Volume 8, No. 4, May 2017 (Special Issue)
International Journal of Advanced Research in Computer Science
REVIEW ARTICLE
Available Online at www.ijarcs.info
© 2015-19, IJARCS All Rights Reserved 440
A Review on Image Forgery & its Detection Procedure
Ashish Kumar Chakraverti Prof.(Dr.) Vijay Dhir
Research Scholar Professor CSE
IKG PTU, Jalandhar, Punjab India Jalandhar, Punjab, India
ashish.me08@gmail.com
Abstract: - Image forgery and image forgery detection are
emerging as well as hot research topics among researchers. In
today’s digital scenario, images are playing a major role in our
day to day life and its manipulation is increasing exponentially.
This manipulation is known as Image forging. In this review
paper, we will study image forging, its types and detection
process.
Keywords: - Image forgery, Image forgery detection, Active
technique, Passive technique, Digital Watermark, Digital
Signature, Image Retouching, Image Splicing, Image Cloning
drvijaydhir@gmail.com
I. INTRODUCTION
With the introduction of digital technology, the use of images
has increased in our day to day lives so as the forgery of
digital images has become simpler, smart and indeterminable.
Today's digital technology had begun to erode the integrity of
images and image counterfeiting and forgeries with the move
to the world of Megapixels, opens a brand new door to the
dark-side of it. We are living in an age, where something may
be manipulated or altered with the assistance of advance
technology. With the increasing applications of digital
imaging, differing kinds of software programming tools are
introduced for processing images and photographs. They are
accustomed to build forge pictures to make it look realistic
and sometimes objects may be added or deleted. For decades,
images are used to document and they are used as proof in
courts. Though photographers are able to produce composites
of analog photos however this method is extremely time
consuming and needs knowledgeable information thus it is
arduous to implement than digital photos. Today, however,
powerful digital image editing software packages makes
image modifications easy [1]. Today’s digital technology has
begun to get rid of trust in our information, as from the
magazines, to fashion world and in scientific journals, political
campaigns, courts and also the picture that comes in our e-
mail. All of these forged images are appearing with an
additional frequencies and sophistication. The increase in the
availability of multimedia information in digital form has
come to a tremendous growth of tools to govern digital
multimedia information contents.
The process developing fake image has been
tremendously simple with the introduction of latest and
powerful computer graphics editing software packages that are
freely available as Photoshop, GIMP, and Corel Paint shop. In
today scenario, this powerful image processing software’s
enable individuals to alter photos and pictures conveniently
and in unseen manner. It creates an enormous challenge to
authenticate pictures. Image forgery means manipulation of
the digital image to hide some significant or useful data from
it. Generally it is troublesome to spot the altered region from
the first image. The detection of a forged image is driven by
the requirement of authenticity and to maintain integrity of the
image. The survey has been done on existing techniques for
forged image and it highlights numerous copy–move detection
and splicing detection ways based on their robustness and
computational complexity [2].
Image forgery techniques are divided into two major
categories: active and passive forgery. Active method requires
some preliminary data of an image and such methods are not
useful while handling images from unknown sources. This is
biggest drawback of active method. Digital watermarking is
one of them. Passive method does not need any preliminary
data of digital image. The method works purely by analyzing
binary information of digital image without any external
information. Copy-move forgery belongs to this method [3].
Example of image forgery is shown below:
Fig. 1(a) Fig. 1(b) Fig. 1(c)
Figure1: Example of Copy-Move Image Forgery. 1(a) Shows Original Image
1(b) shows tampered image 1(c) Shows detection of tampered image
II. CLASSIFICATION OF IMAGE FORGERY
TECHNIQUES
There are two kinds of techniques for image forgeries: one is
active forgery, and the other is passive forgery. Which again
consist of many different methods, as shown in below figure
[5].