Skip to main content

Forensic Analysis of Images on Online Social Network: A Survey

  • Conference paper
  • First Online:
Soft Computing for Security Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1428))

  • 524 Accesses

Abstract

In today’s world as the use of social media sites increases, the sharing of information also increases. This often impacts the new generation socially as well as politically. Digital images play a major role in providing a proof for any event. Forensic experts use digital images in their forensic inspection. Manipulation of digital images is very easy with the help of photo editing software such as Corel paint shop pro, Cameraman 360, Photoshop, and Adobe image shop. An ordinary person can make changes to an image in a very sophisticated manner by utilizing these software that are available online as well as offline. Thus, forged images can also be used as fake or planted evidence in criminal cases. This paper represents a detailed literature survey of digital image forensics. First, we will cover the overview or introduction to detect the various types of image forgery detection methods, including active as well as passive methods. It will also present a detailed survey of passive image forgery detection which is also called as blind image forgery detection. Also, the motive of this paper is to help the researchers in future for proposing appropriate structured algorithm for detecting the originality of digital image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ferreira, W. D., Ferreira, C. B., da Cruz Júnior, G., & Soares, F. (2020). A review of digital image forensics. Computers & Electrical Engineering, 85, 106685.

    Google Scholar 

  2. Barnali Sarma, G. N., (2014 November) A study on digital ımage forgery detection, IEEE.

    Google Scholar 

  3. Ghrera, S. P., Tyagi, V., & Ansari, M. D., (2014). Pixel-based image forgery detection: A review. IETE Journal of Education, 55(1), 40–46.

    Google Scholar 

  4. Khan, M. A., Mejbel, B. G., & Saber, A. H. (2020). A survey on image forgery detection using different forensic approaches. Advances in Science, Technology and Engineering Systems Journal, 5(3), 361–370.

    Google Scholar 

  5. Huang, T., Lai, Y., Lin, J., & Lu, H. (2018). An improved block-based matching algorithm of copy-move forgery detection. Multimedia Tools and Applications, 77(12), 15093–15110.

    Google Scholar 

  6. Tyagi, S., & Yadav, D. (2022). A detailed analysis of image and video forgery detection techniques. The Visual Computer, 1–21.

    Google Scholar 

  7. Raja, M. (2021). Active and passive detection of ımage forgery: A review analysis. International Journal of Engineering Research and Technology, 419–420.

    Google Scholar 

  8. Thakur, T., Singh, K., & Yadav, A. (2018). Blind approach for digital image forgery detection. International Journal of Computer Applications, 975, 8887.

    Google Scholar 

  9. Kashyap, A., Parmar, R. S., Agrawal, M., & Gupta, H. (2017). An evaluation of digital image forgery detection approaches. arXiv preprint:1703.09968.

    Google Scholar 

  10. Gill, N. K., Garg, R., & Doegar, E. A. (2017, July). A review paper on digital image forgery detection techniques. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1–7). IEEE.

    Google Scholar 

  11. Shahroudnejad, A., & Rahmati, M. (2016, December). Copy-move forgery detection in digital images using affine-SIFT. In 2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS) (pp. 1–5). IEEE.

    Google Scholar 

  12. Prasad, S., & Ramkumar, B. (2016, May). Passive copy-move forgery detection using SIFT, HOG and SURF features. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 706–710). IEEE.

    Google Scholar 

  13. Kalamkar, K. D., & Mohod, P. S. (2015, April). Feature extraction of heterogeneous face images using SIFT and MLBP algorithm. In 2015 İnternational Conference on Communications And Signal Processing (ICCSP) (pp. 1286–1290). IEEE.

    Google Scholar 

  14. Rajkumar, R., & Singh, K. M. (2015, September). Digital image forgery detection using SIFT feature. In 2015 International Symposium on Advanced Computing and Communication (ISACC) (pp. 186–191). IEEE.

    Google Scholar 

  15. Muzaffer, G., Ulutas, G., Nabiyev, V., Ulutas, M., & Ustubioglu, B., (2015, November). A novel keypoint based forgery detection method based on local phase quantization and SIFT. In 2015 9th International Conference on Electrical and Electronics Engineering (ELECO) (pp. 185–189). IEEE.

    Google Scholar 

  16. Debbarma, S., Singh, A. B., & Singh, K. M. (2014, May). Keypoints based copy-move forgery detection of digital images. In 2014 International Conference on Informatics, Electronics & Vision (ICIEV) (pp. 1–5). IEEE.

    Google Scholar 

  17. Pandey, R. C., Singh, S. K., Shukla, K. K., & Agrawal, R. (2014, December). Fast and robust passive copy-move forgery detection using SURF and SIFT image features. In 2014 9th International conference on industrial and information systems (ICIIS) (pp. 1–6). IEEE.

    Google Scholar 

  18. Chihaoui, T., Bourouis, S., & Hamrouni, K. (2014, March). Copy-move image forgery detection based on SIFT descriptors and SVD-matching. In 2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) (pp. 125–129). IEEE.

    Google Scholar 

  19. Sudhakar, K., Sandeep, V. M., & Kulkarni, S. (2014, October). Speeding-up SIFT based copy move forgery detection using level set approach. In 2014 International Conference on Advances in Electronics Computers and Communications (pp. 1–6). IEEE.

    Google Scholar 

  20. Hashmi, M. F., Hambarde, A. R., & Keskar, A. G. (2013, December). Copy move forgery detection using DWT and SIFT features. In 2013 13th İnternational Conference on İntellient Systems Design And Applications (pp. 188–193). IEEE.

    Google Scholar 

  21. Mankar, V. H., & Birajdar, G. K. (2013). Digital image forgery detection using passive techniques: A survey. Digital Investigation, 10(3), 226–245.

    Google Scholar 

  22. Kang, L., Cheng, X-p. (2010). Copy-move forgery detection in digital image. IEEE.

    Google Scholar 

  23. Panda, S., & Mishra, M. (2018). Passive techniques of digital image forgery detection: developments and challenges. In Advances in Electronics, Communication and Computing (pp. 281–290). Springer, Singapore.

    Google Scholar 

  24. Elaskily, M. A., Elnemr, H. A., Sedik, A., Dessouky, M. M., El Banby, G. M., Elshakankiry, O. A., & Fathi, E. (2020). A novel deep learning framework for copy-move forgery detection in images. Multimedia Tools and Applications, 79(27), 19167–19192.

    Google Scholar 

  25. Dhaya, R. (2021). Light weight CNN based robust image watermarking scheme for security. Journal of information technology and digital world 3(2), 118–132.

    Google Scholar 

  26. Abd Warif, N. B., Wahab, A. W. A., Idris, M. Y. I., Ramli, R., Salleh, R., Shamshirband, S., & Choo, K. K. R. (2016). Copy-move forgery detection: survey, challenges and future directions. Journal of Network and Computer Applications, 75, 259–278.

    Google Scholar 

  27. Qu, Z., Qiu, G., & Huang, J. (2009, June). Detect digital image splicing with visual cues. In International workshop on information hiding (pp. 247–261). Springer, Berlin, Heidelberg

    Google Scholar 

  28. Alamro, L., & Yusoff, N. (2017). Copy-move forgery detection using integrated DWT and SURF. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1–2), 67–71.

    Google Scholar 

  29. Vaishnavi, D., Mahalakshmi, D., & Rahman, S. (2021). Digital ımage forgery detection using ternary pattern and ELM. In Data Intelligence and Cognitive Informatics (Springer, pp. 77–86).

    Google Scholar 

  30. Darney, P. E., & Jacob, I. J. (2021). Design of deep learning algorithm for IoT application by image based recognition. Journal of ISMAC, 3(03), 276–290

    Google Scholar 

  31. T. S. GROUP. JPEG Compression. In The Sherıdan Group

    Google Scholar 

  32. Huang, C. N., Hu, W. C., Huang, D. Y., & Chou, C. H. (2017). Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimedia Tools and Applications, 76(1), 1509-1530.

    Google Scholar 

  33. Chang, S-F., & Hsu, Y-F. (2006, July). Detecting image splicing using geometry invariants and camera characteristics consistency. In 2006 IEEE International Conference on Multimedia and Expo, pp. 549–552. IEEE.

    Google Scholar 

  34. Xie, D., Liang, L., Jin, L., Xu, J., & Li, M. (2015, October). Scut-fbp: A benchmark dataset for facial beauty perception. In 2015 IEEE International Conference on Systems, Man, and Cybernetics, pp. 1821–1826. IEEE.

    Google Scholar 

  35. Riess, C., Jordan, J., Riess, C., & Christlein, V. (2012). An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on information forensics and security, 7(6), 1841–1854.

    Google Scholar 

  36. Meena, K. T. V. (2021, Sept). [Online]. Available: https://doi.org/10.1007/s11042-021-11483-x

  37. Huang, H., Guo, W., & Zhang, Y. (2008, December). Detection of copy-move forgery in digital images using SIFT algorithm. In 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application (Vol. 2, pp. 272–276). IEEE.

    Google Scholar 

  38. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE transactions on information forensics and security, 6(3), 1099–1110.

    Google Scholar 

  39. Yadav, N., & Kapdi, R. (2015, November). Copy move forgery detection using SIFT and GMM. In 2015 5th Nirma University International Conference on Engineering (NUiCONE), pp. 1–4. IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khushaima Hilal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hilal, K., Abdullah, E. (2023). Forensic Analysis of Images on Online Social Network: A Survey. In: Ranganathan, G., Fernando, X., Piramuthu, S. (eds) Soft Computing for Security Applications. Advances in Intelligent Systems and Computing, vol 1428. Springer, Singapore. https://doi.org/10.1007/978-981-19-3590-9_19

Download citation

Publish with us

Policies and ethics