{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:47:40Z","timestamp":1774374460112,"version":"3.50.1"},"reference-count":47,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:00:00Z","timestamp":1578528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In this paper, we present a new technique of image forgery detection. The proposed technique uses digital signatures embedded in the least significant bits of the selected pixels of each row and column. The process maintains a symmetry in the use of pixels for computing and hiding the digital signatures. Each row and column of the image symmetrically contributes to both processes, with the number of pixels per row or column used for computing the signature, and the pixels used for embedding are not equal and are asymmetric. The pixels in each row and column of an image are divided into two groups. One group contains pixels of a row or column used in the calculation of digital signatures, and the second group of pixels is used for embedding the digital signatures of the respective row or column. The digital signatures are computed using the hash algorithm, e.g., message digest five (MD5). The least significant bits substitution technique is used for embedding the computed digital signature in the least significant bits of the selected pixels of the corresponding row or column. The proposed technique can successfully detect the modification made in an image. The technique detects pixel level modification in a single or multiple pixels.<\/jats:p>","DOI":"10.3390\/sym12010137","type":"journal-article","created":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T04:06:51Z","timestamp":1578629211000},"page":"137","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Forgery Detection and Localization of Modifications at the Pixel Level"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9385-7596","authenticated-orcid":false,"given":"Sahib","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Electronics and Telecommunications, Politecnico di Torino, 10129 Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0864-5255","authenticated-orcid":false,"given":"Khalil","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, University of Azad Jammu and Kashmir, Muzaffarabad 13100, Pakistan"}]},{"given":"Farman","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Software, Sejong University, Seoul 05006, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9559-4352","authenticated-orcid":false,"given":"Kyung-Sup","family":"Kwak","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Inha University, Incheon 22212, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,1,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.931079","article-title":"Image forgery detection","volume":"26","author":"Farid","year":"2009","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_2","unstructured":"Blythe, P., and Fridrich, J. (2004, January 11\u201313). Secure digital camera. Proceedings of the Digital Forensic Research Workshop, Baltimore, MD, USA."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M.L., and Bloom, J.A. (2001). Digital Watermarking, Morgan Kaufmann.","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11042-010-0620-1","article-title":"Digital image forensics: A booklet for beginners","volume":"51","author":"Redi","year":"2011","journal-title":"Multimed. Tool Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.3724\/SP.J.1004.2009.01488","article-title":"Fast and robust forensics for image region-duplication forgery","volume":"35","author":"Wang","year":"2009","journal-title":"Acta Autom. Sinica"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/09747338.2014.921415","article-title":"Pixel-based image forgery detection: A review","volume":"55","author":"Ansari","year":"2014","journal-title":"IETE J. Educ."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Khan, S., and Bianchi, T. (2019, January 12\u201317). Reduced Complexity Image Clustering Based on Camera Fingerprints. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","DOI":"10.1109\/ICASSP.2019.8683754"},{"key":"ref_8","unstructured":"Fridrich, J. (1999, January 7\u201311). Robust bit extraction from images. Proceedings of the IEEE International Conference on Multimedia Computing and Systems, Florence, Italy."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Li, J., Li, S., and Wang, S. (2010). Detecting digital image splicing in chroma spaces. International Workshop on Digital Watermarking, Springer.","DOI":"10.1007\/978-3-642-18405-5_2"},{"key":"ref_10","first-page":"1","article-title":"Digital signature scheme for image","volume":"49","author":"Doke","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1016\/j.sigpro.2011.01.022","article-title":"Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics","volume":"91","author":"Nandi","year":"2011","journal-title":"Signal Process."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","article-title":"Image forgery detection using adaptive over segmentation and feature point matching","volume":"10","author":"Pun","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Moghaddasi, Z., Jalab, H.A., and Noor, R.M. (2014, January 18\u201320). SVD-based image splicing detection. Proceedings of the 6th International Conference on Information Technology and Multimedia, Putrajaya, Malaysia.","DOI":"10.1109\/ICIMU.2014.7066598"},{"key":"ref_14","unstructured":"Boato, G., Natale, F.G., and Zontone, P. (2010, January 13\u201315). How digital forensics may help assessing the perceptual impact of image formation and manipulation. Proceedings of the Fifth International Workshop on Video Processing and Quality Metrics for Consumer Electronics, Scottsdale, AZ, USA."},{"key":"ref_15","unstructured":"Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., and Sankur, B. (2004, January 24\u201327). A classifier design for detecting image manipulations. Proceedings of the 2004 International Conference on Image Processing, ICIP \u201904, Singapore."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Stamm, M.C., and Liu, K.R. (2008, January 12\u201315). Blind forensics of contrast enhancement in digital images. Proceedings of the 2008 15th IEEE International Conference on Image Processing, San Diego, CA, USA.","DOI":"10.1109\/ICIP.2008.4712454"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Stamm, M.C., and Liu, K.R. (2010, January 14\u201319). Forensic estimation and reconstruction of a contrast enhancement mapping. Proceedings of the 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, Dallas, TX, USA.","DOI":"10.1109\/ICASSP.2010.5495488"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TIFS.2010.2053202","article-title":"Forensic detection of image manipulation using statistical intrinsic fingerprints","volume":"5","author":"Stamm","year":"2010","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Cao, G., Zhao, Y., and Ni, R. (2010, January 26\u201329). Forensic estimation of gamma correction in digital images. Proceedings of the 2010 IEEE International Conference on Image Processing 2010, Hong Kong, China.","DOI":"10.1109\/ICIP.2010.5652701"},{"key":"ref_20","first-page":"239","article-title":"Blind identification algorithm for retouched images based on Bi-Laplacian","volume":"31","author":"Li","year":"2011","journal-title":"J. Comput. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TIFS.2014.2300937","article-title":"Contrast enhancement-based forensics in digital images","volume":"9","author":"Cao","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/TIFS.2014.2302078","article-title":"A Bayesian-MRF approach for PRNU-based image forgery detection","volume":"9","author":"Chierchia","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","unstructured":"Fan, Z., and de Queiroz, R. (2000, January 10\u201313). Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history. Proceedings of the International Conference on Image Processing Proceedings, Vancouver, BC, Canada."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TIP.2002.807361","article-title":"Identification of bitmap compression history: JPEG detection and quantizer estimation","volume":"12","author":"Fan","year":"2003","journal-title":"IEEE Trans. Image Process."},{"key":"ref_25","unstructured":"Luk\u00e1\u0161, J., and Fridrich, J. (2003, January 6\u20138). Estimation of primary quantization matrix in double compressed JPEG images. Proceedings of the Digital Forensic Research Workshop, Cleveland, OH, USA."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Popescu, A.C. (2004). Statistical Tools for Digital Image Forensics. [Ph.D. Thesis, Dartmouth College].","DOI":"10.1007\/978-3-540-30114-1_10"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.1109\/TSP.2005.855406","article-title":"Exposing digital forgeries in color filter array interpolated images","volume":"53","author":"Popescu","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","article-title":"Digital camera identification from sensor pattern noise","volume":"1","author":"Lukas","year":"2006","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., and Farid, H. (2005, January 1\u20132). Exposing digital forgeries by detecting inconsistencies in lighting. Proceedings of the 7th Workshop on Multimedia and Security, New York, NY, USA.","DOI":"10.1145\/1073170.1073171"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TIFS.2007.903848","article-title":"Exposing digital forgeries in complex lighting environments","volume":"2","author":"Johnson","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Chen, H., Shen, X., and Lv, Y. (2010, January 18\u201322). Blind identification method for authenticity of infinite light source images. Proceedings of the 2010 Fifth International Conference on Frontier of Computer Science and Technology, Changchun, China.","DOI":"10.1109\/FCST.2010.90"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kee, E., and Farid, H. (2010, January 12\u201315). Exposing digital forgeries from 3-D lighting environments. Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, Seattle, WA, USA.","DOI":"10.1109\/WIFS.2010.5711437"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s11227-010-0531-y","article-title":"An improved image blind identification based on inconsistency in light source direction","volume":"58","author":"Lv","year":"2011","journal-title":"J. Supercomput."},{"key":"ref_34","unstructured":"Fan, W., Wang, K., Cayre, F., and Xiong, Z. (2012, January 27\u201331). 3D lighting-based image forgery detection using shape-from-shading. Proceedings of the European Signal Processing Conference, Bucharest, Romania."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","article-title":"Exposing digital image forgeries by illumination color classification","volume":"8","author":"Riess","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., and Farid, H. (2007). Detecting Photographic Composites of People. International Workshop on Digital Watermarking, Springer.","DOI":"10.1007\/978-3-540-92238-4_3"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ng, T.T., Chang, S.F., Hsu, J., Xie, L., and Tsui, M.P. (2005, January 6\u201312). Physics-motivated features for distinguishing photographic images and computer graphics. Proceedings of the ACM International Conference on Multimedia, Singapore.","DOI":"10.1145\/1101149.1101192"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wahid, M., Ahmad, N., Zafar, M.H., and Khan, S. (2018, January 22\u201323). On combining MD5 for image authentication using LSB substitution in selected pixels. Proceedings of the 2018 International Conference on Engineering and Emerging Technologies (ICEET), Lahore, Pakistan.","DOI":"10.1109\/ICEET1.2018.8338621"},{"key":"ref_39","first-page":"101","article-title":"Implementation of Variable Least Significant Bits Stegnography using DDDB Algorithm","volume":"8","author":"Khan","year":"2011","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Khan, S., Ahmad, N., Ismail, M., Minallah, N., and Khan, T. (2015, January 19\u201320). A secure true edge based 4 least significant bits steganography. Proceedings of the 2015 International Conference on Emerging Technologies (ICET), Peshawar, Pakistan.","DOI":"10.1109\/ICET.2015.7389227"},{"key":"ref_41","first-page":"1","article-title":"Row Level Image Forgery Detection Technique using Embedded Digital Signature","volume":"37","author":"Khan","year":"2018","journal-title":"J. Eng. Appl. Sci."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Khan, S., Wahid, M., Khan, T., Ahmad, N., and Zafar, M.H. (2018, January 6\u20137). Column Level Image Authentication Technique using Hidden Digital Signatures. Proceedings of the 2018 24th International Conference on Automation and Computing (ICAC), Newcastle upon Tyne, UK.","DOI":"10.23919\/IConAC.2018.8748967"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Lyu, S., and Farid, H. (2002). Detecting hidden messages using higher-order statistics and support vector machines. Information Hiding, Springer.","DOI":"10.1007\/3-540-36415-3_22"},{"key":"ref_44","unstructured":"Shi, Y.Q., Xuan, G., Zou, D., Gao, J., and Yang, C. (2005, January 6). Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. Proceedings of the International Conference on Multimedia and Expo, Amsterdam, The Netherlands."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Zou, D., Shi, Y.Q., Su, W., and Xuan, G. (2006, January 9\u201312). Steganalysis based on Markov model of thresholded prediction-error image. Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, ON, Canada.","DOI":"10.1109\/ICME.2006.262792"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Rad, R.M., and Wong, K. (2015, January 6\u20138). Digital image forgery detection by edge analysis. Proceedings of the 2015 IEEE International Conference on Consumer Electronics-Taiwan, Taipei, Taiwan.","DOI":"10.1109\/ICCE-TW.2015.7216848"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kashyap, A., Parmar, R.S., Suresh, B., Agarwal, M., and Gupta, H. (2016, January 26\u201328). Detection of digital image forgery using wavelet decomposition and outline analysis. Proceedings of the 2016 International Conference on Signal Processing and Communication (ICSC), Noida, India.","DOI":"10.1109\/ICSPCom.2016.7980573"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/1\/137\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:29:10Z","timestamp":1760362150000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/1\/137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,9]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["sym12010137"],"URL":"https:\/\/doi.org\/10.3390\/sym12010137","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,9]]}}}