=Paper= {{Paper |id=Vol-2525/paper21 |storemode=property |title=Digital image forgery |pdfUrl=https://ceur-ws.org/Vol-2525/ITTCS-19_paper_36.pdf |volume=Vol-2525 |authors=Daniel Atonge,Ananga Thapaliya,Manuel Mazzara,Subham Chakraborty,Ilya Afanasyev |dblpUrl=https://dblp.org/rec/conf/ittcs/AtongeTMCA19 }} ==Digital image forgery== https://ceur-ws.org/Vol-2525/ITTCS-19_paper_36.pdf
                                         Digital Image Forgery *

          Ananga Thapaliya                        Daniel Elambo Atonge                         Manuel Mazzara
         Innopolis University                      Innopolis University                      Innopolis University
           Innopolis, Russia                         Innopolis, Russia                         Innopolis, Russia
      a.thapaliya@innopolis.ru                d.atonge@innopolis.university                m.mazzara@innopolis.ru



        Subham Chakraborty                             Ilya Afanasyev                        Muhammad Ahmad
         Innopolis University                       Innopolis University                   University of Messina
           Innopolis, Russia                          Innopolis, Russia                        Messina, Italy
     s.chakraborty@innopolis.ru                  i.afanasyev@innopolis.ru                   sdistefano@unime.it




                                                       Abstract
                      Image control has disintegrated our trust of computerized
                      pictures, with progressively unobtrusive fraud techniques
                      representing a regularly expanding test to the integrity of
                      images and their legitimacy. With the progress of advanced
                      image controlling software and modifying tools, an electronic
                      picture can be successively controlled. Checking the decency
                      of pictures and recognizing indications of modifying without
                      requiring extra pre-inserted data of the image is the basic
                      field of inspection. In this paper, a study of such research
                      commitments has been directed by following a well-defined
                      and systematic procedure. There are different paths for
                      modifying an image, for instance, copy-move, splicing, and
                      re-sampling. This paper focuses on two types of digital image
                      forgery detection which are copy move and splicing of image.


1    Introduction
     The Digital image forensics is the procedure of modification or alteration of digital image with an arrangement to
cheat other which are the precise copies of original picture [1]. The development and improvement in the field of computer



*
 Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0
International (CC BY 4.0).
graphics have produced many photo editing software, for example Lightroom, Photoshop and many more. This alters the
picture content without making any undeniable evidence of scam.
      Today, these powerful images editing software enable individuals to adjust photographs and pictures easily and in a
short period of time. So, it winds up troublesome for people to detect these changes and modifications. Thus, the veracity
and legitimacy of digital pictures are lost. Figure 1 shows a typical example of digital image forgery. This alteration of
pictures can be done for concealing some critical traces from a picture, to modify the minutiae of the picture which makes
the wrong data to be transmitted. In this 21st century, there aren’t any places left where digital pictures aren’t utilized. They
are used in pretty much every field, in particular computerized media, electronic field, financial institutions, government,
military, law, industry, forensics, science and innovation, social media, fashion, medical profession and certainly
everywhere throughout the web [2]. Thus, creating strategies to check the genuineness and realness of the digital images
is essential, especially considering that these images are presented as a proof in a courtroom, as a piece of recuperative
records or as reports which involves huge financial budgets. Hence, digital image forgery detection is one of the most
important of image forensics.




                                             Figure 1: Digital Image Forgery [9]

The aim of this work is:
1) To give a brief introduction of digital image forgery.
2) To give an outline of various types of digital image forgery.
3) To show different procedures of image forgery detection with their pros and cons

2    Types of Digital Image Forgery
      Image alteration or modification is characterized as editing, that is “adding or erasing” some vital highlights from a
picture without leaving any recognizable touch. There are two types of image falsifying techniques: Active and Passive
approaches [3]. These types have its own specific types which is shown in Figure 2. There have been distinguished methods
for falsifying a picture. Considering the techniques used for altering images there are three types of digital image forgery:
Image Splicing or image composites, Copy-Move or region duplication Forgery and Image retouching.
                                        Figure 2: Types of Digital Image Forgery


2.1    Region Duplication (Copy-move forgery)
       Region duplication is the most common image altering method used because of easiness and effectiveness in
which image of any shape and size in specific area is reordered (copying and pasting) with another region in the same
image to cover some vital information as displayed in figure 3. This is normally done so as to shroud certain subtleties or
to copy certain parts of a picture [4]. The use of blur can often be seen along the fringe of modified region to lower down
the inconsistencies between the original and reordered area. As the replicated part started from the same picture, its
fundamental properties, for example its saturation, color and grain don’t change and make the process of
acknowledgment difficult. There are several attempts to detect copy-move forgery.




                                              Figure 3: Copy-Move Forgery

2.2    Image Splicing
       Image splicing is a commonly used simple forgery technique that crops and pastes regions from the same or separate
sources. The splicing operation is caused by supplanting at least one parts of an image with sections of other images. There
are numerous tools accessible for picture altering like enhancement, morphing and so forth [4]. Splicing is a type of
photographic manipulation which involves computerized splicing of at least two pictures into a solitary composite picture
which might not have further post preparing, for example, smoothing of borders among various fragments. Figure 4 is an
example of image splicing. This technique of alteration can cause irregularities in numerous features like the unusually
sharp transient at the edges and these irregularities are utilized to identify the phony. Image splicing is used by advanced
photograph montage with the goal that two pictures can be joined together as it is one of the most common digital image
forgery practice between the well-known forgery identification methods [5].




                                              Figure 4: Image Splicing [10]

2.3    Image Retouching
        Adjustment of the picture utilizing any editing software to accomplish some particular outcome, for example to
ridicule others or enhance the pictures comes under this classification. This procedure does not fundamentally change a
picture but rather improves or lessens the specific element of a picture [12]. To make an amazing forged picture, some
chosen locales need to experience geometric changes like rotating, scaling, extending etc. The introductory step plays a
vital role in retouching process and presents non-insignificant factual changes. Retouching brings explicit intermittent
connections into the picture. These connections can be used to perceive forgery which is done by retouching [5]. Regardless
of which camera is utilized to take pictures, it is conceivable to modify every photograph to dispose of any defects later
on. Retouching involves a lot of treatments like essential shading adjustment, skin modifying, and photograph rebuilding
and so on. One best case for retouching can be clarified with figure 5.




                                             Figure 5: Image Retouching [11]
                                  Figure 6: Digital Image Forgery Detection Techniques




3     Digital Image Forgery Detection Techniques
     The undetectable phony picture detection is exceedingly refined. Any phony presents a connection among the
forged picture fragments and the first section which can be utilized for effective forgery exposure. A few proficient
forgery discovery methods are presented for passive digital image forgery detection which are roughly grouped into five
categories. In this passive methodology, there is no pre-embedded data inside the picture amid the creation [5]. This
method works simply by dissecting the binary data of a picture. Fig 6 demonstrates the different digital image forgery
detection methods [6].


3.1    Format based digital image forgery detection
        This method works with respect to the image format. The most preferred image on which this image forgery
detection works is JPEG format. The blocking impact presented by JPEG can be utilized to identify altering in JPEG design.
Manipulation of pictures causes the modification of block artifact grid, particularly in the case of preparation of copy-move
[1], [2]. JPEG Quantization, JPEG blocking and double JPEG are three major classifications which can recognize picture
phony also for compressed pictures.

3.2    Pixel based digital image forgery detection
       This method highlights with respect to the pixels of the digital picture which are the fundamental structure blocks.
These strategies take a shot at various factual abnormalities which are introduced at the pixel level. The working of these
procedures depends on the adjustment’s basic insights of the picture [6]. The most common detection techniques in this
category are copy-move, splicing and resampling.

3.3    Camera based digital image forgery detection
       When we snap a photo from a digital camera, the image moves form the camera sensor to the memory and it
encounters a series of processing steps, including quantization, shading connection, gamma amendment, filtering, white
balancing and JPEG compression [6]. These handling ventures from clicking to storing pictures in the memory may
move on the basis of camera model. The four main methods that works on camera based digital image forgery detection
are sensor noise, color filter array, chromatic aberration and camera response [5], [6]

3.4        Physical environment based digital image forgery detection
        The peculiarities in the three-dimensional association between the camera, light and the physical articles can be
demonstrated through picture forgery strategies dependent on physical condition. On account of the formation of a
forgery with two film stars, the talk is that they are impractically strolling down a shoreline amid dusk [12]. Using the
methods of splicing it is conceivable, yet the formation of the precise match in the lighting impacts is regularly
troublesome with that of original photo [6], [7]. Here, the distinction in background lighting can be used as the altering
proof. The functioning of the algorithm is on the premise of distinction in the lighting condition. 2D light detection, 3D
light detection and light environment are the three main categories for this method [8].

3.5        Geometry based digital image forgery detection
      This method measures the world items and the relative position of the camera. Principle point and metric
measurement are two primary methods in geometry-based technique. Principle point is the projection of camera, focus to
the image plane. The principal point for a picture is situated close to the focal point of the image [9]. When the picture
object is changed, there is a relative change of principal point. This distinction in the assessed principle point of the
picture can be utilized as the proof of altering. Getting metric measurement from a solitary picture is extremely valuable
in forensic settings where true estimations are required [10], [11].


4     CONCLUSION
      The need of digital image forgery detection is becoming more vital in this cutting-edge period. The altered images
in military and court rooms can play an indispensable job in judgment or for important decisions. Through social media,
journals and papers forged pictures can create detrimental actions or even devastate the life of an individual. The modern
minimal effort software and tools empower the creation and control of digital pictures which leaves no distinguishable
touches which follows with the goal of giving genuineness to the pictures that can be addressed as legitimate proof.
There are several altering strategies, some of them discussed in this paper which address different parts of digital image
forgery detection. Since passive techniques don't require any previous information, they are increasingly advantageous.
Despite the fact that a significant number of these strategies are proficient to identify advanced picture altering, the need
of present-day modern methods to detect digital image forgery is becoming more crucial.




References
      1.    Gill, N. K., Garg, R., & Doegar, E. A. (2017, July). A review paper on digital image forgery detection
            techniques. In 2017 8th International Conference on Computing, Communication and Networking
            Technologies (ICCCNT) (pp. 1-7). IEEE.
      2.    Bharti, C. N., & Tandel, P. (2016, March). A survey of image forgery detection techniques. In 2016 International
            Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 877-881). IEEE.
      3.     Huynh, T. K., Huynh, K. V., Le-Tien, T., & Nguyen, S. C. (2015, January). A survey on image forgery
            detection techniques. In The 2015 IEEE RIVF International Conference on Computing & Communication
            Technologies-Research, Innovation, and Vision for Future (RIVF) (pp. 71-76). IEEE.
      4.    Kashyap, A., Parmar, R. S., Agrawal, M., & Gupta, H. (2017). An evaluation of digital image forgery
            detection approaches. arXivpreprint arXiv:1703.09968.
      5.    Nampoothiri, V. P., & Sugitha, N. (2016, March). Digital image forgeryA threaten to digital forensics. In
            2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-6). IEEE.
      6.    Walia, S., & Kumar, K. (2019). Digital image forgery detection: a systematic scrutiny. Australian Journal
            of Forensic Sciences, 51(5), 488-526.
7.   Birajdar, G. K., & Mankar, V. H. (2013). Digital image forgery detection using passive techniques: A
    survey. Digital investigation, 10(3), 226-245.
8. Tembe, A. U., & Thombre, S. S. (2017, February). Survey of copy-paste forgery detection in digital
    image forensic. In 2017 International Conference on Innovative Mechanisms for Industry Applications
    (ICIMIA) (pp. 248-252). IEEE.
9. Johnson, M. K., & Farid, H. (2007, June). Exposing digital forgeries through specular highlights on the eye. In
    International Workshop on Information Hiding (pp. 311-325). Springer, Berlin, Heidelberg.
10. Ng, T. T., & Chang, S. F. (2004, October). A model for image splicing. In 2004 International Conference on
    Image Processing, 2004. ICIP’04. (Vol. 2, pp. 1169-1172). IEEE.
11. Nampoothiri, V. Parameswaran and N. Sugitha. Digital image forgery a threat to digital forensics. 2016
    International Conference on Circuit, Power and Computing Technologies (ICCPCT) (2016): 1-6.
12. Thakur, Tulsi, Kavita Singh, and Arun Yadav. ”Blind Approach for Digital Image Forgery Detection.”
    International Journal of Computer Applications 975 (2018): 8887.