Open Access iconOpen Access

REVIEW

crossmark

An Overview of Image Tamper Detection

by Xingyu Chen*

Engineering Research Center of Digital Forensics of Ministry of Education, School of Computer, Nanjing University of Information Science & Technology, Nanjing, 210044, China

* Corresponding Author: Xingyu Chen. Email: email

Journal of Information Hiding and Privacy Protection 2022, 4(2), 103-113. https://doi.org/10.32604/jihpp.2022.039766

Abstract

With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software, the threshold of digital image editing becomes lower and lower. This makes it easy to trick the human visual system with professionally altered images. These tampered images have brought serious threats to many fields, including personal privacy, news communication, judicial evidence collection, information security and so on. Therefore, the security and reliability of digital information has been increasingly concerned by the international community. In this paper, digital image tamper detection methods are classified according to the clues that they rely on, detection methods based on image content and detection methods based on double JPEG compression traces. This paper analyzes and discusses the important algorithms in several classification methods, and summarizes the problems existing in various methods. Finally, this paper predicts the future development trend of tamper detection.

Keywords


Cite This Article

APA Style
Chen, X. (2022). An overview of image tamper detection. Journal of Information Hiding and Privacy Protection, 4(2), 103-113. https://doi.org/10.32604/jihpp.2022.039766
Vancouver Style
Chen X. An overview of image tamper detection. J Inf Hiding Privacy Protection . 2022;4(2):103-113 https://doi.org/10.32604/jihpp.2022.039766
IEEE Style
X. Chen, “An Overview of Image Tamper Detection,” J. Inf. Hiding Privacy Protection , vol. 4, no. 2, pp. 103-113, 2022. https://doi.org/10.32604/jihpp.2022.039766



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 837

    View

  • 711

    Download

  • 0

    Like

Share Link