Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Analysis of Different Techniques of Image Forgery Detection

IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 3
Year of Publication: 2012
G. R. Talmale
R. W. Jasutkar

G R Talmale and R W Jasutkar. Article: Analysis of Different Techniques of Image Forgery Detection. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(3):13-18, May 2012. Full text available. BibTeX

	author = {G. R. Talmale and R. W. Jasutkar},
	title = {Article: Analysis of Different Techniques of Image Forgery Detection},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {3},
	pages = {13-18},
	month = {May},
	note = {Full text available}


Multimedia Forensics has become important in the last few years. There are two main interests, namely source identification and forgery detection. Source identification focuses on identifying the source digital devices (cameras, mobile phones, camcorders, etc) using the media produced by them, while forgery detection attempts to discover evidence of tampering by assessing the authenticity of the digital media (audio clips, video clips, images, etc) . Digital images have seen increased use in applications where their authenticity is of prime importance Digital images can be forged easily with today's widely available image processing software In this paper we describe a passive approach to detect digital forgeries by techniques of image forgery.


  • J. Fridrich, "Methods for "Methods for Tamper Detection in Digital Images", Proc. ACM Workshop on Multimedia and Security, Orlando, FL, October 30?31, 1999, pp. 19?23.
  • S. Saic, J. Flusser, B. Zitová, and J. Lukáš, "Methods for Detection of Additional Manipulations with Digital Images", Research Report, Project RN19992001003 "Detection of Deliberate Changes in Digital Images", ÚTIA AV ?R, Prague, December 1999 (partially in Czech).
  • J. Lukáš, "Digital Image Authentication", Workshop of Czech Technical University 2001,
  • M. Arnold, M. Schmucker, and S. D. Wolthusen. Techniques and Applications of Digital Watermarking and Content Protection. Artech House, Inc. , Norwood, MA, USA, 2003.
  • H. Farid. Creating and detecting doctored and virtual images: Implications to the child pornography prevention act. Department of Computer Science, Dartmouth College, TR2004-518:13, 2004.
  • J. Fridrich and J. Lukas. Estimation of primary quantization matrix in double compressed jpeg images. In Proceedings of DFRWS, volume 2, Cleveland, OH, USA, August 2003.
  • J. Fridrich, D. Soukal, and J. Lukas. Detection of copy– move forgery in digital images. In Proceedings of Digital Forensic Research Workshop, pages 55–61, Cleveland, OH, USA, August 2003. IEEE Computer Society Prague, Czech Republic, February 2001.