For anyone interested in this area, the IEEE Transactions on Information Forensics and Security (TIFS) [1] is full of papers on the so-called area of <i>image forensics</i> -- the identification of processing that has been performed upon an image, including resampling, rotation, JPEG compression, block processing, and more.<p>Consequently, another hot research area is <i>image anti-forensics</i> -- the obfuscation of such operations to avoid detection. (Shameless self-promotion: one example paper on anti-forensics of JPEG compression can be found here [2].)<p>[1] <a href="http://www.signalprocessingsociety.org/publications/periodicals/forensics/" rel="nofollow">http://www.signalprocessingsociety.org/publications/periodic...</a><p>[2] <a href="http://www.mirlab.org/conference_papers/International_Conference/ICASSP%202010/pdfs/0001694.pdf" rel="nofollow">http://www.mirlab.org/conference_papers/International_Confer...</a>