Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2020 Mar 4;6(3):9.
doi: 10.3390/jimaging6030009.

A Survey of Deep Learning-Based Source Image Forensics

Affiliations
Review

A Survey of Deep Learning-Based Source Image Forensics

Pengpeng Yang et al. J Imaging. .

Abstract

Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the excellent performance obtained by those techniques on computer vision problems. In this survey, we present the most important data-driven algorithms that deal with the problem of image source forensics. To make order in this vast field, we have divided the area in five sub-topics: source camera identification, recaptured image forensic, computer graphics (CG) image forensic, GAN-generated image detection, and source social network identification. Moreover, we have included the works on anti-forensics and counter anti-forensics. For each of these tasks, we have highlighted advantages and limitations of the methods currently proposed in this promising and rich research field.

Keywords: data driven methods; image forensics; multimedia forensics; source identification.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
The structure of the presented review.
Figure 2
Figure 2
The framework of the deep learning-based algorithms for source forensics. (Section X.X) indicates the subsection where the related technique is described in detail.

References

    1. Zhu B.B., Swanson M.D., Tewfik A.H. When seeing isn’t believing [multimedia authentication technologies] IEEE Signal Process. Mag. 2004;21:40–49. doi: 10.1109/MSP.2004.1276112. - DOI
    1. Farid H. Digital doctoring: How to tell the real from the fake. Significance. 2006;3:162–166. doi: 10.1111/j.1740-9713.2006.00197.x. - DOI
    1. Cao Y.J., Jia L.L., Chen Y.X., Lin N., Yang C., Zhang B., Liu Z., Li X.X., Dai H.H. Recent Advances of Generative Adversarial Networks in Computer Vision. IEEE Access. 2019;7:14985–15006. doi: 10.1109/ACCESS.2018.2886814. - DOI
    1. Beridze I., Butcher J. When seeing is no longer believing. Nat. Mach. Intell. 2019;1:332–334. doi: 10.1038/s42256-019-0085-5. - DOI
    1. Piva A. An overview on image forensics. ISRN Signal Process. 2013;2013 doi: 10.1155/2013/496701. - DOI

LinkOut - more resources