Skip to content
2000
Volume 14, Issue 3
  • ISSN: 1872-2121
  • E-ISSN: 2212-4047

Abstract

Background: Image forensics deal with the problem of authentication of pictures or their origins. There are two types of forensics techniques namely active and passive. Passive forgery is also known as blind forensics technique. In passive forgery, copy-move (cloning) image forensics is most common forgery technique. In this approach, an object or region of a picture is copied and positioned somewhere else in the same image. The active method used watermarking to solve picture genuineness problem. It has limitations like human involvement or particularly equipped cameras. To overwhelm these limitations, numerous passive authentication approaches have been developed. Moreover, both approaches do not require any prior information about the picture. Objective: The prime objective of this survey is to provide an inclusive summary as well as recent advancement, challenges and future direction in image forensics. In today’s digital era, digital pictures and videos are having a great impact on our life as well as society, as they became an important source of information. Though earlier it was very difficult to doctor the picture, nowadays digital pictures can be doctored easily with the help of editing tools and the internet. These practices make pictures as well as videos genuineness deceptive. Conclusion: This paper presents the current state-of-the-art of passive (cloning) image forensics techniques, challenges and future direction of this research domain. Furthermore, the major open issues in developing a robust cloning image forensics detector with their performance are discussed. Lastly, the available benchmark datasets are also discussed.

Loading

Article metrics loading...

/content/journals/eng/10.2174/1872212113666190722143334
2020-11-01
2024-12-26
Loading full text...

Full text loading...

/content/journals/eng/10.2174/1872212113666190722143334
Loading

  • Article Type:
    Review Article
Keyword(s): blind forgery; Cloning; copy-move; image alteration; image forensics; tampering detection
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test