Abstract
In this digital era, a huge amount of images are flooding the internet, which is extensively used for digital communications, and are also regarded as a significant source of information in many fields. However, the images can be easily altered without leaving any traces due to the availability of digital image editing softwares. Hence, it becomes essential to validate the integrity of the images. One of the most serious and popular tampering procedures is Copy Move Forgery (CMF), wherein some portion of an image is copied and pasted to another region in the same image. This paper reviews recent state-of-the-art copy-move forgery detection (CMFD) schemes along with their pros, and cons with the help of tables for better readability. In addition, this paper enlists the performance evaluation criteria and different image datasets used for CMFD, along with their merits and demerits. At last, this review addresses the various issues, challenges, and future directions in the field of CMFD. This survey paper aims to provide researchers with a broad perspective on the various aspects of advancements in CMFD techniques.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16455-x/MediaObjects/11042_2023_16455_Fig10_HTML.png)
Similar content being viewed by others
Availability of data and materials
Data is available from the authors upon reasonable request
References
Abd Warif N, Wahid A, Idris M, Ramli R, Salleh R, Band S, Choo KKR (2016) Copy-move forgery detection: Survey, challenges and future directions. J Netw Comput Appl 75. https://doi.org/10.1016/j.jnca.2016.09.008
Abd Warif N, Wahid A, Idris M, Salleh R, Othman F (2017) Sift-symmetry: A robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46. https://doi.org/10.1016/j.jvcir.2017.04.004
Agarwal V, Mane V (2016) Reflective sift for improving the detection of copy-move image forgery. In: 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp 84–88. https://doi.org/10.1109/ICRCICN.2016.7813636
Alhussein M (2016) Image tampering detection based on local texture descriptor and extreme learning machine. In: 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim), pp 196–199. https://doi.org/10.1109/UKSim.2016.39
Alkawaz MH, Sulong G, Saba T, Rehman A (2016) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Applic 30:183–192
Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International 231(1):284–295
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6(3):1099–1110. https://doi.org/10.1109/TIFS.2011.2129512
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Processing: Image Communication 28:659–669. https://doi.org/10.1016/j.image.2013.03.006
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2010) Geometric tampering estimation by means of a sift-based forensic analysis. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp 1702–1705. https://doi.org/10.1109/ICASSP.2010.5495485
Anand V, Hashmi MF, Keskar A (2014) In: A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods, vol 8397 pp 530–542. https://doi.org/10.1007/978-3-319-05476-6_54
Ansari MD, Ghrera SP, Tyagi V (2014) Pixel-based image forgery detection: A review. IETE journal of education 55(1):40–46
Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensics and Security 10(10):2084–2094. https://doi.org/10.1109/TIFS.2015.2445742
Ardizzone E, Bruno A, Mazzola G (2010) Detecting multiple copies in tampered images. In: 2010 IEEE International Conference on Image Processing, pp 2117–2120. https://doi.org/10.1109/ICIP.2010.5652490
Arnold M, Wolthusen S, Schmucker M (2003) Techniques and applications of digital watermarking and content protection. Facts and Models, Psychoacoustics
Badr A, Youssif A, Wafi M (2020) A robust copy-move forgery detection in digital image forensics using surf. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp 1–6. https://doi.org/10.1109/ISDFS49300.2020.9116433
Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) Patchmatch: a randomized correspondence algorithm for structural image editing. ACM Trans. Graph. 28:24
Barni M, Phan QT, Tondi B (2021) Copy move source-target disambiguation through multi-branch cnns. IEEE Transactions on Information Forensics and Security 16:1825–1840. https://doi.org/10.1109/TIFS.2020.3045903
Bayram S, Taha Sencar H, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp 1053–1056. https://doi.org/10.1109/ICASSP.2009.4959768
Bi XL, Pun CM, Yuan X (2016) Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci 345:226–242
bin Y, **ngming S, Guo H, **a Z, Chen X, (2018) A copy-move forgery detection method based on cmfd-sift. Multimedia Tools and Applications 77. https://doi.org/10.1007/s11042-016-4289-y
Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Digital investigation 10(3):226–245
Cao G, Chen Y, Zong G, Chen Y (2015) Detection of copy-move forgery in digital image using locality preserving projections. In: 2015 8th International Congress on Image and Signal Processing (CISP), pp 599–603. https://doi.org/10.1109/CISP.2015.7407949
Chauhan D, Kasat D, Jain S, Thakare VM (2016) Survey on keypoint based copy-move forgery detection methods on image. Procedia Computer Science 85:206–212. https://doi.org/10.1016/j.procs.2016.05.213
chen He D, Wang L (1990) Texture unit, texture spectrum, and texture analysis. IEEE Trans Geosci Remote Sens 28(4):509–512. https://doi.org/10.1109/TGRS.1990.572934
Chen CC, Lu WY, Chou CH (2019) Rotational copy-move forgery detection using sift and region growing strategies. Multimedia Tools and Applications 78:1–16. https://doi.org/10.1007/s11042-019-7165-8
Chen B, Tan W, Coatrieux G, Zheng Y, Shi YQ (2021) A serial image copy-move forgery localization scheme with source/target distinguishment. IEEE Transactions on Multimedia 23:3506–3517. https://doi.org/10.1109/TMM.2020.3026868
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6):1841–1854
Copy-move forgery detection using swt-dct and four square mean features. In: Proceeding of 2019 International Conference on Electrical Engineering and Informatics, ICEEI 2019, Proceedings of the International Conference on Electrical Engineering and Informatics, pp 63–68. Institute of Electrical and Electronics Engineers Inc., United States (2019). Publisher Copyright: 2019 IEEE.; 7th International Conference on Electrical Engineering and Informatics, ICEEI 2019 ; Conference date: 09-07-2019 Through 10-07-2019. https://doi.org/10.1109/ICEEI47359.2019.8988905
Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) In: Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (eds) Digital Watermarking and Steganography (Second Edition), The Morgan Kaufmann Series in Multimedia Information and Systems, second edition edn., pp 105–135. Morgan Kaufmann, Burlington
Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Transactions on Information Forensics and Security 10(11):2284–2297. https://doi.org/10.1109/TIFS.2015.2455334
Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: 2014 IEEE International Conference on Image Processing (ICIP), pp 5312–5316 . https://doi.org/10.1109/ICIP.2014.7026075
Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231:61–72. https://doi.org/10.1016/j.forsciint.2013.04.023
de Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security 8(7):1182–1194. https://doi.org/10.1109/TIFS.2013.2265677
Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising swt-svd. IET Image Processing 11. https://doi.org/10.1049/iet-ipr.2016.0537
Doegar A, Dutta M, Gaurav K (2019) Cnn based image forgery detection using pre-trained alexnet model. International Journal of Computational Intelligence & IoT 2(1)
Du ZL, Li XL, Jiao LX, Shen K (2012) Region duplication blind detection based on multiple feature combination. In: 2012 International Conference on Machine Learning and Cybernetics, vol 1, pp 17–21. https://doi.org/10.1109/ICMLC.2012.6358879
El Biach FZ, Iala I, Laanaya H, Minaoui K (2022) Encoder-decoder based convolutional neural networks for image forgery detection. Multimedia Tools Appl 81(16):22611–22628. https://doi.org/10.1007/s11042-020-10158-3
Elaskily M, Elnemr H, Sedik A, Dessouky M, El Banby G, Elaskily O, Khalaf AAM, Aslan H, Faragallah O, Abd El-Samie F, Elshakankiry O (2020) A novel deep learning framework for copy-move forgery detection in images. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-020-08751-7
Emam M, Han Q, Niu X (2015) Pcet based copy-move forgery detection in images under geometric transforms. Multimedia Tools and Applications 75:11513–11527
Emam M, Han Q, Zhang H (2017) Two-stage keypoint detection scheme for region duplication forgery detection in digital images. J Forensic Sci 63. https://doi.org/10.1111/1556-4029.13456
Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection. In: 2014 IEEE Visual Communications and Image Processing Conference, pp 253–257. https://doi.org/10.1109/VCIP.2014.7051552
Fischler MA, Bolles RC (1981) Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6):381–395. https://doi.org/10.1145/358669.358692
Fridrich J, Soukal D, Lukás J (2003) Detection of copy-move forgery in digital images. Int J Comput Sci Issues 3:55–61
Gençtürk B, Ulutas G, Ulutas M, Nabiyev V (2016) A new copy move forgery detection technique with automatic threshold determination. AEU - International Journal of Electronics and Communications 70. https://doi.org/10.1016/j.aeue.2016.05.005
Ghorbani M, Firouzmand M, Faraahi A (2011) Dwt-dct (qcd) based copy-move image forgery detection. In: 2011 18th International Conference on Systems, Signals and Image Processing, pp 1–4
Ghulam M, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9:49–57
Hegazi A, Taha A, Selim M (2020) Copy-move forgery detection based on automatic threshold estimation. International Journal of Sociotechnology and Knowledge Development 12:1–23. https://doi.org/10.4018/IJSKD.2020010101
Hosny KM, Mortda AM, Fouda MM, Lashin NA (2022) An efficient cnn model to detect copy-move image forgery. IEEE Access 10:48622–48632. https://doi.org/10.1109/ACCESS.2022.3172273
Hosny K, Hamza H, Lashin N (2018) Copy-move forgery detection of duplicated objects using accurate pcet moments and morphological operators. The Imaging Science Journal pp 1–16. https://doi.org/10.1080/13682199.2018.1461345
Hsu YF, Chang S (2011) Camera response functions for image forensics: An automatic algorithm for splicing detection. Information Forensics and Security, IEEE Transactions on 5:816–825. https://doi.org/10.1109/TIFS.2010.2077628
Huang Y, Wei Z, Sun W, Long D (2011) Improved dct-based detection of copy-move forgery in images. Forensic Sci Int 206:178–84. https://doi.org/10.1016/j.forsciint.2010.08.001
Huang DY, Huang CN, Hu WC, Chou CH (2017) Robustness of copy-move forgery detection under high jpeg compression artifacts. Multimedia Tools and Applications 76:1509–1530. https://doi.org/10.1007/s11042-015-3152-x
Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using sift algorithm. In: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol 2, pp 272–276. https://doi.org/10.1109/PACIIA.2008.240
Hussain M, Muhammad G, Saleh SQ, Mirza AM, Bebis G (2012) Copy-move image forgery detection using multi-resolution weber descriptors. In: 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems, pp 395–401 . https://doi.org/10.1109/SITIS.2012.64
Hussain M, Saleh SQ, Aboalsamh H, Muhammad G, Bebis G (2014) Comparison between wld and lbp descriptors for non-intrusive image forgery detection. In: 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings, pp 197–204 . https://doi.org/10.1109/INISTA.2014.6873618
İmamoğlu MB, Ulutaş G, Ulutaş M (2013) Detection of copy-move forgery using krawtchouk moment. In: 2013 8th International Conference on Electrical and Electronics Engineering (ELECO), pp 311–314. https://doi.org/10.1109/ELECO.2013.6713851
Isaac M, Wilscy M (2015) Copy-move forgery detection based on harris corner points and brisk. pp 394–399. https://doi.org/10.1145/2791405.2791453
** G, Wan X (2017) An improved method for sift-based copy-move forgery detection using non-maximum value suppression and optimized j-linkage. Signal Processing: Image Communication 57. https://doi.org/10.1016/j.image.2017.05.010
Jwaid MF, Baraskar TN (2017) Detection of copy-move image forgery using local binary pattern with discrete wavelet transform and principle component analysis. In: 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), pp 1–6. https://doi.org/10.1109/ICCUBEA.2017.8463695
Kakar P, Sudha N (2012) Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Transactions on Information Forensics and Security 7(3):1018–1028. https://doi.org/10.1109/TIFS.2012.2188390
Kalsi DK, Rai P (2017) A copy-move forgery detection system using approximation image local binary pattern. In: 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), pp 284–288. https://doi.org/10.1109/RISE.2017.8378168
Karsh RK, Das A, Swetha GL, Medhi A, Laskar RH, Arya U, Agarwal RK (2016) Copy-move forgery detection using asift. In: 2016 1st India International Conference on Information Processing (IICIP), pp 1–5. https://doi.org/10.1109/IICIP.2016.7975329
Kashyap A, Agarwal M, Gupta H (2017) Detection of copy-move image forgery using svd and cuckoo search algorithm. International Journal of Engineering and Technology(UAE) 7. https://doi.org/10.14419/ijet.v7i2.13.11604
Ketenci S, Ulutas G (2013) Copy-move forgery detection in images via 2d-fourier transform. In: 2013 36th International Conference on Telecommunications and Signal Processing (TSP), pp 813–816. https://doi.org/10.1109/TSP.2013.6614051
Khayeat ARH, Sun X, Rosin PL (2015) Improved dsift descriptor based copy-rotate-move forgery detection. In: PSIVT
Kirchner M, Schöttle P, Riess C (2015) Thinking beyond the block: Block matching for copy-move forgery detection revisited. Proceedings of SPIE - The International Society for Optical Engineering 9409. https://doi.org/10.1117/12.2082789
Kotsiantis SB (2007) Supervised machine learning: A review of classification techniques. In: Proceedings of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in EHealth, HCI, Information Retrieval and Pervasive Technologies, p 3–24. IOS Press, NLD
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Proceedings of the 25th International Conference on Neural Information Processing Systems - vol 1, NIPS’12, p 1097–1105. Curran Associates Inc., Red Hook, NY, USA
Kumar S, Desa JV, Mukherjee S (2016) A fast keypoint based hybrid method for copy move forgery detection. ar**v:1612.03989
Kumari R, Garg H (2023) An image copy-move forgery detection based on surf and fourier-mellin transforms pp 515–519. https://doi.org/10.1109/AISC56616.2023.10085429
Kushol R, Salekin MS, Kabir MH, Khan AA (2016) Copy-move forgery detection using color space and moment invariants-based features. In: 2016 International Conference on Digital Image Computing: Techniques and Applications (DICTA), pp 1–6. https://doi.org/10.1109/DICTA.2016.7797027
Le-Tien T (2016) Luong THKLPCHATHM. Block based technique for detecting copy-move digital image forgeries, Wavelet transform and zernike moments
Li L, Li S, Zhu H, Chu SC, Roddick J, Pan JS (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4:46–56
Li L, Li S, Zhu H, Wu X (2013) Detecting copy-move forgery under affine transforms for image forensics. Computers & Electrical Engineering 40. https://doi.org/10.1016/j.compeleceng.2013.11.034
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507–518. https://doi.org/10.1109/TIFS.2014.2381872
Li L, Li S, Wang, J (2012) Copy-move forgery detection based on pht. In: 2012 World Congress on Information and Communication Technologies, pp 1061–1065. https://doi.org/10.1109/WICT.2012.6409232
Lin C, Wei Z, Sun W, Zeng J, Xu T, Lai JH (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimedia Tools and Applications 77. https://doi.org/10.1007/s11042-017-5027-9
Lin C, Lu W, Huang X, Liu K, Sun W, Lin H (2019) Region duplication detection based on hybrid feature and evaluative clustering. Multimedia Tools Appl 78(15):20739–20763. https://doi.org/10.1007/s11042-019-7342-9
Lin C, Wei Z, Huang X, Liu K, Sun W, Lin H, Tan Z (2019) Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications 78. https://doi.org/10.1007/s11042-018-6922-4
Litjens G, Kooi T, Bejnordi BE, Setio AAA, Ciompi F, Ghafoorian M, Van Der Laak JA, Van Ginneken B, Sánchez CI (2017) A survey on deep learning in medical image analysis. Medical image analysis 42:60–88
Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34:1557–1565. https://doi.org/10.1016/j.jnca.2010.09.001
Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimedia Tools Appl 77(14):18269–18293. https://doi.org/10.1007/s11042-017-5374-6
Liu Y, **a C, Zhu X, Xu S (2022) Two-stage copy-move forgery detection with self deep matching and proposal superglue. IEEE Trans Image Process 31:541–555. https://doi.org/10.1109/TIP.2021.3132828
Liu L, Ni R, Zhao Y, Li S (2014) Improved sift-based copy-move detection using bfsn clustering and cfa features. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 626–629. https://doi.org/10.1109/IIH-MSP.2014.162
Li W, Yu N (2010) Rotation robust detection of copy-move forgery. In: 2010 IEEE International Conference on Image Processing, pp 2113–2116. https://doi.org/10.1109/ICIP.2010.5652519
LoweDavid G (2004) Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision
Lu CS, Liao Hy (2003) Structural digital signature for image authentication: An incidental distortion resistant scheme. Multimedia, IEEE Transactions on 5:161–173. https://doi.org/10.1109/TMM.2003.811621
Mahdian B, Saic S (2007) Saic, s:Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189. https://doi.org/10.1016/j.forsciint.2006.11.002
Mahmood T, Irtaza A, Mehmood Z, Mahmood M (2017) Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Science International Elsevier 279:8–21. https://doi.org/10.1016/j.forsciint.2017.07.037
Mahmood T, Shah M, Rashid J, Saba T, Nisar M, Asif M (2020) A passive technique for detecting copy-move forgeries by image feature matching. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-020-09655-2
Mahmoud K, Husien A (2016) Copy-move forgery detection using zernike and pseudo zernike moments. The International Arab Journal of Information Technology (IAJIT) 13:930–937
Mahmoud K, Husien A (2016) Moment based copy move forgery detection methods. International Journal of Computer Science and Information Security 14:28–35
Malviya A, Ladhake S (2016) Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Computer Science 79:383–390. https://doi.org/10.1016/j.procs.2016.03.050
Meena KB, Tyagi V (2019) A copy-move image forgery detection technique based on gaussian-hermite moments. Multimedia Tools and Applications pp 1 – 22
Meena KB, Tyagi V (2019) Image forgery detection: Survey and future directions pp 163–194. https://doi.org/10.1007/978-981-13-6351-1_14
Meena KB, Tyagi V (2020) A copy-move image forgery detection technique based on tetrolet transform. Journal of Information Security and Applications pp 1 – 9
Meena KB, Tyagi V (2020) A hybrid copy-move image forgery detection technique based on fourier-mellin and scale invariant feature transforms. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-019-08343-0
Mishra P, Mishra N, Sharma S, Patel R (2013) Region duplication forgery detection technique based on surf and hac. The Scientific World Journal 2013:267691. https://doi.org/10.1155/2013/267691
Mohebbian E, Hariri M (2015) Increase the efficiency of dct method for detection of copy-move forgery in complex and smooth images. In: 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), pp 436–440. https://doi.org/10.1109/KBEI.2015.7436084
Muhammad G, Al-Hammadi M, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25:985–995. https://doi.org/10.1007/s00138-013-0547-4
Muzaffer G, Ulutas G (2017) A fast and effective digital image copy move forgery detection with binarized sift. In: 2017 40th International Conference on Telecommunications and Signal Processing (TSP), pp 595–598. https://doi.org/10.1109/TSP.2017.8076056
Muzaffer G, Ulutas G (2019) A new deep learning-based method to detection of copy-move forgery in digital images pp 1–4
Nathalie Diane WN, **ngming S, Moise FK (2014) A survey of partition-based techniques for copy-move forgery detection. The Scientific World Journal 2014
Ng T, Chang S, Lin CY, Sun Q (2006) Passive-blind image forensics. Multimedia Security Technologies for Digital Rights Management. https://doi.org/10.1016/B978-012369476-8/50017-8
Ouyang J, Liu Y, Liao M (2019) Robust copy-move forgery detection method using pyramid model and zernike moments. Multimedia Tools and Applications 78:10207–10225
Ouyang J, Liu Y, Liao M (2017) Copy-move forgery detection based on deep learning. In: 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp 1–5. https://doi.org/10.1109/CISP-BMEI.2017.8301940
P BBM, N AKM (2017) Copy-move forgery detection using segmentation. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp 224–228. https://doi.org/10.1109/ISCO.2017.7855986
Pandey RC, Singh SK, Shukla KK, Agrawal R (2014) Fast and robust passive copy-move forgery detection using surf and sift image features. In: 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp 1–6. https://doi.org/10.1109/ICIINFS.2014.7036519
Pandey R, Agrawal R, Singh S, Shukla K (2014) Passive copy move forgery detection using surf, hog and sift features. Advances in Intelligent Systems and Computing 327:659–666. https://doi.org/10.1007/978-3-319-11933-5_74
Panzade PP, Prakash CS, Maheshkar S (2016) Copy-move forgery detection by using hsv preprocessing and keypoint extraction. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp 264–269. https://doi.org/10.1109/PDGC.2016.7913156
Park JY, Kang TA, Moon YH, Eom IK (2020) Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry 12(4). https://doi.org/10.3390/sym12040492
Park CS, Kim C, Lee J, Kwon GR (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimedia Tools and Applications 75. https://doi.org/10.1007/s11042-016-3575-z
Popescu AC, Farid H (2004) Digital forgeries by detecting duplicated image regions
Popescu A, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53(2):758–767. https://doi.org/10.1109/TSP.2004.839932
Prakash C, Maheshkar S (2017) Copy-move forgery detection using dywt. International Journal of Multimedia Data Engineering and Management 8:1–9. https://doi.org/10.4018/IJMDEM.2017040101
Prasad S, Ramkumar B (2016) Passive copy-move forgery detection using sift, hog and surf features. In: 2016 IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), pp 706–710. https://doi.org/10.1109/RTEICT.2016.7807915
Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security 10(8):1705–1716. https://doi.org/10.1109/TIFS.2015.2423261
Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kolodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670
Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kolodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670
Qiao M, Sung AH, Liu Q, Ribeiro B (2011) A novel approach for detection of copy-move forgery
Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. In: Proceedings of the 12th International Conference on Information Hiding, IH’10, p 51–65. Springer-Verlag, Berlin, Heidelberg
Sadu C, Das PK (2022) A detection method for copy-move forgery attacks in digital images pp 1–6. https://doi.org/10.1109/TENCON55691.2022.9977490
Samir S, Emary E, El-Sayed K, Onsi H (2020) Optimization of a pre-trained alexnet model for detecting and localizing image forgeries. Information 11(5):275
Schneider M, Chang SF (1996) A robust content based digital signature for image authentication. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol 3, pp. 227–230. https://doi.org/10.1109/ICIP.1996.560425
Shahroudnejad A, Rahmati M (2016) Copy-move forgery detection in digital images using affine-sift. In: 2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS), pp 1–5. https://doi.org/10.1109/ICSPIS.2016.7869896
Sharma S, Ghanekar U (2015) A rotationally invariant texture descriptor to detect copy move forgery in medical images. In: 2015 IEEE International Conference on Computational Intelligence Communication Technology, pp 795–798. https://doi.org/10.1109/CICT.2015.88
Shelke NA, Kasana SS (2022) Multiple forgeries identification in digital video based on correlation consistency between entropy coded frames. Multimedia Systems pp 1–14
Shelke NA, Kasana SS (2022) Multiple forgery detection and localization technique for digital video using pct and nbap. Multimedia Tools and Applications 81(16):22731–22759
Shivakumar B, Baboo S (2011) Detection of region duplication forgery in digital images using surf. International Journal of Computer Science Issues 8:199–205
Shivakumar B, Baboo S (2011) Detection of region duplication forgery in digital images using surf. International Journal of Computer Science Issues 8:199–205
Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29. https://doi.org/10.1016/j.jvcir.2015.01.016
Singh RP, Kaur M (2016) Copy move tampering detection techniques: A review. Int J Appl Eng Res 11(5):3610–3615
Singh D, Singh SK (2017) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools and Applications 76(1):953–977
Singh D, Singh SK (2017) Dwt-svd and dct based robust and blind watermarking scheme for copyright protection. Multimedia Tools and Applications 76(11):13001–13024. https://doi.org/10.1007/s11042-016-3706-6
Singh D, Singh SK (2019) Block truncation coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications 78:4197–4215
Singh D, Shivani S, Agarwal S (2013) Quantization-based fragile watermarking using block-wise authentication and pixel-wise recovery scheme for tampered image. International Journal of Image and Graphics 13(02):1340002. https://doi.org/10.1142/S0219467813400020
Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks
Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent Interactive Technologies and Multimedia, pp 111–122. Springer
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789. https://www.sciencedirect.com/science/article/pii/S1047320316300566https://doi.org/10.1016/j.jvcir.2016.04.023
Singh D, Singh SK, Udmale SS (2022) An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability. Multimedia Tools and Applications pp 1–22. https://doi.org/10.1007/s11042-022-13270-8
Soni B, Das P, Thounaojam D (2017) Cmfd:a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12. https://doi.org/10.1049/iet-ipr.2017.0441
Teerakanok S, Uehara T (2019) Copy-move forgery detection: A state-of-the-art technical review and analysis. IEEE Access 7:40550–40568
Thajeel S, Sulong G (2015) A novel approach for detection of copy move forgery using completed robust local binary pattern. Journal of Information Hiding and Multimedia Signal Processing 6:351–364
Tralic D, Rosin PL, Sun X, Grgic S (2014) Detection of duplicated image regions using cellular automata. In: IWSSIP 2014 Proceedings, pp 167–170
Tyagi V (2018). Understanding Digital Image Processing. https://doi.org/10.1201/9781315123905
Uliyan DM, Jalab HA, Abdul Wahab AW (2015) Copy move image forgery detection using hessian and center symmetric local binary pattern. In: 2015 IEEE Conference on Open Systems (ICOS), pp 7–11. https://doi.org/10.1109/ICOS.2015.7377269
Uliyan D, Jalab H, Wahid A, Sadeghi S (2016) Image region duplication forgery detection based on angular radial partitioning and harris key-points. Symmetry 8:62. https://doi.org/10.3390/sym8070062
Wang xy, Liu Yn, Xu H, Wang P, Yang Hy, (2018) Robust copy-move forgery detection using quaternion exponent moments. Pattern Anal Applic 21. https://doi.org/10.1007/s10044-016-0588-1
Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2007) An image quality evaluation method based on digital watermarking. IEEE Transactions on Circuits and Systems for Video Technology 17(1):98–105. https://doi.org/10.1109/TCSVT.2006.887086
Wang X, He G, Tang C, Han Y, Wang S (2015) Keypoints-based image passive forensics method for copy-move attacks. Int J Pattern Recognit Artif Intell 30. https://doi.org/10.1142/S0218001416550089
Wang H, Wang HX, Sun XM, Qian Q (2017) A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multimedia Tools and Applications 76. https://doi.org/10.1007/s11042-016-3687-5
Wang Y, Kang X, Chen, Y (2020) Robust and accurate detection of image copy-move forgery using pcet-svd and histogram of block similarity measures. Journal of Information Security and Applications 54:102536. https://www.sciencedirect.com/science/article/pii/S2214212619307525https://doi.org/10.1016/j.jisa.2020.102536
Wang Y, Tian L, Li C (2017) Lbp-svd based copy move forgery detection algorithm. In: 2017 IEEE International Symposium on Multimedia (ISM), pp 553–556. https://doi.org/10.1109/ISM.2017.108
Warbhe A, Dharaskar R, Thakare VM (2016) A scaling robust copy-paste tampering detection for digital image forensics. Procedia Computer Science 79:458–465. https://doi.org/10.1016/j.procs.2016.03.059
Warbhe AD, Dharaskar R, Thakare V (2016) A survey on keypoint based copy-paste forgery detection techniques. Procedia Computer Science 78:61–67
Wenchang S, Fei Z, Bo Q, Bin L (2016) Improving image copy-move forgery detection with particle swarm optimization techniques. China Communications 13(1):139–149. https://doi.org/10.1109/CC.2016.7405711
Wen B, Zhu Y, Subramanian R, Ng TT, Shen X, Winkler S (2016) Coverage – a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp 161–165. https://doi.org/10.1109/ICIP.2016.7532339
Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: Detecting copy-move image forgery with source/target localization pp 168–184
Wu Y, Abd-Almageed W, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network. In: 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp 1907–1915. https://doi.org/10.1109/WACV.2018.00211
Yang B, Sun X, **n X, Hu W, Wu Y (2015) Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression. Journal of Electronic Imaging 24(6):1–11. https://doi.org/10.1117/1.JEI.24.6.063016
Yang F, Li J, Wei Z, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83. https://doi.org/10.1016/j.engappai.2016.12.022
Yang P, Yang G, Zhang D (2016) Rotation invariant local binary pattern for blind detection of copy-move forgery with affine transform pp. 404–416. https://doi.org/10.1007/978-3-319-48674-1_36
Yu L, Han Q, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications 75:1159–1176. https://doi.org/10.1007/s11042-014-2362-y
Yuan Y, Zhang Y, Chen S, Wang H (2017) Robust region duplication detection on log-polar domain using band limitation. Arabian Journal for Science & Engineering 42:559–565. https://doi.org/10.1007/s13369-016-2268-2
Zhang Q, Yang LT, Chen Z, Li P (2018) A survey on deep learning for big data. Information Fusion 42:146–157
Zhang Z, Wang C, Zhou X (2018) A survey on passive image copy-move forgery detection. Journal of Information Processing Systems 14(1):6–31
Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on dct and svd. Forensic Sci Int 233:158–66. https://doi.org/10.1016/j.forsciint.2013.09.013
Zhao J, Zhao W (2013) Passive forensics for region duplication image forgery based on harris feature points and local binary patterns. Math Probl Eng 2013:1–12. https://doi.org/10.1155/2013/619564
Zhao F, Shi W, Qin b, Liang B (2016) Analysis of SIFT method based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection. pp 478–490. https://doi.org/10.1007/978-3-319-49148-6_39
Zhong J, Gan Y (2015) Detection of copy-move forgery using discrete analytical fourier-mellin transform. Nonlinear Dynamics 84. https://doi.org/10.1007/s11071-015-2374-9
Zhong J, Gan Y, Janson Y, LIN P, (2016) Copy move forgery image detection via discrete radon and polar complex exponential transform based moment invariant features. International Journal of Pattern Recognition and Artificial Intelligence 31. https://doi.org/10.1142/S0218001417540052
Zhong J, Gan Y, Young J, Huang L, Lin P (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools and Applications 76. https://doi.org/10.1007/s11042-016-4201-9
Zhou Zp, Zhang Xx (2010) Image splicing detection based on image quality and analysis of variance. In: 2010 2nd International Conference on Education Technology and Computer, vol 4, pp V4–242–V4–246. https://doi.org/10.1109/ICETC.2010.5529692
Zhu Y, Chen C, Yan G, Guo Y, Dong Y (2020) Ar-net: Adaptive attention and residual refinement network for copy-move forgery detection. IEEE Transactions on Industrial Informatics 16(10):6714–6723. https://doi.org/10.1109/TII.2020.2982705
Funding
This work was supported by Faculty Initiation Grant of PDPM Indian Institute of Information Technology Design and Manufacturing Jabalpur, India
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Informed consent
Informed consent was obtained from all individual participants included in the study
Conflict of interest
The authors declare that they have no competing interests
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Verma, M., Singh, D. Survey on image copy-move forgery detection. Multimed Tools Appl 83, 23761–23797 (2024). https://doi.org/10.1007/s11042-023-16455-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16455-x