Log in

Survey on image copy-move forgery detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this digital era, a huge amount of images are flooding the internet, which is extensively used for digital communications, and are also regarded as a significant source of information in many fields. However, the images can be easily altered without leaving any traces due to the availability of digital image editing softwares. Hence, it becomes essential to validate the integrity of the images. One of the most serious and popular tampering procedures is Copy Move Forgery (CMF), wherein some portion of an image is copied and pasted to another region in the same image. This paper reviews recent state-of-the-art copy-move forgery detection (CMFD) schemes along with their pros, and cons with the help of tables for better readability. In addition, this paper enlists the performance evaluation criteria and different image datasets used for CMFD, along with their merits and demerits. At last, this review addresses the various issues, challenges, and future directions in the field of CMFD. This survey paper aims to provide researchers with a broad perspective on the various aspects of advancements in CMFD techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of data and materials

Data is available from the authors upon reasonable request

References

  1. Abd Warif N, Wahid A, Idris M, Ramli R, Salleh R, Band S, Choo KKR (2016) Copy-move forgery detection: Survey, challenges and future directions. J Netw Comput Appl 75. https://doi.org/10.1016/j.jnca.2016.09.008

  2. Abd Warif N, Wahid A, Idris M, Salleh R, Othman F (2017) Sift-symmetry: A robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46. https://doi.org/10.1016/j.jvcir.2017.04.004

  3. Agarwal V, Mane V (2016) Reflective sift for improving the detection of copy-move image forgery. In: 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp 84–88. https://doi.org/10.1109/ICRCICN.2016.7813636

  4. Alhussein M (2016) Image tampering detection based on local texture descriptor and extreme learning machine. In: 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim), pp 196–199. https://doi.org/10.1109/UKSim.2016.39

  5. Alkawaz MH, Sulong G, Saba T, Rehman A (2016) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Applic 30:183–192

    Article  Google Scholar 

  6. Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International 231(1):284–295

    Article  PubMed  Google Scholar 

  7. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6(3):1099–1110. https://doi.org/10.1109/TIFS.2011.2129512

    Article  Google Scholar 

  8. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Processing: Image Communication 28:659–669. https://doi.org/10.1016/j.image.2013.03.006

    Article  Google Scholar 

  9. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2010) Geometric tampering estimation by means of a sift-based forensic analysis. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp 1702–1705. https://doi.org/10.1109/ICASSP.2010.5495485

  10. Anand V, Hashmi MF, Keskar A (2014) In: A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods, vol 8397 pp 530–542. https://doi.org/10.1007/978-3-319-05476-6_54

  11. Ansari MD, Ghrera SP, Tyagi V (2014) Pixel-based image forgery detection: A review. IETE journal of education 55(1):40–46

    Article  Google Scholar 

  12. Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensics and Security 10(10):2084–2094. https://doi.org/10.1109/TIFS.2015.2445742

    Article  Google Scholar 

  13. Ardizzone E, Bruno A, Mazzola G (2010) Detecting multiple copies in tampered images. In: 2010 IEEE International Conference on Image Processing, pp 2117–2120. https://doi.org/10.1109/ICIP.2010.5652490

  14. Arnold M, Wolthusen S, Schmucker M (2003) Techniques and applications of digital watermarking and content protection. Facts and Models, Psychoacoustics

    Google Scholar 

  15. Badr A, Youssif A, Wafi M (2020) A robust copy-move forgery detection in digital image forensics using surf. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp 1–6. https://doi.org/10.1109/ISDFS49300.2020.9116433

  16. Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) Patchmatch: a randomized correspondence algorithm for structural image editing. ACM Trans. Graph. 28:24

    Article  Google Scholar 

  17. Barni M, Phan QT, Tondi B (2021) Copy move source-target disambiguation through multi-branch cnns. IEEE Transactions on Information Forensics and Security 16:1825–1840. https://doi.org/10.1109/TIFS.2020.3045903

    Article  Google Scholar 

  18. Bayram S, Taha Sencar H, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp 1053–1056. https://doi.org/10.1109/ICASSP.2009.4959768

  19. Bi XL, Pun CM, Yuan X (2016) Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci 345:226–242

    Article  Google Scholar 

  20. bin Y, **ngming S, Guo H, **a Z, Chen X, (2018) A copy-move forgery detection method based on cmfd-sift. Multimedia Tools and Applications 77. https://doi.org/10.1007/s11042-016-4289-y

  21. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Digital investigation 10(3):226–245

    Article  Google Scholar 

  22. Cao G, Chen Y, Zong G, Chen Y (2015) Detection of copy-move forgery in digital image using locality preserving projections. In: 2015 8th International Congress on Image and Signal Processing (CISP), pp 599–603. https://doi.org/10.1109/CISP.2015.7407949

  23. Chauhan D, Kasat D, Jain S, Thakare VM (2016) Survey on keypoint based copy-move forgery detection methods on image. Procedia Computer Science 85:206–212. https://doi.org/10.1016/j.procs.2016.05.213

    Article  Google Scholar 

  24. chen He D, Wang L (1990) Texture unit, texture spectrum, and texture analysis. IEEE Trans Geosci Remote Sens 28(4):509–512. https://doi.org/10.1109/TGRS.1990.572934

    Article  ADS  Google Scholar 

  25. Chen CC, Lu WY, Chou CH (2019) Rotational copy-move forgery detection using sift and region growing strategies. Multimedia Tools and Applications 78:1–16. https://doi.org/10.1007/s11042-019-7165-8

    Article  Google Scholar 

  26. Chen B, Tan W, Coatrieux G, Zheng Y, Shi YQ (2021) A serial image copy-move forgery localization scheme with source/target distinguishment. IEEE Transactions on Multimedia 23:3506–3517. https://doi.org/10.1109/TMM.2020.3026868

    Article  Google Scholar 

  27. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6):1841–1854

    Article  Google Scholar 

  28. Copy-move forgery detection using swt-dct and four square mean features. In: Proceeding of 2019 International Conference on Electrical Engineering and Informatics, ICEEI 2019, Proceedings of the International Conference on Electrical Engineering and Informatics, pp 63–68. Institute of Electrical and Electronics Engineers Inc., United States (2019). Publisher Copyright: 2019 IEEE.; 7th International Conference on Electrical Engineering and Informatics, ICEEI 2019 ; Conference date: 09-07-2019 Through 10-07-2019. https://doi.org/10.1109/ICEEI47359.2019.8988905

  29. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) In: Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (eds) Digital Watermarking and Steganography (Second Edition), The Morgan Kaufmann Series in Multimedia Information and Systems, second edition edn., pp 105–135. Morgan Kaufmann, Burlington

  30. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Transactions on Information Forensics and Security 10(11):2284–2297. https://doi.org/10.1109/TIFS.2015.2455334

    Article  Google Scholar 

  31. Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: 2014 IEEE International Conference on Image Processing (ICIP), pp 5312–5316 . https://doi.org/10.1109/ICIP.2014.7026075

  32. Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231:61–72. https://doi.org/10.1016/j.forsciint.2013.04.023

    Article  PubMed  Google Scholar 

  33. de Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security 8(7):1182–1194. https://doi.org/10.1109/TIFS.2013.2265677

    Article  Google Scholar 

  34. Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising swt-svd. IET Image Processing 11. https://doi.org/10.1049/iet-ipr.2016.0537

  35. Doegar A, Dutta M, Gaurav K (2019) Cnn based image forgery detection using pre-trained alexnet model. International Journal of Computational Intelligence & IoT 2(1)

  36. Du ZL, Li XL, Jiao LX, Shen K (2012) Region duplication blind detection based on multiple feature combination. In: 2012 International Conference on Machine Learning and Cybernetics, vol 1, pp 17–21. https://doi.org/10.1109/ICMLC.2012.6358879

  37. El Biach FZ, Iala I, Laanaya H, Minaoui K (2022) Encoder-decoder based convolutional neural networks for image forgery detection. Multimedia Tools Appl 81(16):22611–22628. https://doi.org/10.1007/s11042-020-10158-3

    Article  Google Scholar 

  38. Elaskily M, Elnemr H, Sedik A, Dessouky M, El Banby G, Elaskily O, Khalaf AAM, Aslan H, Faragallah O, Abd El-Samie F, Elshakankiry O (2020) A novel deep learning framework for copy-move forgery detection in images. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-020-08751-7

  39. Emam M, Han Q, Niu X (2015) Pcet based copy-move forgery detection in images under geometric transforms. Multimedia Tools and Applications 75:11513–11527

    Article  Google Scholar 

  40. Emam M, Han Q, Zhang H (2017) Two-stage keypoint detection scheme for region duplication forgery detection in digital images. J Forensic Sci 63. https://doi.org/10.1111/1556-4029.13456

  41. Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection. In: 2014 IEEE Visual Communications and Image Processing Conference, pp 253–257. https://doi.org/10.1109/VCIP.2014.7051552

  42. Fischler MA, Bolles RC (1981) Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6):381–395. https://doi.org/10.1145/358669.358692

    Article  MathSciNet  Google Scholar 

  43. Fridrich J, Soukal D, Lukás J (2003) Detection of copy-move forgery in digital images. Int J Comput Sci Issues 3:55–61

    Google Scholar 

  44. Gençtürk B, Ulutas G, Ulutas M, Nabiyev V (2016) A new copy move forgery detection technique with automatic threshold determination. AEU - International Journal of Electronics and Communications 70. https://doi.org/10.1016/j.aeue.2016.05.005

  45. Ghorbani M, Firouzmand M, Faraahi A (2011) Dwt-dct (qcd) based copy-move image forgery detection. In: 2011 18th International Conference on Systems, Signals and Image Processing, pp 1–4

  46. Ghulam M, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9:49–57

    Article  Google Scholar 

  47. Hegazi A, Taha A, Selim M (2020) Copy-move forgery detection based on automatic threshold estimation. International Journal of Sociotechnology and Knowledge Development 12:1–23. https://doi.org/10.4018/IJSKD.2020010101

    Article  Google Scholar 

  48. Hosny KM, Mortda AM, Fouda MM, Lashin NA (2022) An efficient cnn model to detect copy-move image forgery. IEEE Access 10:48622–48632. https://doi.org/10.1109/ACCESS.2022.3172273

    Article  Google Scholar 

  49. Hosny K, Hamza H, Lashin N (2018) Copy-move forgery detection of duplicated objects using accurate pcet moments and morphological operators. The Imaging Science Journal pp 1–16. https://doi.org/10.1080/13682199.2018.1461345

  50. Hsu YF, Chang S (2011) Camera response functions for image forensics: An automatic algorithm for splicing detection. Information Forensics and Security, IEEE Transactions on 5:816–825. https://doi.org/10.1109/TIFS.2010.2077628

    Article  Google Scholar 

  51. Huang Y, Wei Z, Sun W, Long D (2011) Improved dct-based detection of copy-move forgery in images. Forensic Sci Int 206:178–84. https://doi.org/10.1016/j.forsciint.2010.08.001

    Article  PubMed  Google Scholar 

  52. Huang DY, Huang CN, Hu WC, Chou CH (2017) Robustness of copy-move forgery detection under high jpeg compression artifacts. Multimedia Tools and Applications 76:1509–1530. https://doi.org/10.1007/s11042-015-3152-x

    Article  Google Scholar 

  53. Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using sift algorithm. In: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol 2, pp 272–276. https://doi.org/10.1109/PACIIA.2008.240

  54. Hussain M, Muhammad G, Saleh SQ, Mirza AM, Bebis G (2012) Copy-move image forgery detection using multi-resolution weber descriptors. In: 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems, pp 395–401 . https://doi.org/10.1109/SITIS.2012.64

  55. Hussain M, Saleh SQ, Aboalsamh H, Muhammad G, Bebis G (2014) Comparison between wld and lbp descriptors for non-intrusive image forgery detection. In: 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings, pp 197–204 . https://doi.org/10.1109/INISTA.2014.6873618

  56. İmamoğlu MB, Ulutaş G, Ulutaş M (2013) Detection of copy-move forgery using krawtchouk moment. In: 2013 8th International Conference on Electrical and Electronics Engineering (ELECO), pp 311–314. https://doi.org/10.1109/ELECO.2013.6713851

  57. Isaac M, Wilscy M (2015) Copy-move forgery detection based on harris corner points and brisk. pp 394–399. https://doi.org/10.1145/2791405.2791453

  58. ** G, Wan X (2017) An improved method for sift-based copy-move forgery detection using non-maximum value suppression and optimized j-linkage. Signal Processing: Image Communication 57. https://doi.org/10.1016/j.image.2017.05.010

  59. Jwaid MF, Baraskar TN (2017) Detection of copy-move image forgery using local binary pattern with discrete wavelet transform and principle component analysis. In: 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), pp 1–6. https://doi.org/10.1109/ICCUBEA.2017.8463695

  60. Kakar P, Sudha N (2012) Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Transactions on Information Forensics and Security 7(3):1018–1028. https://doi.org/10.1109/TIFS.2012.2188390

    Article  Google Scholar 

  61. Kalsi DK, Rai P (2017) A copy-move forgery detection system using approximation image local binary pattern. In: 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), pp 284–288. https://doi.org/10.1109/RISE.2017.8378168

  62. Karsh RK, Das A, Swetha GL, Medhi A, Laskar RH, Arya U, Agarwal RK (2016) Copy-move forgery detection using asift. In: 2016 1st India International Conference on Information Processing (IICIP), pp 1–5. https://doi.org/10.1109/IICIP.2016.7975329

  63. Kashyap A, Agarwal M, Gupta H (2017) Detection of copy-move image forgery using svd and cuckoo search algorithm. International Journal of Engineering and Technology(UAE) 7. https://doi.org/10.14419/ijet.v7i2.13.11604

  64. Ketenci S, Ulutas G (2013) Copy-move forgery detection in images via 2d-fourier transform. In: 2013 36th International Conference on Telecommunications and Signal Processing (TSP), pp 813–816. https://doi.org/10.1109/TSP.2013.6614051

  65. Khayeat ARH, Sun X, Rosin PL (2015) Improved dsift descriptor based copy-rotate-move forgery detection. In: PSIVT

  66. Kirchner M, Schöttle P, Riess C (2015) Thinking beyond the block: Block matching for copy-move forgery detection revisited. Proceedings of SPIE - The International Society for Optical Engineering 9409. https://doi.org/10.1117/12.2082789

  67. Kotsiantis SB (2007) Supervised machine learning: A review of classification techniques. In: Proceedings of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in EHealth, HCI, Information Retrieval and Pervasive Technologies, p 3–24. IOS Press, NLD

  68. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Proceedings of the 25th International Conference on Neural Information Processing Systems - vol 1, NIPS’12, p 1097–1105. Curran Associates Inc., Red Hook, NY, USA

  69. Kumar S, Desa JV, Mukherjee S (2016) A fast keypoint based hybrid method for copy move forgery detection. ar**v:1612.03989

  70. Kumari R, Garg H (2023) An image copy-move forgery detection based on surf and fourier-mellin transforms pp 515–519. https://doi.org/10.1109/AISC56616.2023.10085429

  71. Kushol R, Salekin MS, Kabir MH, Khan AA (2016) Copy-move forgery detection using color space and moment invariants-based features. In: 2016 International Conference on Digital Image Computing: Techniques and Applications (DICTA), pp 1–6. https://doi.org/10.1109/DICTA.2016.7797027

  72. Le-Tien T (2016) Luong THKLPCHATHM. Block based technique for detecting copy-move digital image forgeries, Wavelet transform and zernike moments

    Google Scholar 

  73. Li L, Li S, Zhu H, Chu SC, Roddick J, Pan JS (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4:46–56

    Google Scholar 

  74. Li L, Li S, Zhu H, Wu X (2013) Detecting copy-move forgery under affine transforms for image forensics. Computers & Electrical Engineering 40. https://doi.org/10.1016/j.compeleceng.2013.11.034

  75. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507–518. https://doi.org/10.1109/TIFS.2014.2381872

    Article  Google Scholar 

  76. Li L, Li S, Wang, J (2012) Copy-move forgery detection based on pht. In: 2012 World Congress on Information and Communication Technologies, pp 1061–1065. https://doi.org/10.1109/WICT.2012.6409232

  77. Lin C, Wei Z, Sun W, Zeng J, Xu T, Lai JH (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimedia Tools and Applications 77. https://doi.org/10.1007/s11042-017-5027-9

  78. Lin C, Lu W, Huang X, Liu K, Sun W, Lin H (2019) Region duplication detection based on hybrid feature and evaluative clustering. Multimedia Tools Appl 78(15):20739–20763. https://doi.org/10.1007/s11042-019-7342-9

    Article  Google Scholar 

  79. Lin C, Wei Z, Huang X, Liu K, Sun W, Lin H, Tan Z (2019) Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications 78. https://doi.org/10.1007/s11042-018-6922-4

  80. Litjens G, Kooi T, Bejnordi BE, Setio AAA, Ciompi F, Ghafoorian M, Van Der Laak JA, Van Ginneken B, Sánchez CI (2017) A survey on deep learning in medical image analysis. Medical image analysis 42:60–88

    Article  PubMed  Google Scholar 

  81. Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34:1557–1565. https://doi.org/10.1016/j.jnca.2010.09.001

    Article  Google Scholar 

  82. Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimedia Tools Appl 77(14):18269–18293. https://doi.org/10.1007/s11042-017-5374-6

    Article  Google Scholar 

  83. Liu Y, **a C, Zhu X, Xu S (2022) Two-stage copy-move forgery detection with self deep matching and proposal superglue. IEEE Trans Image Process 31:541–555. https://doi.org/10.1109/TIP.2021.3132828

    Article  ADS  PubMed  Google Scholar 

  84. Liu L, Ni R, Zhao Y, Li S (2014) Improved sift-based copy-move detection using bfsn clustering and cfa features. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 626–629. https://doi.org/10.1109/IIH-MSP.2014.162

  85. Li W, Yu N (2010) Rotation robust detection of copy-move forgery. In: 2010 IEEE International Conference on Image Processing, pp 2113–2116. https://doi.org/10.1109/ICIP.2010.5652519

  86. LoweDavid G (2004) Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision

  87. Lu CS, Liao Hy (2003) Structural digital signature for image authentication: An incidental distortion resistant scheme. Multimedia, IEEE Transactions on 5:161–173. https://doi.org/10.1109/TMM.2003.811621

    Article  Google Scholar 

  88. Mahdian B, Saic S (2007) Saic, s:Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189. https://doi.org/10.1016/j.forsciint.2006.11.002

    Article  PubMed  Google Scholar 

  89. Mahmood T, Irtaza A, Mehmood Z, Mahmood M (2017) Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Science International Elsevier 279:8–21. https://doi.org/10.1016/j.forsciint.2017.07.037

    Article  Google Scholar 

  90. Mahmood T, Shah M, Rashid J, Saba T, Nisar M, Asif M (2020) A passive technique for detecting copy-move forgeries by image feature matching. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-020-09655-2

  91. Mahmoud K, Husien A (2016) Copy-move forgery detection using zernike and pseudo zernike moments. The International Arab Journal of Information Technology (IAJIT) 13:930–937

    Google Scholar 

  92. Mahmoud K, Husien A (2016) Moment based copy move forgery detection methods. International Journal of Computer Science and Information Security 14:28–35

    Google Scholar 

  93. Malviya A, Ladhake S (2016) Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Computer Science 79:383–390. https://doi.org/10.1016/j.procs.2016.03.050

    Article  Google Scholar 

  94. Meena KB, Tyagi V (2019) A copy-move image forgery detection technique based on gaussian-hermite moments. Multimedia Tools and Applications pp 1 – 22

  95. Meena KB, Tyagi V (2019) Image forgery detection: Survey and future directions pp 163–194. https://doi.org/10.1007/978-981-13-6351-1_14

  96. Meena KB, Tyagi V (2020) A copy-move image forgery detection technique based on tetrolet transform. Journal of Information Security and Applications pp 1 – 9

  97. Meena KB, Tyagi V (2020) A hybrid copy-move image forgery detection technique based on fourier-mellin and scale invariant feature transforms. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-019-08343-0

  98. Mishra P, Mishra N, Sharma S, Patel R (2013) Region duplication forgery detection technique based on surf and hac. The Scientific World Journal 2013:267691. https://doi.org/10.1155/2013/267691

    Article  PubMed  PubMed Central  Google Scholar 

  99. Mohebbian E, Hariri M (2015) Increase the efficiency of dct method for detection of copy-move forgery in complex and smooth images. In: 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), pp 436–440. https://doi.org/10.1109/KBEI.2015.7436084

  100. Muhammad G, Al-Hammadi M, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25:985–995. https://doi.org/10.1007/s00138-013-0547-4

    Article  Google Scholar 

  101. Muzaffer G, Ulutas G (2017) A fast and effective digital image copy move forgery detection with binarized sift. In: 2017 40th International Conference on Telecommunications and Signal Processing (TSP), pp 595–598. https://doi.org/10.1109/TSP.2017.8076056

  102. Muzaffer G, Ulutas G (2019) A new deep learning-based method to detection of copy-move forgery in digital images pp 1–4

  103. Nathalie Diane WN, **ngming S, Moise FK (2014) A survey of partition-based techniques for copy-move forgery detection. The Scientific World Journal 2014

  104. Ng T, Chang S, Lin CY, Sun Q (2006) Passive-blind image forensics. Multimedia Security Technologies for Digital Rights Management. https://doi.org/10.1016/B978-012369476-8/50017-8

  105. Ouyang J, Liu Y, Liao M (2019) Robust copy-move forgery detection method using pyramid model and zernike moments. Multimedia Tools and Applications 78:10207–10225

    Article  Google Scholar 

  106. Ouyang J, Liu Y, Liao M (2017) Copy-move forgery detection based on deep learning. In: 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp 1–5. https://doi.org/10.1109/CISP-BMEI.2017.8301940

  107. P BBM, N AKM (2017) Copy-move forgery detection using segmentation. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp 224–228. https://doi.org/10.1109/ISCO.2017.7855986

  108. Pandey RC, Singh SK, Shukla KK, Agrawal R (2014) Fast and robust passive copy-move forgery detection using surf and sift image features. In: 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp 1–6. https://doi.org/10.1109/ICIINFS.2014.7036519

  109. Pandey R, Agrawal R, Singh S, Shukla K (2014) Passive copy move forgery detection using surf, hog and sift features. Advances in Intelligent Systems and Computing 327:659–666. https://doi.org/10.1007/978-3-319-11933-5_74

    Article  Google Scholar 

  110. Panzade PP, Prakash CS, Maheshkar S (2016) Copy-move forgery detection by using hsv preprocessing and keypoint extraction. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp 264–269. https://doi.org/10.1109/PDGC.2016.7913156

  111. Park JY, Kang TA, Moon YH, Eom IK (2020) Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry 12(4). https://doi.org/10.3390/sym12040492

  112. Park CS, Kim C, Lee J, Kwon GR (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimedia Tools and Applications 75. https://doi.org/10.1007/s11042-016-3575-z

  113. Popescu AC, Farid H (2004) Digital forgeries by detecting duplicated image regions

  114. Popescu A, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53(2):758–767. https://doi.org/10.1109/TSP.2004.839932

    Article  ADS  MathSciNet  Google Scholar 

  115. Prakash C, Maheshkar S (2017) Copy-move forgery detection using dywt. International Journal of Multimedia Data Engineering and Management 8:1–9. https://doi.org/10.4018/IJMDEM.2017040101

    Article  Google Scholar 

  116. Prasad S, Ramkumar B (2016) Passive copy-move forgery detection using sift, hog and surf features. In: 2016 IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), pp 706–710. https://doi.org/10.1109/RTEICT.2016.7807915

  117. Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security 10(8):1705–1716. https://doi.org/10.1109/TIFS.2015.2423261

    Article  Google Scholar 

  118. Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kolodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670

    Article  Google Scholar 

  119. Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kolodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670

    Article  Google Scholar 

  120. Qiao M, Sung AH, Liu Q, Ribeiro B (2011) A novel approach for detection of copy-move forgery

  121. Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. In: Proceedings of the 12th International Conference on Information Hiding, IH’10, p 51–65. Springer-Verlag, Berlin, Heidelberg

  122. Sadu C, Das PK (2022) A detection method for copy-move forgery attacks in digital images pp 1–6. https://doi.org/10.1109/TENCON55691.2022.9977490

  123. Samir S, Emary E, El-Sayed K, Onsi H (2020) Optimization of a pre-trained alexnet model for detecting and localizing image forgeries. Information 11(5):275

    Article  Google Scholar 

  124. Schneider M, Chang SF (1996) A robust content based digital signature for image authentication. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol 3, pp. 227–230. https://doi.org/10.1109/ICIP.1996.560425

  125. Shahroudnejad A, Rahmati M (2016) Copy-move forgery detection in digital images using affine-sift. In: 2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS), pp 1–5. https://doi.org/10.1109/ICSPIS.2016.7869896

  126. Sharma S, Ghanekar U (2015) A rotationally invariant texture descriptor to detect copy move forgery in medical images. In: 2015 IEEE International Conference on Computational Intelligence Communication Technology, pp 795–798. https://doi.org/10.1109/CICT.2015.88

  127. Shelke NA, Kasana SS (2022) Multiple forgeries identification in digital video based on correlation consistency between entropy coded frames. Multimedia Systems pp 1–14

  128. Shelke NA, Kasana SS (2022) Multiple forgery detection and localization technique for digital video using pct and nbap. Multimedia Tools and Applications 81(16):22731–22759

    Article  Google Scholar 

  129. Shivakumar B, Baboo S (2011) Detection of region duplication forgery in digital images using surf. International Journal of Computer Science Issues 8:199–205

    Google Scholar 

  130. Shivakumar B, Baboo S (2011) Detection of region duplication forgery in digital images using surf. International Journal of Computer Science Issues 8:199–205

    Google Scholar 

  131. Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29. https://doi.org/10.1016/j.jvcir.2015.01.016

  132. Singh RP, Kaur M (2016) Copy move tampering detection techniques: A review. Int J Appl Eng Res 11(5):3610–3615

    Google Scholar 

  133. Singh D, Singh SK (2017) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools and Applications 76(1):953–977

    Article  Google Scholar 

  134. Singh D, Singh SK (2017) Dwt-svd and dct based robust and blind watermarking scheme for copyright protection. Multimedia Tools and Applications 76(11):13001–13024. https://doi.org/10.1007/s11042-016-3706-6

    Article  Google Scholar 

  135. Singh D, Singh SK (2019) Block truncation coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications 78:4197–4215

    Article  Google Scholar 

  136. Singh D, Shivani S, Agarwal S (2013) Quantization-based fragile watermarking using block-wise authentication and pixel-wise recovery scheme for tampered image. International Journal of Image and Graphics 13(02):1340002. https://doi.org/10.1142/S0219467813400020

    Article  Google Scholar 

  137. Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks

  138. Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent Interactive Technologies and Multimedia, pp 111–122. Springer

  139. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789. https://www.sciencedirect.com/science/article/pii/S1047320316300566https://doi.org/10.1016/j.jvcir.2016.04.023

  140. Singh D, Singh SK, Udmale SS (2022) An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability. Multimedia Tools and Applications pp 1–22. https://doi.org/10.1007/s11042-022-13270-8

  141. Soni B, Das P, Thounaojam D (2017) Cmfd:a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12. https://doi.org/10.1049/iet-ipr.2017.0441

  142. Teerakanok S, Uehara T (2019) Copy-move forgery detection: A state-of-the-art technical review and analysis. IEEE Access 7:40550–40568

  143. Thajeel S, Sulong G (2015) A novel approach for detection of copy move forgery using completed robust local binary pattern. Journal of Information Hiding and Multimedia Signal Processing 6:351–364

    Google Scholar 

  144. Tralic D, Rosin PL, Sun X, Grgic S (2014) Detection of duplicated image regions using cellular automata. In: IWSSIP 2014 Proceedings, pp 167–170

  145. Tyagi V (2018). Understanding Digital Image Processing. https://doi.org/10.1201/9781315123905

  146. Uliyan DM, Jalab HA, Abdul Wahab AW (2015) Copy move image forgery detection using hessian and center symmetric local binary pattern. In: 2015 IEEE Conference on Open Systems (ICOS), pp 7–11. https://doi.org/10.1109/ICOS.2015.7377269

  147. Uliyan D, Jalab H, Wahid A, Sadeghi S (2016) Image region duplication forgery detection based on angular radial partitioning and harris key-points. Symmetry 8:62. https://doi.org/10.3390/sym8070062

    Article  ADS  MathSciNet  Google Scholar 

  148. Wang xy, Liu Yn, Xu H, Wang P, Yang Hy, (2018) Robust copy-move forgery detection using quaternion exponent moments. Pattern Anal Applic 21. https://doi.org/10.1007/s10044-016-0588-1

  149. Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2007) An image quality evaluation method based on digital watermarking. IEEE Transactions on Circuits and Systems for Video Technology 17(1):98–105. https://doi.org/10.1109/TCSVT.2006.887086

    Article  Google Scholar 

  150. Wang X, He G, Tang C, Han Y, Wang S (2015) Keypoints-based image passive forensics method for copy-move attacks. Int J Pattern Recognit Artif Intell 30. https://doi.org/10.1142/S0218001416550089

  151. Wang H, Wang HX, Sun XM, Qian Q (2017) A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multimedia Tools and Applications 76. https://doi.org/10.1007/s11042-016-3687-5

  152. Wang Y, Kang X, Chen, Y (2020) Robust and accurate detection of image copy-move forgery using pcet-svd and histogram of block similarity measures. Journal of Information Security and Applications 54:102536. https://www.sciencedirect.com/science/article/pii/S2214212619307525https://doi.org/10.1016/j.jisa.2020.102536

  153. Wang Y, Tian L, Li C (2017) Lbp-svd based copy move forgery detection algorithm. In: 2017 IEEE International Symposium on Multimedia (ISM), pp 553–556. https://doi.org/10.1109/ISM.2017.108

  154. Warbhe A, Dharaskar R, Thakare VM (2016) A scaling robust copy-paste tampering detection for digital image forensics. Procedia Computer Science 79:458–465. https://doi.org/10.1016/j.procs.2016.03.059

    Article  Google Scholar 

  155. Warbhe AD, Dharaskar R, Thakare V (2016) A survey on keypoint based copy-paste forgery detection techniques. Procedia Computer Science 78:61–67

    Article  Google Scholar 

  156. Wenchang S, Fei Z, Bo Q, Bin L (2016) Improving image copy-move forgery detection with particle swarm optimization techniques. China Communications 13(1):139–149. https://doi.org/10.1109/CC.2016.7405711

    Article  Google Scholar 

  157. Wen B, Zhu Y, Subramanian R, Ng TT, Shen X, Winkler S (2016) Coverage – a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp 161–165. https://doi.org/10.1109/ICIP.2016.7532339

  158. Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: Detecting copy-move image forgery with source/target localization pp 168–184

  159. Wu Y, Abd-Almageed W, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network. In: 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp 1907–1915. https://doi.org/10.1109/WACV.2018.00211

  160. Yang B, Sun X, **n X, Hu W, Wu Y (2015) Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression. Journal of Electronic Imaging 24(6):1–11. https://doi.org/10.1117/1.JEI.24.6.063016

    Article  Google Scholar 

  161. Yang F, Li J, Wei Z, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83. https://doi.org/10.1016/j.engappai.2016.12.022

    Article  Google Scholar 

  162. Yang P, Yang G, Zhang D (2016) Rotation invariant local binary pattern for blind detection of copy-move forgery with affine transform pp. 404–416. https://doi.org/10.1007/978-3-319-48674-1_36

  163. Yu L, Han Q, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications 75:1159–1176. https://doi.org/10.1007/s11042-014-2362-y

    Article  Google Scholar 

  164. Yuan Y, Zhang Y, Chen S, Wang H (2017) Robust region duplication detection on log-polar domain using band limitation. Arabian Journal for Science & Engineering 42:559–565. https://doi.org/10.1007/s13369-016-2268-2

    Article  Google Scholar 

  165. Zhang Q, Yang LT, Chen Z, Li P (2018) A survey on deep learning for big data. Information Fusion 42:146–157

    Article  ADS  Google Scholar 

  166. Zhang Z, Wang C, Zhou X (2018) A survey on passive image copy-move forgery detection. Journal of Information Processing Systems 14(1):6–31

    Google Scholar 

  167. Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on dct and svd. Forensic Sci Int 233:158–66. https://doi.org/10.1016/j.forsciint.2013.09.013

    Article  PubMed  Google Scholar 

  168. Zhao J, Zhao W (2013) Passive forensics for region duplication image forgery based on harris feature points and local binary patterns. Math Probl Eng 2013:1–12. https://doi.org/10.1155/2013/619564

    Article  Google Scholar 

  169. Zhao F, Shi W, Qin b, Liang B (2016) Analysis of SIFT method based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection. pp 478–490. https://doi.org/10.1007/978-3-319-49148-6_39

  170. Zhong J, Gan Y (2015) Detection of copy-move forgery using discrete analytical fourier-mellin transform. Nonlinear Dynamics 84. https://doi.org/10.1007/s11071-015-2374-9

  171. Zhong J, Gan Y, Janson Y, LIN P, (2016) Copy move forgery image detection via discrete radon and polar complex exponential transform based moment invariant features. International Journal of Pattern Recognition and Artificial Intelligence 31. https://doi.org/10.1142/S0218001417540052

  172. Zhong J, Gan Y, Young J, Huang L, Lin P (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools and Applications 76. https://doi.org/10.1007/s11042-016-4201-9

  173. Zhou Zp, Zhang Xx (2010) Image splicing detection based on image quality and analysis of variance. In: 2010 2nd International Conference on Education Technology and Computer, vol 4, pp V4–242–V4–246. https://doi.org/10.1109/ICETC.2010.5529692

  174. Zhu Y, Chen C, Yan G, Guo Y, Dong Y (2020) Ar-net: Adaptive attention and residual refinement network for copy-move forgery detection. IEEE Transactions on Industrial Informatics 16(10):6714–6723. https://doi.org/10.1109/TII.2020.2982705

    Article  Google Scholar 

Download references

Funding

This work was supported by Faculty Initiation Grant of PDPM Indian Institute of Information Technology Design and Manufacturing Jabalpur, India

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Durgesh Singh.

Ethics declarations

Informed consent

Informed consent was obtained from all individual participants included in the study

Conflict of interest

The authors declare that they have no competing interests

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, M., Singh, D. Survey on image copy-move forgery detection. Multimed Tools Appl 83, 23761–23797 (2024). https://doi.org/10.1007/s11042-023-16455-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16455-x

Keywords

Navigation