Volume 8, No. 4, May 2017 (Special Issue) International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info © 2015-19, IJARCS All Rights Reserved 440 A Review on Image Forgery & its Detection Procedure Ashish Kumar Chakraverti Prof.(Dr.) Vijay Dhir Research Scholar Professor CSE IKG PTU, Jalandhar, Punjab India Jalandhar, Punjab, India ashish.me08@gmail.com Abstract: - Image forgery and image forgery detection are emerging as well as hot research topics among researchers. In today’s digital scenario, images are playing a major role in our day to day life and its manipulation is increasing exponentially. This manipulation is known as Image forging. In this review paper, we will study image forging, its types and detection process. Keywords: - Image forgery, Image forgery detection, Active technique, Passive technique, Digital Watermark, Digital Signature, Image Retouching, Image Splicing, Image Cloning drvijaydhir@gmail.com I. INTRODUCTION With the introduction of digital technology, the use of images has increased in our day to day lives so as the forgery of digital images has become simpler, smart and indeterminable. Today's digital technology had begun to erode the integrity of images and image counterfeiting and forgeries with the move to the world of Megapixels, opens a brand new door to the dark-side of it. We are living in an age, where something may be manipulated or altered with the assistance of advance technology. With the increasing applications of digital imaging, differing kinds of software programming tools are introduced for processing images and photographs. They are accustomed to build forge pictures to make it look realistic and sometimes objects may be added or deleted. For decades, images are used to document and they are used as proof in courts. Though photographers are able to produce composites of analog photos however this method is extremely time consuming and needs knowledgeable information thus it is arduous to implement than digital photos. Today, however, powerful digital image editing software packages makes image modifications easy [1]. Today’s digital technology has begun to get rid of trust in our information, as from the magazines, to fashion world and in scientific journals, political campaigns, courts and also the picture that comes in our e- mail. All of these forged images are appearing with an additional frequencies and sophistication. The increase in the availability of multimedia information in digital form has come to a tremendous growth of tools to govern digital multimedia information contents. The process developing fake image has been tremendously simple with the introduction of latest and powerful computer graphics editing software packages that are freely available as Photoshop, GIMP, and Corel Paint shop. In today scenario, this powerful image processing software’s enable individuals to alter photos and pictures conveniently and in unseen manner. It creates an enormous challenge to authenticate pictures. Image forgery means manipulation of the digital image to hide some significant or useful data from it. Generally it is troublesome to spot the altered region from the first image. The detection of a forged image is driven by the requirement of authenticity and to maintain integrity of the image. The survey has been done on existing techniques for forged image and it highlights numerous copy–move detection and splicing detection ways based on their robustness and computational complexity [2]. Image forgery techniques are divided into two major categories: active and passive forgery. Active method requires some preliminary data of an image and such methods are not useful while handling images from unknown sources. This is biggest drawback of active method. Digital watermarking is one of them. Passive method does not need any preliminary data of digital image. The method works purely by analyzing binary information of digital image without any external information. Copy-move forgery belongs to this method [3]. Example of image forgery is shown below: Fig. 1(a) Fig. 1(b) Fig. 1(c) Figure1: Example of Copy-Move Image Forgery. 1(a) Shows Original Image 1(b) shows tampered image 1(c) Shows detection of tampered image II. CLASSIFICATION OF IMAGE FORGERY TECHNIQUES There are two kinds of techniques for image forgeries: one is active forgery, and the other is passive forgery. Which again consist of many different methods, as shown in below figure [5].