66–80, 2010.
  135. W. Zhang, X. Cao, J. Zhang, J. Zhu, and P. Wang, “Detecting photographic composites using shadows,” in Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 1042–1045, IEEE, 2009.
  136. Q. Liu, X. Cao, C. Deng, and X. Guo, “Identifying image composites through shadow matte consistency,” IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1111–1122, 2011. View at Google Scholar
  137. H. Farid and J. Kosecka, “Estimating planar surface orientation using bispectral analysis,” IEEE Transactions on Image Processing, vol. 16, no. 8, pp. 2154–2160, 2007. View at Google Scholar
  138. M. K. Johnson and H. Farid, “Detecting photographic composites of people,” in Proceedings of the International Workshop on Digital Watermarking, pp. 19–33, 2007.
  139. V. Conotter and G. Boato, “Detecting photo manipulation on signs and billboards,” in Proceedings of the International Conference on Image Processing (ICIP '10), pp. 1741–1744, IEEE, Hong Kong, China, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  140. P. Kakar, N. Sudha, and W. Ser, “Exposing digital image forgeries by detecting discrepancies in motion blur,” IEEE Transactions on Multimedia, vol. 13, no. 3, pp. 443–452, 2011. View at Publisher · View at Google Scholar · View at Scopus
  141. H. Yao, S. Wang, Y. Zhao, and X. Zhang, “Detecting image forgery using perspective constraints,” IEEE Signal Processing Letters, vol. 19, pp. 123–1126, 2012. View at Google Scholar
  142. M. Kirchner and R. Böhme, “Tamper hiding: defeating image forensics,” in Proceedings of the 9th International Conference on Information Hiding, T. Furon, F. Cayre, G. Doerr, and P. Bas, Eds., pp. 326–341, 2007.
  143. M. Kirchner and R. Böhme, “Hiding traces of resampling in digital images,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 582–592, 2008. View at Google Scholar
  144. T. Gloe, M. Kirchner, A. Winkler, and R. Böhme, “Can we trust digital image forensics?” in Proceedings of the 15th international Conference on Multimedia, pp. 78–86, 2007.
  145. M. Goljan, J. Fridrich, and M. Chen, “Defending against fingerprint-copy attack in sensor-based camera identification,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 227–236, 2011. View at Publisher · View at Google Scholar · View at Scopus
  146. R. Caldelli, I. Amerini, and A. Novi, “An analysis on attacker actions in fingerprint-copy attack in source camera identification,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '11), pp. 1–6, November-December 2011.
  147. M. Kirchner and R. Böhme, “Synthesis of color filter array pattern in digital images,” in Media Forensics and Security, E. J. Delp, J. Dittmann, N. Memon, and P. W. Wong, Eds., vol. 7254 of Proceedings of SPIE, 2009.
  148. M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, “Anti-forensics of JPEG compression,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '10), pp. 1694–1697, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  149. M. Stamm and K. J. R. Liu, “Anti-forensics of digital image compression,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1050–1065, 2011. View at Google Scholar
  150. G. Valenzise, M. Tagliasacchi, and S. Tubaro, “The cost of jpeg compression anti-forensics,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '11), pp. 1884–1887, May 2011.
  151. G. Valenzise, V. Nobile, M. Tagliasacchi, and S. Tubaro, “Countering jpeg anti-forensics,” in Proceedings of the 18th IEEE International Conference on Image Processing (ICIP '11), pp. 1949–1952, September 2011.
  152. S. Lai and R. Böhme, “Countering counter-forensics: the case of jpeg compression,” in Proceedings of the 13th International Conference on Information Hiding (IH '11), pp. 285–298, Springer, Berlin, Heidelberg, 2011.
  153. M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, “Undetectable image tampering through JPEG compression anti-forensics,” in Proceedings of the 17th IEEE International Conference on Image Processing (ICIP '10), pp. 2109–2112, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  154. M. Barni, M. Fontani, and B. Tondi, “A universal technique to hide traces of histogram-based image manipulations,” in Proceedings of the 14th ACM Workshop on Multimedia and Security (MM&SEC '12), September 2012.
  155. M. Barni, “A game theoretic approach to source identification with known statistics,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '12), pp. 1745–1748, March 2012.
  156. M. C. Stamm, W. S. Lin, and K. J. R. Liu, “Forensics versus anti-forensics: a decision and game theoretic framework,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '12), pp. 1749–1752, March 2012.
  157. O. Celiktutan, B. Sankur, and I. Avcibas, “Blind identification of source cell-phone model,” IEEE Transactions on Information Foren- Sics and Security, vol. 3, no. 3, pp. 553–566, 2008. View at Publisher · View at Google Scholar
  158. M. Kharrazi, H. T. Sencar, and N. D. Memon, “Improving steganalysis by fusion techniques: a case study with image steganography,” Transactions on Data Hiding and Multimedia Security, vol. 4300, pp. 123–137, 2006. View at Google Scholar
  159. S. Bayram, I. Avcibaş, B. Sankur, and N. Memon, “Image manipulation detection,” Journal of Electronic Imaging, vol. 15, no. 4, Article ID 041102, 2006. View at Publisher · View at Google Scholar · View at Scopus
  160. M. Fontani, T. Bianchi, A. de Rosa, A. Piva, and M. Barni, “A dempster-shafer framework for decision fusion in image forensics,” in Proceedings of the IEEE International Workshop on Forensics and Security (WIFS '11), pp. 1–6, November-December 2011.
  161. G. Shafer, A Mathematical Theory of Evidence, Princeton University Press, Princeton, NJ, USA, 1976.
  162. M. Barni and A. Costanzo, “A fuzzy approach to deal with uncertainty in image forensics,” Signal Processing: Image Communication, vol. 27, no. 9, pp. 998–1010, 2012. View at Publisher · View at Google Scholar