Abstract
In the current digital era, images have become one of the key channels for communication and information. There are multiple platforms where digital images are used as an essential identity, like social media platforms, chat applications, electronic and print media, medical science, forensics and criminal investigation, the court of law, and many more. Alternation of digital images becomes easy because multiple image editing software applications are accessible freely on the internet. These modified images can create severe problems in the field where the correctness of the image is essential. In such situations, the authenticity of the digital images from the bare eye is almost impossible. To prove the validity of the digital images, we have only one option: Digital Image Forensics (DIF). This study reviewed various image forgery and image forgery detection methods based on blind forgery detection techniques mainly. We describe the essential components of these approaches, as well as the datasets used to train and verify them. Performance analysis of these methods on various metrics is also discussed here.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-18090-y/MediaObjects/11042_2023_18090_Fig13_HTML.png)
Similar content being viewed by others
Data Availability
No additional data or material has been used for this work other than the referenced papers.
Code Availability
No code has been developed by the authors for this work.
References
Jana M, Jana B, Joardar S (2022) Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic, J King Saud Univ Comput Inf Sci, no. xxxx, 2021, https://doi.org/10.1016/j.jksuci.2021.12.011
Raju PM, Nair MS (2018) Copy-move forgery detection using binary discriminant features. J King Saud Univ Comput Inf Sci 34(2):165–178. https://doi.org/10.1016/j.jksuci.2018.11.004
Sekhar PC, Shankar TN (2023) An object-based splicing forgery detection using multiple noise features. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16534-z
Verma M, Singh D (2023) Survey on image copy-move forgery detection. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16455-x
Sushir RD, Wakde DG, Bhutada SS (2023) Enhanced blind image forgery detection using an accurate deep learning based hybrid DCCAE and ADFC. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-15475-x
Abir NAM, Warif NBA, Zainal N (2023) An automatic enhanced filters with frequency-based copy-move forgery detection for social media images. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-15506-7
Li Q, Wang C, Zhou X, Qin Z (2022) Image copy-move forgery detection and localization based on super-BPD segmentation and DCNN. Sci Rep 12(1):14987. https://doi.org/10.1038/s41598-022-19325-y
Ferreira WD, Ferreira CBR, da Cruz Júnior G, Soares F (2020) A review of digital image forensics, Comput Electr Eng, vol. 85 https://doi.org/10.1016/j.compeleceng.2020.106685
Dhanaraj RS, Sridevi M (2021) A study on detection of copy-move forgery in digital images, in Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021, pp. 900–905. https://doi.org/10.1109/ICICV50876.2021.9388576
Uma S, Sathya PD (2019) A detailed review of copy-move forgery detection in digital image. Glob J Eng Sci Res. https://doi.org/10.5281/zenodo.2537823
Ansari MD, Ghrera SP, Tyagi V (Jan.2014) Pixel-based image forgery detection: A review. IETE J Educ 55(1):40–46. https://doi.org/10.1080/09747338.2014.921415
What is Photo Retouching? Why It’s So Important to Retouch. https://www.imaginated.com/photography/photography-glossary/what-is-photo-retouching/ (accessed Sep. 20, 2022)
AlZahir S, Hammad R (2020) Image forgery detection using image similarity. Multimed Tools Appl 79(39–40):28643–28659. https://doi.org/10.1007/s11042-020-09502-4
Rajput A (2018) Image Splicing | Set 1 (Introduction) - GeeksforGeeks. https://www.geeksforgeeks.org/image-splicing-set-1-introduction/ (accessed Sep. 20, 2022)
Koul S, Kumar M, Khurana SS, Mushtaq F, Kumar K (2022) An efficient approach for copy-move image forgery detection using convolution neural network. Multimed Tools Appl 81(8):11259–11277. https://doi.org/10.1007/s11042-022-11974-5
Meena KB, Tyagi V (2023) Image splicing forgery detection using noise level estimation. Multimed Tools Appl 82(9):13181–13198. https://doi.org/10.1007/s11042-021-11483-x
Kaur N, **dal N, Singh K (2020) A passive approach for the detection of splicing forgery in digital images. Multimed Tools Appl 79(43–44):32037–32063. https://doi.org/10.1007/s11042-020-09275-w
Kaur A, Rani J (2016) Digital Image Forgery and Techniques of Forgery Detection: A brief review. International Journal of Technical Research & Science 1(4):18–24
Raja K, Gupta G, Venkatesh S, Ramachandra R, Busch C (2022) Towards generalized morphing attack detection by learning residuals. Image Vis Comput 126:104535. https://doi.org/10.1016/j.imavis.2022.104535
Image Processing : Morphing (1997) https://www.owlnet.rice.edu/~elec539/Projects97/morphjrks/morph.html (accessed Sep. 20, 2022)
Thakur T, Singh K, Yadav A (2018) Blind Approach for Digital Image Forgery Detection. Int J Comput Appl 179(10):34–42. https://doi.org/10.5120/ijca2018916108
Hegazi A, Taha A, Selim MM (2021) An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal. J King Saud Univ Comput Inf Sci 33(9):1055–1063. https://doi.org/10.1016/j.jksuci.2019.07.007
Vijayalakshmi NVSK, Sasikala KJ, Shanmuganathan C (2023) Copy-paste forgery detection using deep learning with error level analysis, Multimed Tools Appl, https://doi.org/10.1007/s11042-023-15594-5
Yang B, Li Z, Zhang T (2020) A real-time image forensics scheme based on multi-domain learning. J Real-Time Image Process 17(1):29–40. https://doi.org/10.1007/s11554-019-00893-8
Liu K et al (2019) Copy move forgery detection based on keypoint and patch match. Multimed Tools Appl 78(22):31387–31413. https://doi.org/10.1007/s11042-019-07930-5
Liu G, Reda FA, Shih KJ, Wang TC, Tao A, Catanzaro B (2018) Image inpainting for irregular holes using partial convolutions. In: Proceedings of the European conference on computer vision (ECCV), pp 85–100
Zanardelli M, Guerrini F, Leonardi R, Adami N (2023) Image forgery detection: a survey of recent deep-learning approaches. Multimed Tools Appl 82(12):17521–17566. https://doi.org/10.1007/s11042-022-13797-w
He L, Qiang Z, Shao X, Lin H, Wang M, Dai F (2022) Research on High-Resolution Face Image Inpainting Method Based on StyleGAN. Electron 11(10):1–18. https://doi.org/10.3390/electronics11101620
Qiao T, Zhu A, Retraint F (2018) Exposing image resampling forgery by using linear parametric model. Multimed Tools Appl 77(2):1501–1523. https://doi.org/10.1007/s11042-016-4314-1
Alamro L, Yusoff N (2017) Copy-move forgery detection using integrated DWT and SURF. J Telecommun Electron Comput Eng 9(1–2):67–71
Sharma P, Kumar M, Sharma H (2022) Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation. Multimed Tools Appl 82(12):18117–18150. https://doi.org/10.1007/s11042-022-13808-w
Koundinya Anjan K, Sunanda D, Mahesh G, Sneha S (2022) Characteristic overview of digital image forensics tools. In: Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2021. Springer, pp 157–162
Hosny KM, Mortda AM, Fouda MM, Lashin NA (2022) An efficient cnn model to detect copy-move image forgery. IEEE Access 10:48622–48632. https://doi.org/10.1109/ACCESS.2022.3172273
Fadhil JM, Trupti B (2022) An efficient technique for image forgery detection using local binary pattern (hessian and center symmetric) and transformation method. Scientific Journal Al-Imam University College 1:1–11
Manna N, Kumar S, Kakar R, Nayak S, Rout JK, Kumar Balabantaray B (2022) IFChatbot: Convolutional Neural Network based chatbot for Image Forgery Detection and Localization, in 2022 IEEE India Council International Subsections Conference (INDISCON), pp. 1–6. https://doi.org/10.1109/INDISCON54605.2022.9862926
Alhaidery MMA, Taherinia AH (2022) A passive image forensic scheme based on an adaptive and hybrid techniques. Multimed Tools Appl 81(9):12681–12699. https://doi.org/10.1007/s11042-022-12374-5
Kadam K, Ahirrao S, Kotecha K (2021) AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI. Int J Electr Comput Eng 11(5):4489–4501. https://doi.org/10.11591/ijece.v11i5.pp4489-4501
Sai Achyuth P, Satyanarayana V (2021) Image forgery detection techniques: a brief review. In: Proceedings of Second International Conference in Mechanical and Energy Technology: ICMET 2021, India. Springer, pp 351–357
Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image Steganography: A Review of the Recent Advances. IEEE Access 9:23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998
Bansal A, Kumar V (2021) Steganography Technique Inspired by Rook, https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2021040103, vol. 15, no. 2, pp. 53–67, https://doi.org/10.4018/IJISP.2021040103
Bansal A, Muttoo SK, Kumar V (2016) Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique. Int J Comput Netw Inf Secur 8(8):39–46. https://doi.org/10.5815/ijcnis.2016.08.05
Begum M, Uddin MS (2020) Digital image watermarking techniques: A review, Information (Switzerland), vol. 11, no. 2. MDPI AG. https://doi.org/10.3390/info11020110
Ray A, Roy S (2020) Recent trends in image watermarking techniques for copyright protection: a survey. Int J Multimed Inf Retr 9(4):249–270. https://doi.org/10.1007/s13735-020-00197-9
Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy–move image forgery detection using DCT. Iran J Comput Sci 2(2):89–99. https://doi.org/10.1007/s42044-019-00029-y
Meena KB, Tyagi V (2021) Efficient Passive Forgery Detection in Digital Images, Jaypee University of Engineering and Technology, Guna, [Online]. Available: http://hdl.handle.net/10603/338230. Accessed 25/09/2023
Liu Y, Zou Z, Yang Y, Law NFB, Bharath AA (2021) Efficient source camera identification with diversity-enhanced patch selection and deep residual prediction. Sensors 21(14):1–22. https://doi.org/10.3390/s21144701
Wang B, Wang Y, Hou J, Li Y, Guo Y (2022) Open-Set source camera identification based on envelope of data clustering optimization (EDCO). Comput Secur, vol. 113 https://doi.org/10.1016/j.cose.2021.102571
Shukla DK, Bansal A, Singh P (2022) Performance analysis of various copy-move forgery detection methods. i-Manager’s Journal on Digital Signal Processing 10(2):1
Tahaoglu G, Ulutas G, Ustubioglu B, Nabiyev VV (2021) Improved copy move forgery detection method via L*a*b* color space and enhanced localization technique. Multimed Tools Appl 80(15):23419–23456. https://doi.org/10.1007/s11042-020-10241-9
Wei H, Kehtarnavaz N (2019) Semi-Supervised Faster RCNN-Based Person Detection and Load Classification for Far Field Video Surveillance. Mach Learn Knowl Extr 1(3):756–767. https://doi.org/10.3390/make1030044
Obeidat AA (2017) Hybrid approach for botnet detection using k-means and k-medoids with Hopfield neural network. Int J Commun Networks Inf Secur 9(3):305–313
Alhaidery MMA, Taherinia AH, Yazdi HS (2022) Cloning detection scheme based on linear and curvature scale space with new false positive removal filters. Multimed Tools Appl 81(6):8745–8766. https://doi.org/10.1007/s11042-022-12237-z
Fanfani M, Piva A, Colombo C (2022) PRNU registration under scale and rotation transform based on convolutional neural networks. Pattern Recognit 124:108413. https://doi.org/10.1016/j.patcog.2021.108413
Behare MS, Bhalchandra AS, Kumar R (2019) Source Camera Identification using Photo Response Noise Uniformity, in Proceedings of the 3rd International Conference on Electronics and Communication and Aerospace Technology, ICECA 2019, pp. 731–734. https://doi.org/10.1109/ICECA.2019.8822212
Flor E, Aygun R, Mercan S, Akkaya K (2021) PRNU-based Source Camera Identification for Multimedia Forensics, Proc. - 2021 IEEE 22nd Int. Conf. Inf. Reuse Integr. Data Sci. IRI 2021, pp. 168–175, https://doi.org/10.1109/IRI51335.2021.00029
Xu B, Wang X, Zhou X, ** J, Wang S (2016) Source camera identification from image texture features. Neurocomputing 207:131–140. https://doi.org/10.1016/j.neucom.2016.05.012
Grossberg MD, Nayar SK (2003) Determining the camera response from images: What is knowable?, IEEE Trans Pattern Anal Mach Intell, vol. 25, no. 11, https://doi.org/10.1109/TPAMI.2003.1240119
Chen C, McCloskey S, Yu J (2019) Analyzing modern camera response functions, in Proceedings - 2019 IEEE Winter Conference on Applications of Computer Vision, WACV 2019, Mar, pp. 1961–1969. https://doi.org/10.1109/WACV.2019.00213
Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Appl 21(2):291–306. https://doi.org/10.1007/s10044-017-0678-8
Meena KB, Tyagi V (2020) A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms. Multimed Tools Appl 79(11–12):8197–8212. https://doi.org/10.1007/s11042-019-08343-0
Badr A, Youssif A, Wafi M (2020) A robust copy-move forgery detection in digital image forensics using SURF. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, pp 1–6
Introduction to Frequency domain (2022) https://www.tutorialspoint.com/dip/introduction_to_frequency_domain.htm (accessed Sep. 19, 2022)
Ashraf R et al. (2020) An Efficient Forensic Approach for Copy-move Forgery Detection via Discrete Wavelet Transform,” 1st Annu Int Conf Cyber Warf Secur ICCWS 2020 - Proc, https://doi.org/10.1109/ICCWS48432.2020.9292372
Pourkashani A, Shahbahrami A, Akoushideh A (2021) Copy-move forgery detection using convolutional neural network and K-mean clustering. Int J Electr Comput Eng 11(3):2604–2612. https://doi.org/10.11591/ijece.v11i3.pp2604-2612
Jaiswal AK, Gupta D, Srivastava R (2020) Detection of copy-move forgery using hybrid approach of DCT and BRISK. In: 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, pp 471–476
Kanwal N, Girdhar A, Kaur L, Bhullar JS (2019) Detection of digital image forgery using fast fourier transform and local features. In: 2019 international conference on automation, computational and technology management (ICACTM). IEEE, pp 262–267
Hashmi MF, Keskar AG (2019) Fast and robust copy-move forgery detection using wavelet transforms and SURF. Int Arab J Inf Technol 16(2):304–311
Luo Q, Su J, Yang C, Silven O, Liu L (2022) Scale-selective and noise-robust extended local binary pattern for texture classification. Pattern Recognit 132:108901. https://doi.org/10.1016/J.PATCOG.2022.108901
Farooq S, Yousaf MH, Hussain F (2017) A generic passive image forgery detection scheme using local binary pattern with rich models. Comput Electr Eng 62:459–472. https://doi.org/10.1016/j.compeleceng.2017.05.008
Nsang AS, Bello AM, Shamsudeen H (2015) Image reduction using assorted dimensionality reduction techniques. CEUR Workshop Proc 1353(June):139–146
Chen H, Yang X, Lyu Y (2020) Copy-move forgery detection based on keypoint clustering and similar neighborhood search algorithm. IEEE Access 8:36863–36875. https://doi.org/10.1109/ACCESS.2020.2974804
Mursi MFM, Salama MM, Habeb MH (2017) An Improved SIFT-PCA-Based Copy-Move Image Forgery Detection Method. Int J Adv Res Comput Sci Electron Eng 6(3):23–28
Mishra M, Chandra Adhikary M, Adhikary FMLt C (2014) Detection of Clones in Digital Images Digital Image Forgery Detection View project MAKE-meteorological analyser & knowledge extractor View project Detection of Clones in Digital Images. [Online]. Available: https://www.researchgate.net/publication/264276516. Accessed 15/07/22
Jain I, Goel N (2021) Advancements in image splicing and copy-move forgery detection techniques: A survey, Proc Conflu 2021 11th Int Conf Cloud Comput Data Sci Eng, pp. 470–475, https://doi.org/10.1109/Confluence51648.2021.9377104
Rao Y, Ni J, Zhao H (2020) Deep Learning Local Descriptor for Image Splicing Detection and Localization. IEEE Access 8:25611–25625. https://doi.org/10.1109/ACCESS.2020.2970735
Ahmed B, Gulliver TA, S. alZahir (2020) Image splicing detection using mask-RCNN. Signal, Image Video Process 14(5):1035–1042. https://doi.org/10.1007/s11760-020-01636-0
Jaiswal AK, Srivastava R (2020) A technique for image splicing detection using hybrid feature set. Multimed Tools Appl 79(17–18):11837–11860. https://doi.org/10.1007/s11042-019-08480-6
Jaiswal AK, Srivastava R (2019) Image Splicing Detection using Deep Residual Network. SSRN Electron J. https://doi.org/10.2139/ssrn.3351072
Bibi S, Abbasi A, Haq IU, Baik SW, Ullah A (2021) Digital Image Forgery Detection Using Deep Autoencoder and CNN Features, Human-centric Comput Inf Sci, vol. 11, https://doi.org/10.22967/HCIS.2021.11.032
Abdalla Y, Tariq Iqbal M, Shehata M (2019) Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network, Inf, vol. 10, no. 9, https://doi.org/10.3390/info10090286
Abdalla Y, Iqbal MT, Shehata M (2019) Convolutional neural network for copy-move forgery detection. Symmetry 11(10):1280
Goel N, Kaur S, Bala R (2021) Dual branch convolutional neural network for copy move forgery detection, no. December 2020, pp. 656–665, https://doi.org/10.1049/ipr2.12051
Lee SI, Park JY, Eom IK (2022) CNN-Based Copy-Move Forgery Detection Using Rotation-Invariant Wavelet Feature. IEEE Access 10(October):106217–106229. https://doi.org/10.1109/ACCESS.2022.3212069
Yogita S, Prashant S, Rawat CSD (2023) Image forgery detection using integrated convolution-LSTM (2D) and convolution (2D). International Journal of Electrical and Electronics Research (IJEER) 11(2):631–638
Maleve N (2019) An Introduction to Image Datasets | u n t h i n k i n g . p h o t o g r a p h y. https://unthinking.photography/articles/an-introduction-to-image-datasets (accessed Sep. 20, 2022)
Sovathana P (2018) Casia dataset | Kaggle. https://www.kaggle.com/datasets/sophatvathana/casia-dataset (accessed Sep. 02, 2022)
Goel D (2020) CASIA 2.0 Image Tampering Detection Dataset | Kaggle. https://www.kaggle.com/datasets/divg07/casia-20-image-tampering-detection-dataset (accessed Sep. 02, 2022)
Ng T-T, Chang S-F, Sun Q (2004) A data set of authentic and spliced image blocks. In: ADVENT Technical Report, vol 4. Columbia University
Niyishaka P, Bhagvati C (2020) Copy-move forgery detection using image blobs and BRISK feature. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09225-6
Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—New database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, pp 49–54
CoMoFoD (2013) https://www.vcl.fer.hr/comofod/ (accessed Sep. 02, 2022)
Soni B, Das PK, Thounaojam DM (2018) multiCMFD: fast and efficient system for multiple copy-move forgeries detection in image. In: Proceedings of the 2018 international conference on image and graphics processing, pp 53–58
Elaskily MA et al (2020) A novel deep learning framework for copy-moveforgery detection in images. Multimed Tools Appl 79(27–28):19167–19192. https://doi.org/10.1007/s11042-020-08751-7
Sadeghi S, Jalab HA, Wong K, Uliyan D, Dadkhah S (2017) Keypoint based authentication and localization of copy-move forgery in digital image. Malaysian J Comput Sci 30(2):117–133
Wang C, Zhang Z, Zhou X (2018) An image copy-move forgery detection scheme based on A-KAZE and SURF features. Symmetry (Basel) 10(12):1–20. https://doi.org/10.3390/sym10120706
Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32. https://doi.org/10.1016/j.jvcir.2015.01.016
Al-Qershi OM, Khoo BE (2018) Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multimed Tools Appl 77(24):31807–31833. https://doi.org/10.1007/s11042-018-6201-4
Gloe T, Böhme R (2010) The dresden image database for benchmarking digital image forensics. J Digit Forensic Pract 3(2–4):150–159. https://doi.org/10.1080/15567281.2010.531500
CIFAR-10 and CIFAR-100 datasets (n.d.) https://www.cs.toronto.edu/~kriz/cifar.html (accessed Sep. 19, 2023)
Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints, IEEE Trans Inf Forensics Secur, vol. 10, https://doi.org/10.1109/TIFS.2015.2445742
Wen B, Zhu Y, Subramanian R, Ng TT, Shen X, Winkler S (2016) Coverage – a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp 161–165. https://doi.org/10.1109/ICIP.2016.7532339
Image Manipulation Dataset (n.d.) https://www5.cs.fau.de/research/data/image-manipulation/ (accessed Sep. 19, 2023)
MNIST - Machine Learning Datasets (n.d.) https://datasets.activeloop.ai/docs/ml/datasets/mnist/ (accessed Sep. 25, 2023)
Acknowledgements
I am (Deependra Kumar Shukla) grateful to the UGC and the Government of India for granting me the UGC- (JRF/SRF) fellowship, which enables me to pursue my research endeavors.
Funding
No funding was received to assist with the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
The authors contributed equally to this work.
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shukla, D.K., Bansal, A. & Singh, P. A survey on digital image forensic methods based on blind forgery detection. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-023-18090-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-023-18090-y