Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Inspection on the Art of Diverse Image Tampering Approach: A Survey

IJCA Proceedings on National Conference on “Recent Trends in Information Technology"
© 2016 by IJCA Journal
NCRTIT 2016 - Number 1
Year of Publication: 2016
Sumalatha A.

Sumalatha A.. Article: Inspection on the Art of Diverse Image Tampering Approach: A Survey. IJCA Proceedings on National Conference on Recent Trends in Information Technology" NCRTIT 2016(1):33-38, August 2016. Full text available. BibTeX

	author = {Sumalatha A.},
	title = {Article: Inspection on the Art of Diverse Image Tampering Approach: A Survey},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Information Technology"},
	year = {2016},
	volume = {NCRTIT 2016},
	number = {1},
	pages = {33-38},
	month = {August},
	note = {Full text available}


Nowadays image authenticity plays a vital role. With the advancement in smartphones and other sophisticated software tools and graphical editors, image tampering detection has become very crucial. Images play a vital role in various fields such as Forensic Investigation, Fashion Industry, Journalism,to gain justice in courtrooms, Tabloid in Magazines etc. This paper reviews all the approaches for various image tampering techniques and provides brief insight knowledge on how these techniques contribute to the detection and tampering.


  • Friedman, 1993. Trustworthy digital camera: restoring credibility to the photographic image, IEEE Transactions on Consumer Electronics, 39, 4, (1993), 905-910.
  • Blythe and Fridrich, 2004. Secure digital camera, In Proceedings of the Digital Forensic Research Workshop, (2004), 17-19.
  • Mahdian B. and Saic S, 2010. A bibliography on blind methods for identifying image forgery, J. Signal Processing: Image Communication, Elseveir, 25, 6, (2010), 389-399.
  • M. P. Queluz, "Authentication of Digital Images and Video: Generic models and a new contribution" Signal Processing: Image Communication 16(2001), 461-475.
  • Shan Suthaharan, "Fragile Image Watermarking using a gradient image for improved localization and security", Pattern Recognition Letters 25(2004) 1893-1903.
  • Xunzhan Zhua, Anthony T. S. Hob, Pina Marziliano, " A new semi-fragile image watermarking with robust tampering restoration using irregular sampling", Signal Processing: Image Communication 22(2007), 512-528.
  • X. Zhou, X. Duan, And D. Wang, "A Semifragile Watermark Scheme For Image Authentication," In Multimedia Modelling Conference, 2004. Proceedings. 10th International, 2004, Pp. 374-377.
  • Deguilluame et al. 2003. Secure hybrid robust watermarking resistant against tampering and copy attack, J. signal Processing, Elseveir, 83, 10(2003), 2133-2170.
  • Tzeng and Tsai. 2001. A new technique for authentication of image/video for multimedia applications, In Proceedings of Workshop on Multimedia and Security, ACM Press, new York, USA, (2001), 23-26.
  • R. Bausvs And A. Kriukovas, "Digital Signature Approach For Image Authentication," Electronics & Electrical Engineering, 2008.
  • Dr. S. d. Chede, Prof. P. R. Lakhe "Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method" International Journal of Advanced Research in Computer and Communication engineering Vol 4, Issue 1, January 2015.
  • Hany Farid, "Image Forgery Detection", IEEE SIGNAL PROCESSING MAGAZINE, pp. 16-25, March 2009.
  • H. Shah, P. Shinde and J. Kukreja, "Retouching Detection and Steganalysis", IJEIR, Vol. 2, pp. 487-490, 2013.
  • M. Sridevi, C. Mala, And S. Sanyam, "Comparative Study Of Image Forgery And Copy-Move Techniques," In Advances In Computer Science, Engineering & Applications, Ed: Springer, 2012, Pp. 715-723.
  • N. D. Wandji, S. Xingming, And M. F. Kue, "Detection Of Copy-Move Forgery In Digital Images Based On Dct," International Journal Of Computer Science Issues (Ijcsi), Vol. 10, 2013.