SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. I (Jul.-Aug. 2016), PP 86-89
www.iosrjournals.org
DOI: 10.9790/0661-1804018689 www.iosrjournals.org 86 | Page
A Review Paper on Image Forgery Detection In Image Processing
Shivani Thakur1
Ramanpreet Kaur2
Dr. Raman Chadha3
Jasmeet Kaur4
1,4
M.tech student, CGCTC, Jhanjeri, Mohali
2
Assistant Professor CGCTC, Jhanjeri, Mohali
3
Professor, Head(CSE), Jhanjeri, Mohali
Abstract: The image forensics is the technique which is applied to hide image important information. In the
base paper, the technique of SIFT algorithm is applied to mark the objects in the image. In the SIFT algorithm
whole image is scanned and from the scanned image objects are marked. The properties of the marked object
are accessed and objects which have similar properties are classified into group and other are into second. To
classify the similar type of objects techniques like block based & Key Point based technique, shift key point can
be used.
Keywords: Image Processing, image forensics, digital signature, image preprocessing.
I. Introduction
A digital image is defined as a 2D function i.e. f(x,y) where (x,y) shows the spatial coordinates and the
amplitude of f at any point (x,y) known as the intensity or gray level of image at that particular point. In case
when x,y and the amplitude value of f are finite and discrete quantities, we can call that image as a digital
image. Basically, an image i.e. processed by a digital computer is called as a digital image. It may be noted that
a digital image consists of a finite number of elements which are having a particular location and value. These
elements of image are known as image elements, picture elements or pixels.
Image processing is a technique in which the image is converted into digital form and some operations are
performed on it for the purpose of getting and enhanced image or extracting some meaningful or useful
information from it. It is a kind of signal processing in which the input may be image e.g. video frame,
photograph and .output may possibly be the image or some characteristics related with the image. Image
processing involves the following three steps:
1. Involves importing the image via using image acquisition tool which may be optical scanner or digital
photography.
2. Now the image is analyzed and manipulated which involves data compression and image enhancement.
3. Last stage is output which involves the result i.e. altered image. There are two methods that are used for
image processing:
i. Analog image processing
ii. Digital image processing
i. Analog image processing
It may be used for hard copies i.e. printouts or photographs etc.
ii. Digital image processing
It is the process of manipulating the digital image using computers.
Fig1. Digital image processing
II. Literatute Review
This review paper provides a survey on different image forensics techniques which are given in
previous papers. In this paper [1], they have proposed methodologies to identify these images and find out the
fake region of the forgery image. They have developed algorithm depend upon the concept of abnormal
anomalies and identify the forgery regions.
A Review Paper on Image Forgery Detection In Image Processing
DOI: 10.9790/0661-1804018689 www.iosrjournals.org 87 | Page
In this paper [2], first of all classification of image forgery detection technique has been discussed. After that
pixel based detection is also defined. A technique for copy-move forgery detections discussed. But this
technique is applied on shifted region only. Proposed technique is developed to cover all the limitation of the
both the techniques and fast copy moving technique.
In this paper [3], they reviewed the technique to remove shift key point attacks from the image for the
betterment of SIFT-based copy–move forgery detection. To handle these types of attacks three forensic
techniques have discussed in this paper. They apply the detectors to a practical image forensic scenario of SIFT-
based copy-move forgery detection to assume the SIFT-based detectors and as a result give new proposed
technique.
In this paper [4], they explained that it is very easy to tamper the images. Image forensic can be used to
determine the protection of the image. They have discussed the various copy move forgery detection techniques
which includes Block based & Key Point based techniques.
In this paper [7], they discussed passive approach to detect digital forgeries by checking its artifact
consistencies. JPEG image compression could be used as a natural authentication code for blocking artifact. A
technique has been proposed based on estimated quantized table using power spectrum of the DCT coefficient
histogram. Experiments have been done to validate proposed techniques and in future discovery of other image
quality consistencies is measured.
In this paper [6] they classified the image forgery detection technique. Later on they also discussed two
important techniques for the pixel based forgery detection. In this paper they also have discussed copy-move
forgery detection technique. This technique only deals with shifting of copied regions. So there is a need of
another technique for fast copy move detection and it is also discussed in this paper. At the end both techniques
are compared and analyzed.
III. Various Techniques Of Image Processing
Various techniques of the image processing are:
1. Image Representation
2. Image Preprocessing
3. Image Enhancement
4. Image Analysis
5. Image Segmentation
6. Image Restoration
7. Image Compression
1. Image Representation
In the real world image is defined as a function of two real variables. We can say that f(x,y) with f as
the amplitude or brightness of the image at the real coordination position (x,y). In most cases f(x,y) which is
lying on the face of the sensors. Typically an image file such as JPEG, BMP, TIFF etc [2], has some header and
picture information. A header generally consists details like format identifier, number of bits/pixel, resolution,
compression type etc.
2. Image Preprocessing
The main aim of preprocessing is an improvement of image data which is used to remove unwanted
images and distortions from the images for image processing.
3. Image Enhancement
Sometimes images which are obtained from satellites and cameras have poor quality of brightness and
contrast because limitations of imaging sub system and illumination while capturing image. Image has different
types of noise. In image enhancement, the goal is to accentuate certain image features for subsequent analysis or
for image display [1,2].
4. Image Analysis
Image Analysis is concerned with quantitative measurement of the image to make it perfect and noise
free. It requires extraction of certain features for the identification of the object. Segmentation techniques are
used to isolate desired objects from the scene to make them perfect [5].
5. Image Segmentation
Image segmentation is the process on which image can be divided into number of its subparts. The
problem which is being solved is responsible for the division of the object identification.
A Review Paper on Image Forgery Detection In Image Processing
DOI: 10.9790/0661-1804018689 www.iosrjournals.org 88 | Page
6. Image Restoration
It is concerned with filtering the observed image to minimize the effect of degradations. Effectiveness
of image restoration depends on the extent and accuracy of the knowledge of degradation process as well as on
filter design. Image restoration differs from image enhancement in that the latter is concerned with more
extraction or accentuation of image features.
7. Image Compression
It is concerned with minimizing the no of bits required to represent an image. Application of
compression are in broadcast TV, remote sensing via satellite, military communication via aircraft, radar,
teleconferencing, facsimile transmission, for educational & business documents , medical images that arise in
computer tomography, magnetic resonance imaging and digital radiology, motion , pictures ,satellite images,
weather maps, geological surveys and so on [2].
IV. Challenges In Digital Image Processing
1. Compression: The image storage and transmission involves the use of digital techniques 2.
Enhancement: In case of enhancement the quality of image is improved. The quality of image may be poor in
terms of contrast which may be low, image may be noisy or it may be blurred etc. In order to overcome this,
many algorithms have been used .But difficult part is how we can remove the degradation without hurting the
signal. A major challenge is in digital image processing is how can we enhance severely degraded images. 3.
Recognition: An image recognition system means to classify input pattern into one of a set of pre-specified
classes. This task is easy in case of number of classes is small and if the members in the same class are almost
same. But difficulty level increases if the number of classes is large or if the member in same class can look
very different.4. Visualization: The main task of visualization is to generate images based on three dimensional
object and scene object. The main challenge is how we can model dynamic scenes containing non-grid objects.
The model should be realistic and the computation cost should be reasonable.
V. Image Forgery Detection
Nowadays it is easy to remove and add some elements from the image for the purpose to manipulate
and to get some good results of image forgeries. In image processing, different types of software are used. Some
software can change a particular block of image without affecting the originality of the image. This kind of
modification cannot be noticed by human eye. The main task is to verify the original image. For the purpose of
manipulating an image various techniques of image processing like scaling, rotation, blurring, filtering and
cropping can be used. The image forgery detection is required in various fields of image processing. Image
forgery detection is raising research field with important applications for ensuring the credibility of digital
images.Image processing can be divided into two categories:
a. Active Approach
b. Passive Approach
a. Active Approach: In active approach, some preprocessing of digital image like embedded watermark or
signature generation is required at the time of creating image and limits its applications. This approach is not
used for authentication purpose.
b. Passive Approach: In the passive approach, digital signature is not used for the purpose of authentication. In
this technique some assumptions are used that digital forensics may not leave any visual clue for tempering the
image. It may alter the underlying statistics of image. The image forensics tools can be grouped into five
categories:
i. Pixel based technique
ii. Format based technique
iii. Camera based technique
iv. Physically based technique
v. Geometric based technique
VI. Comparison Table
Author Year Description Outcome
S. Murali et al [1] 2012 methodologies to identify these
images and find out the fake
region of the forgery image.
algorithm depend upon the concept of
abnormal anomalies and identify the
forgery regions.
Andrea Costanzo et.al [3] 2014 To handle shift key point of
attacks three forensic techniques
have discussed.
apply the detectors to a practical image
forensic scenario of SIFT-based copy-
move forgery detection to assume the
SIFT-based detectors .
A Review Paper on Image Forgery Detection In Image Processing
DOI: 10.9790/0661-1804018689 www.iosrjournals.org 89 | Page
Ms. P. G.Gomase, Ms. N. R.
Wankhade [2]
2014 pixel based detection is defined No method achieved 100% robustness
against post processing operations.
Rohini.A.Maind et.al [5] 2014 four features are extracted to
reduce the dimensions
do blurring and remove noise from the
image with low complexity
Gagandeep Kaur, Manoj
Kumar [4]
2015 various copy move forgery
detection techniques
Block based & Key Point based
techniques.
VII. Conclusion
In order to detect image forgery, an accurate and successful method should be used and this can be
done with the help of image processing a approach. This paper reviewed various techniques which have been
already used. These techniques are related to segmentation and classification. Using these methods,
identification image forgeries has been accurately done but still having some chances for the improvements in
the existing techniques.
References
[1]. S And Basavaraj S. Anami, “ Comparison And Analysis Of Photo Image Forgery Detection Techniques”, International Journal
On Computational Sciences & Applications (Ijcsa) Vo2, No.6, December 2012
[2]. Ms. P. G.Gomase, Ms. N. R. Wankhade, “ Advanced Digital Image Forgery Detection- A Review”, Iosr Journal Of Computer
Science (Iosr-Jce) E-Issn: 2278-0661, P-Issn: 2278-8727 Pp 80-83 2014
[3]. Andrea Costanzo, Irene Amerini, Roberto Caldelli, Mauro Barni, “Forensic Analysis Of Sift Keypoint Removal And Injection”,
Ieee Transactions On Information Forensics And Security, Vol. 9, No. 9, September 2014
[4]. Gagandeep Kaur, Manoj Kumar, “Study Of Various Copy Move Forgery Attack Detection In Digital Images”, International Journal
Of Research In Computer Applications And Robotics, Vol.3 Issue 9, Pg.: 30-34 September 2015
[5]. Rohini.A.Maind, Alka Khade, D.K.Chitre, “Image Copy Move Forgery Detection Using Block Representing Method”,
International Journal Of Soft Computing And Engineering (Ijsce) Issn: 2231-2307, Volume-4, Issue-2, May 2014
[6]. Pradyumna Deshpande , Prashasti Kanikar, “Pixel Based Digital Image Forgery Detection Techniques”, International Journal Of
Engineering Research And Applications (Ijera) Issn: 2248-9622 Vol. 2, Issue 3, May-Jun 2012, Pp. 539-543
[7]. Shuiming Ye, Qibin Sun ,And Ee-Chien Chang, “Detecting Digital Image Forgeries By Measuring Inconsistencies Of Block
Artifact”, Ieee, 2007
[8]. Preeti Yadav, Yogeshrathore, Aarti Yadav,” Dwt Based Copymove Image Forgery Detection”, International Journal Of Advanced
Research In Computer Science An Electronics Engineering Volume 1, Issue 5, July 2012
[9]. Maind. R,Khade.A, Chitre.D, “Image Copy Move Forgery Detection Using Block Representing Method”, International Journal Of
Soft Computing And Engineering (Ijsce) Issn: 2231-2307, Volume-4, Issue-2, May 2014
[10]. Sundaram. M And C. Nandini, “Feature Based Image Authentication Using Symmetric Surround Saliency Mapping In Image
Forensics” International Journal Of Computer Applications (0975 – 8887) Volume 104 – No.13, October 2014.
[11]. Yadav.P, Rathore.Y, Yadav.A,” Dwt Based Copymove Image Forgery Detection”, International Journal Of Advanced Research In
Computer Science An Electronics Engineering Volume 1, Issue 5, July 2012
[12]. Ye.S, Sun.S And Chang.E, “Detecting Digital Image Forgeries By Measuring Inconsistencies Of Block Artifact”, Ieee, 2007

More Related Content

Similar to A Review Paper On Image Forgery Detection In Image Processing

IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET Journal
 
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...IRJET Journal
 
Jc3416551658
Jc3416551658Jc3416551658
Jc3416551658IJERA Editor
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering DetectionIRJET Journal
 
Unit 1 DIP Fundamentals - Presentation Notes.pdf
Unit 1 DIP Fundamentals - Presentation Notes.pdfUnit 1 DIP Fundamentals - Presentation Notes.pdf
Unit 1 DIP Fundamentals - Presentation Notes.pdfsdbhosale860
 
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics IJECEIAES
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryIRJET Journal
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Editor IJARCET
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Editor IJARCET
 
Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...
Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...
Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...dbpublications
 
A_Survey_Paper_on_Image_Classification_and_Methods.pdf
A_Survey_Paper_on_Image_Classification_and_Methods.pdfA_Survey_Paper_on_Image_Classification_and_Methods.pdf
A_Survey_Paper_on_Image_Classification_and_Methods.pdfBijayNag1
 
IRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET Journal
 
Analysis Of Medical Image Processing And Its Application In Healthcare
Analysis Of Medical Image Processing And Its Application In HealthcareAnalysis Of Medical Image Processing And Its Application In Healthcare
Analysis Of Medical Image Processing And Its Application In HealthcarePedro Craggett
 
Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...IRJET Journal
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...journalBEEI
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningIRJET Journal
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxAROCKIAJAYAIECW
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...IRJET Journal
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 

Similar to A Review Paper On Image Forgery Detection In Image Processing (20)

IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
 
Jc3416551658
Jc3416551658Jc3416551658
Jc3416551658
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering Detection
 
Unit 1 DIP Fundamentals - Presentation Notes.pdf
Unit 1 DIP Fundamentals - Presentation Notes.pdfUnit 1 DIP Fundamentals - Presentation Notes.pdf
Unit 1 DIP Fundamentals - Presentation Notes.pdf
 
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
 
Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978Volume 2-issue-6-1974-1978
Volume 2-issue-6-1974-1978
 
G010245056
G010245056G010245056
G010245056
 
Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...
Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...
Image Forgery Detection Using Feature Point Matching and Adaptive Over Segmen...
 
A_Survey_Paper_on_Image_Classification_and_Methods.pdf
A_Survey_Paper_on_Image_Classification_and_Methods.pdfA_Survey_Paper_on_Image_Classification_and_Methods.pdf
A_Survey_Paper_on_Image_Classification_and_Methods.pdf
 
IRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDL
 
Analysis Of Medical Image Processing And Its Application In Healthcare
Analysis Of Medical Image Processing And Its Application In HealthcareAnalysis Of Medical Image Processing And Its Application In Healthcare
Analysis Of Medical Image Processing And Its Application In Healthcare
 
Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...Detection of a user-defined object in an image using feature extraction- Trai...
Detection of a user-defined object in an image using feature extraction- Trai...
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 

More from Jennifer Daniel

Fitness Reflection Essay Title
Fitness Reflection Essay TitleFitness Reflection Essay Title
Fitness Reflection Essay TitleJennifer Daniel
 
Myself Essay In English - YouTube
Myself Essay In English - YouTubeMyself Essay In English - YouTube
Myself Essay In English - YouTubeJennifer Daniel
 
Narrative Writing Worksheets
Narrative Writing WorksheetsNarrative Writing Worksheets
Narrative Writing WorksheetsJennifer Daniel
 
Amazing Descriptive Essays Examples Thatsnotus
Amazing Descriptive Essays Examples ThatsnotusAmazing Descriptive Essays Examples Thatsnotus
Amazing Descriptive Essays Examples ThatsnotusJennifer Daniel
 
004 Philosophy In Life Sample Essay Example
004 Philosophy In Life Sample Essay Example004 Philosophy In Life Sample Essay Example
004 Philosophy In Life Sample Essay ExampleJennifer Daniel
 
How To Start Your Body Paragraph. How To Write Body Paragraphs For
How To Start Your Body Paragraph. How To Write Body Paragraphs ForHow To Start Your Body Paragraph. How To Write Body Paragraphs For
How To Start Your Body Paragraph. How To Write Body Paragraphs ForJennifer Daniel
 
Note Making Techniques
Note Making TechniquesNote Making Techniques
Note Making TechniquesJennifer Daniel
 
Descriptive Essay Essay Homework Help
Descriptive Essay Essay Homework HelpDescriptive Essay Essay Homework Help
Descriptive Essay Essay Homework HelpJennifer Daniel
 
Project Server 2022 Reporting Database Diagr
Project Server 2022 Reporting Database DiagrProject Server 2022 Reporting Database Diagr
Project Server 2022 Reporting Database DiagrJennifer Daniel
 
Systematic Review Abstract Example - EXAMPLEPAP
Systematic Review Abstract Example - EXAMPLEPAPSystematic Review Abstract Example - EXAMPLEPAP
Systematic Review Abstract Example - EXAMPLEPAPJennifer Daniel
 
Sle Report Writing Format Pdf Gratitude41117 Report Wri
Sle Report Writing Format Pdf Gratitude41117  Report WriSle Report Writing Format Pdf Gratitude41117  Report Wri
Sle Report Writing Format Pdf Gratitude41117 Report WriJennifer Daniel
 
Teacher Marked Essays - Writerstable.Web.Fc2.Com
Teacher Marked Essays - Writerstable.Web.Fc2.ComTeacher Marked Essays - Writerstable.Web.Fc2.Com
Teacher Marked Essays - Writerstable.Web.Fc2.ComJennifer Daniel
 
How To Start Writing Poetry For Beginners - Emanuel
How To Start Writing Poetry For Beginners - EmanuelHow To Start Writing Poetry For Beginners - Emanuel
How To Start Writing Poetry For Beginners - EmanuelJennifer Daniel
 
Business Paper Opening Paragraph
Business Paper Opening ParagraphBusiness Paper Opening Paragraph
Business Paper Opening ParagraphJennifer Daniel
 
Philosophy 2200 Essay Exam 2
Philosophy 2200 Essay Exam 2Philosophy 2200 Essay Exam 2
Philosophy 2200 Essay Exam 2Jennifer Daniel
 
Gardening Essays And Q
Gardening Essays And QGardening Essays And Q
Gardening Essays And QJennifer Daniel
 
Free Clipart Pencil And Paper 10 Free Cliparts Downloa
Free Clipart Pencil And Paper 10 Free Cliparts  DownloaFree Clipart Pencil And Paper 10 Free Cliparts  Downloa
Free Clipart Pencil And Paper 10 Free Cliparts DownloaJennifer Daniel
 
Individual Psychology Reflection Essay Example
Individual Psychology Reflection Essay ExampleIndividual Psychology Reflection Essay Example
Individual Psychology Reflection Essay ExampleJennifer Daniel
 
😂 Great Essay Titles. Top 30 Narrative Essay Titles You
😂 Great Essay Titles. Top 30 Narrative Essay Titles You😂 Great Essay Titles. Top 30 Narrative Essay Titles You
😂 Great Essay Titles. Top 30 Narrative Essay Titles YouJennifer Daniel
 
Pin On Halloween Printables
Pin On Halloween PrintablesPin On Halloween Printables
Pin On Halloween PrintablesJennifer Daniel
 

More from Jennifer Daniel (20)

Fitness Reflection Essay Title
Fitness Reflection Essay TitleFitness Reflection Essay Title
Fitness Reflection Essay Title
 
Myself Essay In English - YouTube
Myself Essay In English - YouTubeMyself Essay In English - YouTube
Myself Essay In English - YouTube
 
Narrative Writing Worksheets
Narrative Writing WorksheetsNarrative Writing Worksheets
Narrative Writing Worksheets
 
Amazing Descriptive Essays Examples Thatsnotus
Amazing Descriptive Essays Examples ThatsnotusAmazing Descriptive Essays Examples Thatsnotus
Amazing Descriptive Essays Examples Thatsnotus
 
004 Philosophy In Life Sample Essay Example
004 Philosophy In Life Sample Essay Example004 Philosophy In Life Sample Essay Example
004 Philosophy In Life Sample Essay Example
 
How To Start Your Body Paragraph. How To Write Body Paragraphs For
How To Start Your Body Paragraph. How To Write Body Paragraphs ForHow To Start Your Body Paragraph. How To Write Body Paragraphs For
How To Start Your Body Paragraph. How To Write Body Paragraphs For
 
Note Making Techniques
Note Making TechniquesNote Making Techniques
Note Making Techniques
 
Descriptive Essay Essay Homework Help
Descriptive Essay Essay Homework HelpDescriptive Essay Essay Homework Help
Descriptive Essay Essay Homework Help
 
Project Server 2022 Reporting Database Diagr
Project Server 2022 Reporting Database DiagrProject Server 2022 Reporting Database Diagr
Project Server 2022 Reporting Database Diagr
 
Systematic Review Abstract Example - EXAMPLEPAP
Systematic Review Abstract Example - EXAMPLEPAPSystematic Review Abstract Example - EXAMPLEPAP
Systematic Review Abstract Example - EXAMPLEPAP
 
Sle Report Writing Format Pdf Gratitude41117 Report Wri
Sle Report Writing Format Pdf Gratitude41117  Report WriSle Report Writing Format Pdf Gratitude41117  Report Wri
Sle Report Writing Format Pdf Gratitude41117 Report Wri
 
Teacher Marked Essays - Writerstable.Web.Fc2.Com
Teacher Marked Essays - Writerstable.Web.Fc2.ComTeacher Marked Essays - Writerstable.Web.Fc2.Com
Teacher Marked Essays - Writerstable.Web.Fc2.Com
 
How To Start Writing Poetry For Beginners - Emanuel
How To Start Writing Poetry For Beginners - EmanuelHow To Start Writing Poetry For Beginners - Emanuel
How To Start Writing Poetry For Beginners - Emanuel
 
Business Paper Opening Paragraph
Business Paper Opening ParagraphBusiness Paper Opening Paragraph
Business Paper Opening Paragraph
 
Philosophy 2200 Essay Exam 2
Philosophy 2200 Essay Exam 2Philosophy 2200 Essay Exam 2
Philosophy 2200 Essay Exam 2
 
Gardening Essays And Q
Gardening Essays And QGardening Essays And Q
Gardening Essays And Q
 
Free Clipart Pencil And Paper 10 Free Cliparts Downloa
Free Clipart Pencil And Paper 10 Free Cliparts  DownloaFree Clipart Pencil And Paper 10 Free Cliparts  Downloa
Free Clipart Pencil And Paper 10 Free Cliparts Downloa
 
Individual Psychology Reflection Essay Example
Individual Psychology Reflection Essay ExampleIndividual Psychology Reflection Essay Example
Individual Psychology Reflection Essay Example
 
😂 Great Essay Titles. Top 30 Narrative Essay Titles You
😂 Great Essay Titles. Top 30 Narrative Essay Titles You😂 Great Essay Titles. Top 30 Narrative Essay Titles You
😂 Great Essay Titles. Top 30 Narrative Essay Titles You
 
Pin On Halloween Printables
Pin On Halloween PrintablesPin On Halloween Printables
Pin On Halloween Printables
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

A Review Paper On Image Forgery Detection In Image Processing

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. I (Jul.-Aug. 2016), PP 86-89 www.iosrjournals.org DOI: 10.9790/0661-1804018689 www.iosrjournals.org 86 | Page A Review Paper on Image Forgery Detection In Image Processing Shivani Thakur1 Ramanpreet Kaur2 Dr. Raman Chadha3 Jasmeet Kaur4 1,4 M.tech student, CGCTC, Jhanjeri, Mohali 2 Assistant Professor CGCTC, Jhanjeri, Mohali 3 Professor, Head(CSE), Jhanjeri, Mohali Abstract: The image forensics is the technique which is applied to hide image important information. In the base paper, the technique of SIFT algorithm is applied to mark the objects in the image. In the SIFT algorithm whole image is scanned and from the scanned image objects are marked. The properties of the marked object are accessed and objects which have similar properties are classified into group and other are into second. To classify the similar type of objects techniques like block based & Key Point based technique, shift key point can be used. Keywords: Image Processing, image forensics, digital signature, image preprocessing. I. Introduction A digital image is defined as a 2D function i.e. f(x,y) where (x,y) shows the spatial coordinates and the amplitude of f at any point (x,y) known as the intensity or gray level of image at that particular point. In case when x,y and the amplitude value of f are finite and discrete quantities, we can call that image as a digital image. Basically, an image i.e. processed by a digital computer is called as a digital image. It may be noted that a digital image consists of a finite number of elements which are having a particular location and value. These elements of image are known as image elements, picture elements or pixels. Image processing is a technique in which the image is converted into digital form and some operations are performed on it for the purpose of getting and enhanced image or extracting some meaningful or useful information from it. It is a kind of signal processing in which the input may be image e.g. video frame, photograph and .output may possibly be the image or some characteristics related with the image. Image processing involves the following three steps: 1. Involves importing the image via using image acquisition tool which may be optical scanner or digital photography. 2. Now the image is analyzed and manipulated which involves data compression and image enhancement. 3. Last stage is output which involves the result i.e. altered image. There are two methods that are used for image processing: i. Analog image processing ii. Digital image processing i. Analog image processing It may be used for hard copies i.e. printouts or photographs etc. ii. Digital image processing It is the process of manipulating the digital image using computers. Fig1. Digital image processing II. Literatute Review This review paper provides a survey on different image forensics techniques which are given in previous papers. In this paper [1], they have proposed methodologies to identify these images and find out the fake region of the forgery image. They have developed algorithm depend upon the concept of abnormal anomalies and identify the forgery regions.
  • 2. A Review Paper on Image Forgery Detection In Image Processing DOI: 10.9790/0661-1804018689 www.iosrjournals.org 87 | Page In this paper [2], first of all classification of image forgery detection technique has been discussed. After that pixel based detection is also defined. A technique for copy-move forgery detections discussed. But this technique is applied on shifted region only. Proposed technique is developed to cover all the limitation of the both the techniques and fast copy moving technique. In this paper [3], they reviewed the technique to remove shift key point attacks from the image for the betterment of SIFT-based copy–move forgery detection. To handle these types of attacks three forensic techniques have discussed in this paper. They apply the detectors to a practical image forensic scenario of SIFT- based copy-move forgery detection to assume the SIFT-based detectors and as a result give new proposed technique. In this paper [4], they explained that it is very easy to tamper the images. Image forensic can be used to determine the protection of the image. They have discussed the various copy move forgery detection techniques which includes Block based & Key Point based techniques. In this paper [7], they discussed passive approach to detect digital forgeries by checking its artifact consistencies. JPEG image compression could be used as a natural authentication code for blocking artifact. A technique has been proposed based on estimated quantized table using power spectrum of the DCT coefficient histogram. Experiments have been done to validate proposed techniques and in future discovery of other image quality consistencies is measured. In this paper [6] they classified the image forgery detection technique. Later on they also discussed two important techniques for the pixel based forgery detection. In this paper they also have discussed copy-move forgery detection technique. This technique only deals with shifting of copied regions. So there is a need of another technique for fast copy move detection and it is also discussed in this paper. At the end both techniques are compared and analyzed. III. Various Techniques Of Image Processing Various techniques of the image processing are: 1. Image Representation 2. Image Preprocessing 3. Image Enhancement 4. Image Analysis 5. Image Segmentation 6. Image Restoration 7. Image Compression 1. Image Representation In the real world image is defined as a function of two real variables. We can say that f(x,y) with f as the amplitude or brightness of the image at the real coordination position (x,y). In most cases f(x,y) which is lying on the face of the sensors. Typically an image file such as JPEG, BMP, TIFF etc [2], has some header and picture information. A header generally consists details like format identifier, number of bits/pixel, resolution, compression type etc. 2. Image Preprocessing The main aim of preprocessing is an improvement of image data which is used to remove unwanted images and distortions from the images for image processing. 3. Image Enhancement Sometimes images which are obtained from satellites and cameras have poor quality of brightness and contrast because limitations of imaging sub system and illumination while capturing image. Image has different types of noise. In image enhancement, the goal is to accentuate certain image features for subsequent analysis or for image display [1,2]. 4. Image Analysis Image Analysis is concerned with quantitative measurement of the image to make it perfect and noise free. It requires extraction of certain features for the identification of the object. Segmentation techniques are used to isolate desired objects from the scene to make them perfect [5]. 5. Image Segmentation Image segmentation is the process on which image can be divided into number of its subparts. The problem which is being solved is responsible for the division of the object identification.
  • 3. A Review Paper on Image Forgery Detection In Image Processing DOI: 10.9790/0661-1804018689 www.iosrjournals.org 88 | Page 6. Image Restoration It is concerned with filtering the observed image to minimize the effect of degradations. Effectiveness of image restoration depends on the extent and accuracy of the knowledge of degradation process as well as on filter design. Image restoration differs from image enhancement in that the latter is concerned with more extraction or accentuation of image features. 7. Image Compression It is concerned with minimizing the no of bits required to represent an image. Application of compression are in broadcast TV, remote sensing via satellite, military communication via aircraft, radar, teleconferencing, facsimile transmission, for educational & business documents , medical images that arise in computer tomography, magnetic resonance imaging and digital radiology, motion , pictures ,satellite images, weather maps, geological surveys and so on [2]. IV. Challenges In Digital Image Processing 1. Compression: The image storage and transmission involves the use of digital techniques 2. Enhancement: In case of enhancement the quality of image is improved. The quality of image may be poor in terms of contrast which may be low, image may be noisy or it may be blurred etc. In order to overcome this, many algorithms have been used .But difficult part is how we can remove the degradation without hurting the signal. A major challenge is in digital image processing is how can we enhance severely degraded images. 3. Recognition: An image recognition system means to classify input pattern into one of a set of pre-specified classes. This task is easy in case of number of classes is small and if the members in the same class are almost same. But difficulty level increases if the number of classes is large or if the member in same class can look very different.4. Visualization: The main task of visualization is to generate images based on three dimensional object and scene object. The main challenge is how we can model dynamic scenes containing non-grid objects. The model should be realistic and the computation cost should be reasonable. V. Image Forgery Detection Nowadays it is easy to remove and add some elements from the image for the purpose to manipulate and to get some good results of image forgeries. In image processing, different types of software are used. Some software can change a particular block of image without affecting the originality of the image. This kind of modification cannot be noticed by human eye. The main task is to verify the original image. For the purpose of manipulating an image various techniques of image processing like scaling, rotation, blurring, filtering and cropping can be used. The image forgery detection is required in various fields of image processing. Image forgery detection is raising research field with important applications for ensuring the credibility of digital images.Image processing can be divided into two categories: a. Active Approach b. Passive Approach a. Active Approach: In active approach, some preprocessing of digital image like embedded watermark or signature generation is required at the time of creating image and limits its applications. This approach is not used for authentication purpose. b. Passive Approach: In the passive approach, digital signature is not used for the purpose of authentication. In this technique some assumptions are used that digital forensics may not leave any visual clue for tempering the image. It may alter the underlying statistics of image. The image forensics tools can be grouped into five categories: i. Pixel based technique ii. Format based technique iii. Camera based technique iv. Physically based technique v. Geometric based technique VI. Comparison Table Author Year Description Outcome S. Murali et al [1] 2012 methodologies to identify these images and find out the fake region of the forgery image. algorithm depend upon the concept of abnormal anomalies and identify the forgery regions. Andrea Costanzo et.al [3] 2014 To handle shift key point of attacks three forensic techniques have discussed. apply the detectors to a practical image forensic scenario of SIFT-based copy- move forgery detection to assume the SIFT-based detectors .
  • 4. A Review Paper on Image Forgery Detection In Image Processing DOI: 10.9790/0661-1804018689 www.iosrjournals.org 89 | Page Ms. P. G.Gomase, Ms. N. R. Wankhade [2] 2014 pixel based detection is defined No method achieved 100% robustness against post processing operations. Rohini.A.Maind et.al [5] 2014 four features are extracted to reduce the dimensions do blurring and remove noise from the image with low complexity Gagandeep Kaur, Manoj Kumar [4] 2015 various copy move forgery detection techniques Block based & Key Point based techniques. VII. Conclusion In order to detect image forgery, an accurate and successful method should be used and this can be done with the help of image processing a approach. This paper reviewed various techniques which have been already used. These techniques are related to segmentation and classification. Using these methods, identification image forgeries has been accurately done but still having some chances for the improvements in the existing techniques. References [1]. S And Basavaraj S. Anami, “ Comparison And Analysis Of Photo Image Forgery Detection Techniques”, International Journal On Computational Sciences & Applications (Ijcsa) Vo2, No.6, December 2012 [2]. Ms. P. G.Gomase, Ms. N. R. Wankhade, “ Advanced Digital Image Forgery Detection- A Review”, Iosr Journal Of Computer Science (Iosr-Jce) E-Issn: 2278-0661, P-Issn: 2278-8727 Pp 80-83 2014 [3]. Andrea Costanzo, Irene Amerini, Roberto Caldelli, Mauro Barni, “Forensic Analysis Of Sift Keypoint Removal And Injection”, Ieee Transactions On Information Forensics And Security, Vol. 9, No. 9, September 2014 [4]. Gagandeep Kaur, Manoj Kumar, “Study Of Various Copy Move Forgery Attack Detection In Digital Images”, International Journal Of Research In Computer Applications And Robotics, Vol.3 Issue 9, Pg.: 30-34 September 2015 [5]. Rohini.A.Maind, Alka Khade, D.K.Chitre, “Image Copy Move Forgery Detection Using Block Representing Method”, International Journal Of Soft Computing And Engineering (Ijsce) Issn: 2231-2307, Volume-4, Issue-2, May 2014 [6]. Pradyumna Deshpande , Prashasti Kanikar, “Pixel Based Digital Image Forgery Detection Techniques”, International Journal Of Engineering Research And Applications (Ijera) Issn: 2248-9622 Vol. 2, Issue 3, May-Jun 2012, Pp. 539-543 [7]. Shuiming Ye, Qibin Sun ,And Ee-Chien Chang, “Detecting Digital Image Forgeries By Measuring Inconsistencies Of Block Artifact”, Ieee, 2007 [8]. Preeti Yadav, Yogeshrathore, Aarti Yadav,” Dwt Based Copymove Image Forgery Detection”, International Journal Of Advanced Research In Computer Science An Electronics Engineering Volume 1, Issue 5, July 2012 [9]. Maind. R,Khade.A, Chitre.D, “Image Copy Move Forgery Detection Using Block Representing Method”, International Journal Of Soft Computing And Engineering (Ijsce) Issn: 2231-2307, Volume-4, Issue-2, May 2014 [10]. Sundaram. M And C. Nandini, “Feature Based Image Authentication Using Symmetric Surround Saliency Mapping In Image Forensics” International Journal Of Computer Applications (0975 – 8887) Volume 104 – No.13, October 2014. [11]. Yadav.P, Rathore.Y, Yadav.A,” Dwt Based Copymove Image Forgery Detection”, International Journal Of Advanced Research In Computer Science An Electronics Engineering Volume 1, Issue 5, July 2012 [12]. Ye.S, Sun.S And Chang.E, “Detecting Digital Image Forgeries By Measuring Inconsistencies Of Block Artifact”, Ieee, 2007