A comprehensive survey on image authentication for tamper detection with localization

The data that is stored or transmitted in digital form is susceptible to be attacked. Digital images are particularly vulnerable to unauthorized access and illicit alterations. As a result, image credibility verification approaches are constantly gaining popularity due to their importance in a varie...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2023, Vol.82 (2), p.1873-1904
Hauptverfasser: Chennamma, H R, Madhushree, B
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The data that is stored or transmitted in digital form is susceptible to be attacked. Digital images are particularly vulnerable to unauthorized access and illicit alterations. As a result, image credibility verification approaches are constantly gaining popularity due to their importance in a variety of social concerns, including the government, military, forensics, and electronic commerce, among others. Even a minor attack could have disastrous consequences. Therefore, protecting images from tampering has become increasingly crucial. Many approaches have been developed in the literature to ensure the authenticity and integrity of digital images. These methodologies can be grouped into active and passive approaches for image authentication and tampering detection. Active image authentication has a general solution based on watermarking, signature and hybrid techniques. Passive authentication, on the other hand, relies on the image’s inherent natural characteristics to provide implicit authentication. Digital image forensic tools have been utilized for identifying the signs of digital tampering. We have found from the literature of the past three decades that image credibility verification approaches have achieved promising results. However, accurate image tamper localization remains an unsolved problem and a fairly difficult task too, if it is performed carefully with expertise. This motivated us to present a comprehensive review of image authentication techniques, which enables not only image tamper detection but also localize the manipulated region. We also discussed the future work.
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-022-13312-1