Passive Image Forgery Detection Techniques: A Review, Challenges, and Future Directions
Wireless Personal Communications, ISSN: 1572-834X, Vol: 134, Issue: 3, Page: 1491-1529
2024
- 3Citations
- 12Captures
Metric Options: Counts1 Year3 YearSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Article Description
The rapid advancement of science and technology has led to the potential for easy manipulation of multimedia content through the use of diverse editing tools. This poses a significant threat to the credibility and integrity of multimedia information. Consequently, substantiating digital images is becoming gradually crucial as digital images hold vital information and are used as essential pieces of evidence in various sectors. The necessity and relevance of digital image forensics have drawn several academics to develop various detection procedures in image forensics. Passive image forgery detection is the foundation of image forensics. Some common passive forgeries that influence the image’s authenticity are image splicing, copy-move, and retouching. In recent times, substantial research effort has been devoted to developing novel approaches for detecting several image forgeries. This study provides an overview of similar research efforts that have been carried out utilizing a well-defined methodology. Our goal is to create an efficient way for image forensics researchers to discover new features of forgeries. This study presents a brief introduction to image forensics, including a historical perspective, taxonomy, and framework of image forgery detection approaches. Various resources useful to academic researchers, such as journals, datasets, websites, and performance parameters are explored and presented. This paper will provide a comprehensive review that will aid researchers in overcoming the numerous challenges experienced in earlier studies. Also, future directions are provided to help scholars in this domain. The purpose of this research is to evaluate passive image forgery detection approaches, therefore benefiting new researchers.
Bibliographic Details
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know