2021
DOI: 10.1007/978-3-030-88244-0_35
|View full text |Cite
|
Sign up to set email alerts
|

Image Splicing Forgery Detection Techniques: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 96 publications
0
7
0
Order By: Relevance
“…Several recent investigations into image forgery detection have been reported [34], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49] of which a few reviewed deep learning (DL)-based techniques [50], [51], [52]. In this survey, we investigate recent trends in image forgery detection approaches for two of the most popular types of image forgery: copy-move images and spliced images.…”
Section: Review Of Recently Published Surveys On Ifd Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Several recent investigations into image forgery detection have been reported [34], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49] of which a few reviewed deep learning (DL)-based techniques [50], [51], [52]. In this survey, we investigate recent trends in image forgery detection approaches for two of the most popular types of image forgery: copy-move images and spliced images.…”
Section: Review Of Recently Published Surveys On Ifd Problemsmentioning
confidence: 99%
“…All the IFD methods examined in this survey used handcrafted features to detect tampering. These types of tampering were also analyzed using DL-based methods [50]. Nonetheless, these researchers mainly discussed detection techniques in different categories without providing deep insights into DL architectures.…”
Section: Review Of Recently Published Surveys On Ifd Problemsmentioning
confidence: 99%
“…The source images used to generate a spliced image may include dissimilar color temperatures, illumination conditions, and noise levels based on various factors. Average filtering or some other related image processing operation can be applied as postprocessing like resizing, cropping, rotating, and retouching each of the source images to match the visual attributes, shape, and size of the target image so that the forged image can look realistic [5].…”
Section: Introductionmentioning
confidence: 99%
“…Retouching refers to the image manipulation techniques in which some features or small details within the target image are enhanced or concealed. In general, not only retouching can be used to conceal some information and convey falsified information, but it is also a commonly used technique to create images for advertisement and commercial purposes [1], [2].…”
Section: Introductionmentioning
confidence: 99%
“…Splicing [1], on the other hand, refers to the combining of parts of images from two (or more) different sources to create a forge image. Utilizing splicing technique, the attacker can create a counterfeit information or evidence to trick people, create misunderstanding or to avoid being suspected during criminal investigation.…”
Section: Introductionmentioning
confidence: 99%