A critical literature survey and prospects on tampering and anomaly detection in image data

被引:19
|
作者
da Costa, Kelton A. P. [1 ]
Papa, Joao P. [1 ]
Passos, Leandro A. [1 ]
Colombo, Danilo [2 ]
Del Ser, Javier [3 ,4 ]
Muhammad, Khan [5 ]
de Albuquerque, Victor Hugo C. [6 ]
机构
[1] UNESP Sao Paulo State Univ, Dept Comp, BR-17033360 Bauru, SP, Brazil
[2] Petr Brasileiro SA Petrobras, Cenpes, Rio De Janeiro, RJ, Brazil
[3] Univ Basque Country UPV EHU, Bilbao 48013, Spain
[4] Basque Res & Technol Alliance BRTA, TECNALIA, Derio 48160, Spain
[5] Sejong Univ, Dept Software, Seoul 143747, South Korea
[6] Univ Fortaleza, Grad Program Appl Informat, Fortaleza, Ceara, Brazil
基金
巴西圣保罗研究基金会;
关键词
Image tampering detection; Image splicing detection; Image forgery detection; Noise; Image color analysis; COLLABORATIVE REPRESENTATION; LOW-RANK; ALGORITHM; SECURITY; INTERNET; TENSOR;
D O I
10.1016/j.asoc.2020.106727
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Concernings related to image security have increased in the last years. One of the main reasons relies on the replacement of conventional photography to digital images, once the development of new technologies for image processing, as much as it has helped in the evolution of many new techniques forensic studies, it also provided tools for image tampering. In this context, many companies and researchers devoted many efforts towards methods for detecting such tampered images, mostly aided by autonomous intelligent systems. Therefore, this work focuses on introducing a rigorous survey contemplating the state-of-the-art literature on computer-aided tampered image detection using machine learning techniques, as well as evolutionary computation, neural networks, fuzzy logic, Bayesian reasoning, among others. Besides, it also contemplates anomaly detection methods the context of images due to the intrinsic relation between anomalies and tampering. Moreover, aims at recent and in-depth researches relevant to the context of image tampering detection, performing a survey over more than 100 works related to the subject, spanning across different themes related to image tampering detection. Finally, a critical analysis is performed over this comprehensive compilation of literature, yielding some research opportunities and discussing some challenges in an attempt to align future efforts of the community with the niches and gaps remarked in this exciting field. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Noise features for image tampering detection and steganalysis
    Gou, Hongmei
    Swaminathan, Ashwin
    Wu, Min
    2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 2893 - 2896
  • [32] Image forgery Detection against Forensic Image Digital Tampering
    Ravan, Jitendra
    Dr Thanuja
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 315 - 321
  • [33] Improved Tampering Detection for Image Authentication Based on Image Partitioning
    N. M. Masoodhu Banu
    S. Sujatha
    Wireless Personal Communications, 2015, 84 : 69 - 85
  • [34] Improved Tampering Detection for Image Authentication Based on Image Partitioning
    Banu, N. M. Masoodhu
    Sujatha, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) : 69 - 85
  • [35] Trusted Data Anomaly Detection (TaDA) in Ground Truth Image Data
    Boler, William
    Dale, Ashley
    Christopher, Lauren
    2022 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP, AIPR, 2022,
  • [36] Anomaly Detection: A Survey
    Chandola, Varun
    Banerjee, Arindam
    Kumar, Vipin
    ACM COMPUTING SURVEYS, 2009, 41 (03)
  • [37] Literature Survey on Log-Based Anomaly Detection Framework in Cloud
    Meenakshi
    Ramachandra, A. C.
    Bhattacharya, Subhrajit
    COMPUTATIONAL INTELLIGENCE IN PATTERN RECOGNITION, CIPR 2020, 2020, 1120 : 143 - 153
  • [38] Anomaly Detection for IoT Time-Series Data: A Survey
    Cook, Andrew A.
    Misirli, Goksel
    Fan, Zhong
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 6481 - 6494
  • [39] A Survey on Blockchain Anomaly Detection Using Data Mining Techniques
    Li, Ji
    Gu, Chunxiang
    Wei, Fushan
    Chen, Xi
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 491 - 504
  • [40] Emergence of deepfakes and video tampering detection approaches: A survey
    Staffy Kingra
    Naveen Aggarwal
    Nirmal Kaur
    Multimedia Tools and Applications, 2023, 82 : 10165 - 10209