Bibliography of digital image anti-forensics and anti-anti-forensics techniques

Muhammad Ali Qureshi, El Sayed M. El-Alfy*

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

17 Scopus citations

Abstract

With the massive increase of online content, widespread of social media, the popularity of smartphones, and rise of security breaches, image forensics has attracted a lot of attention in the past two decades alongside the advancements in digital imaging and processing software. The goal is to be able to verify authenticity, ownership, and copyright of an image and detect changes to the original image. However, more sophisticated image manipulation software tools can use subtle anti-forensics techniques (AFTs) to complicate and hinder detection. This leads security professionals and digital investigators to develop more robust forensics tools and counter solutions to defeat adversarial anti-forensics and win the race. This survey study presents a comprehensive systematic overview of various anti-forensics and anti-AFTs that are proposed in the literature for digital image forensics. These techniques are thoroughly analysed based on various important characteristics and grouped into broad categories. This study also presents a bibliographic analysis of the-state-of-the-art publications in various venues. It assists junior researchers in multimedia security and related fields to understand the significance of existing techniques, research trends, and future directions.

Original languageEnglish
Pages (from-to)1811-1823
Number of pages13
JournalIET Image Processing
Volume13
Issue number11
DOIs
StatePublished - 19 Sep 2019

Bibliographical note

Publisher Copyright:
© The Institution of Engineering and Technology 2019.

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Bibliography of digital image anti-forensics and anti-anti-forensics techniques'. Together they form a unique fingerprint.

Cite this