TY - JOUR
T1 - Copy-move forgery detection
T2 - Survey, challenges and future directions
AU - Warif, Nor Bakiah Abd
AU - Wahab, Ainuddin Wahid Abdul
AU - Idris, Mohd Yamani Idna
AU - Ramli, Roziana
AU - Salleh, Rosli
AU - Shamshirband, Shahaboddin
AU - Choo, Kim Kwang Raymond
N1 - Funding information: This work is fully funded by Bright Sparks Unit, University of Malaya, Malaysia , and partially funded by Ministry of Education, Malaysia under the University of Malaya High Impact Research Grant UM.C/625/1/HIR/MoE/FCSIT/17 .
PY - 2016/11/1
Y1 - 2016/11/1
N2 - The authenticity and reliability of digital images are increasingly important due to the ease in modifying such images. Thus, the capability to identify image manipulation is a current research focus, and a key domain in digital image authentication is Copy-move forgery detection (CMFD). Copy-move forgery is the process of copying and pasting from one region to another location within the same image. In this paper, we survey the recent developments in CMFD, and describe the entire CMFD process involved. Specifically, we characterize the common CMFD workflow of feature extraction and matching process using block or keypoint-based approaches. Instead of listing the datasets and validations used in the literature, we also categorize the types of copied regions. Finally, we also outline a number of future research directions.
AB - The authenticity and reliability of digital images are increasingly important due to the ease in modifying such images. Thus, the capability to identify image manipulation is a current research focus, and a key domain in digital image authentication is Copy-move forgery detection (CMFD). Copy-move forgery is the process of copying and pasting from one region to another location within the same image. In this paper, we survey the recent developments in CMFD, and describe the entire CMFD process involved. Specifically, we characterize the common CMFD workflow of feature extraction and matching process using block or keypoint-based approaches. Instead of listing the datasets and validations used in the literature, we also categorize the types of copied regions. Finally, we also outline a number of future research directions.
KW - Blind detection
KW - Copied region
KW - Copy-move forgery
KW - Image forensics
KW - Image forgery
UR - http://www.scopus.com/inward/record.url?scp=84988420354&partnerID=8YFLogxK
U2 - 10.1016/j.jnca.2016.09.008
DO - 10.1016/j.jnca.2016.09.008
M3 - Review article
AN - SCOPUS:84988420354
SN - 1084-8045
VL - 75
SP - 259
EP - 278
JO - Journal of Network and Computer Applications
JF - Journal of Network and Computer Applications
ER -