The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1093/comjnl/bxz148
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection

Abstract: Information in the form of the image conveys more details than any other form of information. Several software packages are available to manipulate the images so that the authenticity of the images is being questioned. Several image processing approaches are available to create fake images without leaving any visual clue about the forging operation. So, proper image forgery detection tools are required to detect such forgery images. Over the past few years, several research papers were published in the digital… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…The processing steps that an image goes through depend on the camera's model, and the other relevant features of the camera. The features of the device are often referred to as the device fingerprint, such as photo response non-uniformity noise pattern (Rani, 2019; Vinolin and Sucharitha, 2019). On being captured by the camera, the image goes into the memory, and then a series of processing steps are carried out, such as quantization, colour correlation, filtering, compression, gamma correction and white balancing (Gonzalez and Richard, 2018).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The processing steps that an image goes through depend on the camera's model, and the other relevant features of the camera. The features of the device are often referred to as the device fingerprint, such as photo response non-uniformity noise pattern (Rani, 2019; Vinolin and Sucharitha, 2019). On being captured by the camera, the image goes into the memory, and then a series of processing steps are carried out, such as quantization, colour correlation, filtering, compression, gamma correction and white balancing (Gonzalez and Richard, 2018).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Whenever an image has been tampered, it is uploaded in some manipulation software and resaved. This action introduces patterns in the image that can help to detect the forgery (Vinolin and Sucharitha, 2019). The blocking patterns are also altered when an image is manipulated.…”
Section: Literature Reviewmentioning
confidence: 99%