International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.8, No.10 (2015), pp.91-96 http://dx.doi.org/10.14257/ijsip.2015.8.10.10 ISSN: 2005-4254 IJSIP Copyright 2015 SERSC A Survey Of Digital Image Tampering Techniques Nishtha Parashar 1 and Nirupama Tiwari 2 1,2 Computer Science & Engineering Dept., SRCEM, Banmore nishtha2909@gmail.com, girishniru@gmail.com Abstract Due to powerful computers and advanced photo-editing software tools the manipulation of images has become an easy task. Confirming the authenticity of images and detecting tampered regions in an image without any knowledge about the image content is an important part of the research field. An effort is made to survey the recent advancements being made in the field of digital image forgery detection and thus passive methods for forgery detection are being presented. Blind or passive methods do not require any explicit former information about the image. In the first part, various image forgery detection techniques are classified and then an overview of passive image authentication is presented and the existing blind forgery detection techniques are reviewed. Keywords: passive/blind forgery detection techniques, dyadic wavelet transform, image tampering, copy-move forgery 1. Introduction The present day digital revolution has changed the format of accessing, manipulating and sharing information, however these developments have also given rise to different security issues. Complex digital technology and various photo-editing software like Adobe Photoshop etc. are universal and have made the task of forging images a common practice. Complex digital technology and different photo-editing software, such as Adobe Photoshop, are universal and thus have made the process of manipulating images to create forgeries a fairly common practice. As a result, trust in digital imagery has been eroded. An example of digital forgery was seen in a Tunisian newspaper in which a photo was altered duplicating the crowd to appear large [9]. Another example as shown in Figure 1 displays the altered photograph released by Iran showing four missiles instead of three [2]. This tampered image was also being published by various western media including The New York Times. The research in this thesis attempts to address this need and provide some insight into this challenging problem.