{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T10:30:11Z","timestamp":1772101811025,"version":"3.50.1"},"reference-count":64,"publisher":"Oxford University Press (OUP)","issue":"11","license":[{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Information in the form of the image conveys more details than any other form of information. Several software packages are available to manipulate the images so that the authenticity of the images is being questioned. Several image processing approaches are available to create fake images without leaving any visual clue about the forging operation. So, proper image forgery detection tools are required to detect such forgery images. Over the past few years, several research papers were published in the digital image forensics domain for detecting fake images, thus escalating the legitimacy of the images. This survey paper attempts to review the recent approaches proposed for detecting image forgery. Accordingly, several research papers related to image forgery detection are reviewed and analyzed. The taxonomy of image forgery detection techniques is presented, and the algorithms related to each technique are discussed. The comprehensive analysis is carried out based on the dataset used, software used for the implementation and the performance achievement. Besides, the research issues associated with every approach were scrutinized together with the recommendation for future work.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz148","type":"journal-article","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T12:27:47Z","timestamp":1572611267000},"page":"1692-1704","source":"Crossref","is-referenced-by-count":6,"title":["Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection"],"prefix":"10.1093","volume":"64","author":[{"given":"V","family":"Vinolin","sequence":"first","affiliation":[{"name":"Research Scholar, Noorul Islam Centre For Higher Education, Kumaracoil, Kanyakumari, Tamilnadu, India - 629180"}]},{"given":"M","family":"Sucharitha","sequence":"additional","affiliation":[{"name":"Professor, Malla Reddy College of Engineering and Technology, Maisammaguda, Medchal, Telangana, India - 500100"}]}],"member":"286","published-online":{"date-parts":[[2019,12,19]]},"reference":[{"key":"2021120104052879600_ref1","first-page":"1","volume-title":"Digital Image Forensics vs","author":"Schetinger","year":"2016"},{"key":"2021120104052879600_ref2","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.diin.2011.06.004","article-title":"Digital image forgery detection and estimation by exploring basic image manipulations","volume":"8","author":"Devi Mahalakshmi","year":"2012","journal-title":"Digit. Invest."},{"key":"2021120104052879600_ref3","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","article-title":"Digital image forensics: A booklet for beginners","volume":"51","author":"Redi","year":"2011","journal-title":"Multimed. Tools Appl."},{"key":"2021120104052879600_ref4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.4018\/978-1-60960-024-2.ch012","article-title":"Detecting image forgeries using geometric cues","volume":"1","author":"Wu","year":"2011","journal-title":"Computer Vision for Multimedia Applications"},{"key":"2021120104052879600_ref5","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1016\/j.jvcir.2012.03.005","article-title":"Image forensic signature for content authenticity analysis","volume":"23","author":"Wang","year":"2012","journal-title":"J. Vis. Commun. Image R."},{"key":"2021120104052879600_ref6","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1016\/j.optlaseng.2011.06.014","article-title":"Holographic watermarking for authentication of cut images","volume":"49","author":"Spagnolo","year":"2011","journal-title":"Opt. Laser. Eng."},{"key":"2021120104052879600_ref7","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","article-title":"Image forgery detection: A survey","volume":"26","author":"Farid","year":"2009","journal-title":"IEEE Signal Process. Mag."},{"key":"2021120104052879600_ref8","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","article-title":"Image forgery detection using adaptive oversegmentation and feature point matching","volume":"10","author":"Pun","year":"2015","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"2021120104052879600_ref9","first-page":"652","volume-title":"Proceedings of Digital Forensic Research Workshop","author":"Fridrich","year":"2003"},{"key":"2021120104052879600_ref10","volume-title":"Exposing Digital Forgeries by Detecting Duplicated Image Regions","year":"2004"},{"key":"2021120104052879600_ref11","first-page":"746","volume-title":"Proceedings of International Conference on Pattern Recognition","author":"Weiqi","year":"2006"},{"key":"2021120104052879600_ref12","doi-asserted-by":"crossref","first-page":"14887","DOI":"10.1007\/s11042-016-4201-9","article-title":"A new block-based method for copy-move forgery detection under image geometric transforms","volume":"76","author":"Zhong","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"2021120104052879600_ref13","first-page":"1","article-title":"Nonoverlapping blocks based copy-move forgery detection","volume":"2018","author":"Sun","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"2021120104052879600_ref14","first-page":"65","volume-title":"International Workshop on Digital Watermarking","author":"Zhou","year":"2017"},{"key":"2021120104052879600_ref15","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1504\/IJESDF.2015.070394","article-title":"A passive technique for image forgery detection using contrast context histogram features","volume":"7","author":"Vaishnavi","year":"2015","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"2021120104052879600_ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/7130491","article-title":"Revealing traces of image resampling and resampling antiforensics","volume":"2017","author":"Peng","year":"2017","journal-title":"Adv. Multimed."},{"key":"2021120104052879600_ref17","first-page":"1881","volume-title":"Proceedings of Computer Society Conference on Computer Vision and Pattern Recognition Workshops","author":"Bunk","year":"2017"},{"key":"2021120104052879600_ref18","first-page":"1","article-title":"Detecting image splicing using merged features in chroma space","volume":"2014","author":"Xu","year":"2014","journal-title":"Sci. World J."},{"key":"2021120104052879600_ref19","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1049\/iet-ipr.2016.0238","article-title":"Splicing image forgery detection using textural features based on the grey level co-occurrence matrices","volume":"11","author":"Shen","year":"2017","journal-title":"IET Image Process."},{"key":"2021120104052879600_ref20","first-page":"423","volume-title":"Proceedings of the 9th European Conference on Computer Vision","author":"He","year":"2006"},{"key":"2021120104052879600_ref21","first-page":"1929","volume-title":"Proceedings of International Conference On Image Processing","author":"Bianchi","year":"2011"},{"key":"2021120104052879600_ref22","first-page":"217","volume-title":"Proceedings of International Conference on Acoustics, Speech and Signal Processing","author":"Luo","year":"2007"},{"key":"2021120104052879600_ref23","first-page":"12","volume-title":"Proceedings of International Conference on Multimedia and Expo","author":"Ye","year":"2007"},{"key":"2021120104052879600_ref24","volume-title":"Digital Image Ballistics from JPEG Quantization","year":"2006"},{"key":"2021120104052879600_ref25","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/TIFS.2010.2077628","article-title":"Camera response functions for image forensics: An automatic algorithm for splicing detection","volume":"5","author":"Hsu","year":"2010","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"2021120104052879600_ref26","first-page":"48","author":"Johnson","year":"2006"},{"key":"2021120104052879600_ref27","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","article-title":"Exposing digital forgeries in color filter array interpolated images","volume":"53","author":"Popescu","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"2021120104052879600_ref28","first-page":"97","volume-title":"Proceedings of International Conference on Image Processing","author":"Hongmei","year":"2007"},{"key":"2021120104052879600_ref29","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2007.916285","article-title":"Determining image origin and integrity using sensor noise","volume":"3","author":"Chen","year":"2008","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"2021120104052879600_ref30","first-page":"362","volume-title":"Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII","author":"Lukas","year":"2006"},{"key":"2021120104052879600_ref31","first-page":"19","author":"Johnson","year":"2007"},{"key":"2021120104052879600_ref32","first-page":"1","author":"Wang","year":"2008"},{"key":"2021120104052879600_ref33","volume-title":"Metric Measurements on A Plane from A Single Image","year":"2006"},{"key":"2021120104052879600_ref34","first-page":"1078","article-title":"Proceedings of International Conference on Multimedia and Expo (ed)","author":"Wei","year":"2009"},{"key":"2021120104052879600_ref35","volume-title":"Media Watermarking, Security, and Forensics","author":"Carvalho","year":"2015"},{"key":"2021120104052879600_ref36","first-page":"1076","article-title":"Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR) (ed)","author":"Nillius","year":"2005"},{"key":"2021120104052879600_ref37","first-page":"1","author":"Johnson","year":"2005"},{"key":"2021120104052879600_ref38","first-page":"4567","volume-title":"9th International Workshop on Information Hiding","author":"Johnson","year":"2008"},{"key":"2021120104052879600_ref39","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TIFS.2007.903848","article-title":"Exposing digital forgeries in complex lighting environments","volume":"2","author":"Johnson","year":"2007","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"2021120104052879600_ref40","first-page":"546","volume-title":"Proceedings of CCF Chinese Conference on Computer Vision","author":"Zhao","year":"2015"},{"key":"2021120104052879600_ref41","first-page":"1","volume-title":"WIFS","author":"Kee","year":"2010"},{"key":"2021120104052879600_ref42","first-page":"1777","volume-title":"3D Lighting-Based Image Forgery Detection Using Shape-From-Shading, Proceedings of the 20th European Signal Processing Conference (EUSIPCO), Bucharest, Romania, August 27\u201331","author":"Fan","year":"2012"},{"key":"2021120104052879600_ref43","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/TIFS.2016.2623589","article-title":"Optimized 3D lighting environment estimation for image forgery detection","volume":"12","author":"Peng","year":"2017","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"2021120104052879600_ref44","first-page":"66","author":"Riess","year":"2010"},{"key":"2021120104052879600_ref45","first-page":"600","volume-title":"Proceedings of 3rd International Conference on Multimedia Information Networking and Security","author":"Wu","year":"2011"},{"key":"2021120104052879600_ref46","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","article-title":"Exposing digital image forgeries by illumination color classification","volume":"8","author":"De Carvalho","year":"2013","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"2021120104052879600_ref47","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TIFS.2015.2506548","article-title":"Illuminant-based transformed spaces for image forensics","volume":"11","author":"Carvalho","year":"2016","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"key":"2021120104052879600_ref48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2077341.2077345","article-title":"Exposing photo manipulation with inconsistent reflections","volume":"31","author":"O\u2019brien","year":"2012","journal-title":"ACM T. Graphic."},{"key":"2021120104052879600_ref49","first-page":"1042","article-title":"International Conference on Multimedia and Expo (ed)","author":"Zhang","year":"2009"},{"key":"2021120104052879600_ref50","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1109\/TIFS.2011.2139209","article-title":"Identifying image composites through shadow matte consistency","volume":"6","author":"Liu","year":"2011","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"2021120104052879600_ref51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2629646","article-title":"Exposing photo manipulation from shading and shadows","volume":"33","author":"Kee","year":"2014","journal-title":"ACM T. Graph."},{"key":"2021120104052879600_ref52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2487228.2487236","article-title":"Exposing photo manipulation with inconsistent shadows","volume":"32","author":"Kee","year":"2013","journal-title":"ACM T. Graph."},{"key":"2021120104052879600_ref53","first-page":"679","article-title":"24th Telecommunications Forum (ed)","author":"Tuba","year":"2016"},{"key":"2021120104052879600_ref54","first-page":"1","volume-title":"5th International Symposium on Digital Forensic and Security","author":"Tuba","year":"2017"},{"key":"2021120104052879600_ref55","first-page":"1","volume-title":"International Workshop on Information Forensics and Security (WIFS)","author":"Peng","year":"2015"},{"key":"2021120104052879600_ref56","author":"CASIA"},{"key":"2021120104052879600_ref57"},{"key":"2021120104052879600_ref58"},{"key":"2021120104052879600_ref59","author":"RAISE"},{"key":"2021120104052879600_ref60"},{"key":"2021120104052879600_ref61"},{"key":"2021120104052879600_ref62"},{"key":"2021120104052879600_ref63"},{"key":"2021120104052879600_ref64"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/64\/11\/1692\/41269330\/bxz148.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/64\/11\/1692\/41269330\/bxz148.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T05:03:55Z","timestamp":1638335035000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/64\/11\/1692\/5681102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,19]]},"references-count":64,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2019,12,19]]},"published-print":{"date-parts":[[2021,11,17]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz148","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2021,11]]},"published":{"date-parts":[[2019,12,19]]}}}