Abstract
Wide availability of free image editing tools has made it very convenient to edit digital images. Image editing with wrong intensions is becoming a serious problem. The existing detection method deals with feature point equating and adaptive over segmentation in this work. Suggested conspire coordinates reality-based forgery and block-based detection techniques. Image tempering with bad intentions is becoming more common in the news in media field, patient data in medical field, and several other fields. This paper proposes an adaptive over segmentation-based detection of forged images. To begin, suggested algorithm slices the input picture into well separated and asymmetrical blocks suitably. At that point, the points extricated from scale invariant feature transform (SIFT) are again extricated from individual block. The features such obtained are called block features (BFs). To find labeled feature points, these BFs are equated with one another; this technique roughly shows the speculated fraud locales called surmised forgery locales. To identify the forgery locales correctly, the paper suggest an algorithm called forgery local extrication. Using the algorithm, the super pixels are replaced by the feature points and afterward combines similar local color features into the feature blocks to produce the unified locales. Lastly, to produce the detected forgery locales, we apply the morphological operation to the unified locales. The analyzed outcome and comparative analysis demonstrates that the proposed detection plan accomplishes prominent detection outcomes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
G. Li, Q. Wu, D. Tu, S. Sun, A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD, in Proceedings on IEEE International Conference of Multimedia Expo, July 2007, pp. 1750–1753
S. Bayram et al., An efficient and robust method for detecting copy move forgery, in IEEE International Conference on Acoustics, Speech, and Signal Processing (2009), pp. 1053–1056
Swaminathan et al., digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 1556–6013 (2008)
X.-C. Yuan, C.-M. Pun, X.-L. Bi, Image forgery detection using adaptive oversegmentation and feature point equating. IEEE Trans. Inf. Forensics Secur. 1705–1716 (2015)
B.P. Yadav, An automatic recognization of fake Indian paper currency note using matlab. Int. J. Eng. Sci. Innov. Technol. 3(4) (2014)
V S. Vijayalakshmi, Comparative study of splicing based image forensic detection using KNN, fuzzy and SVM classifiers. Master’s thesis, Visvesvaraya Technological University (2015)
R. Campigotto, A generalized and adaptive method for community detection. French National research agency (2014)
W. Wang, Higher order image co-segmentation. IEEE Trans. Multimedia 18(6) (2016)
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, G. Serra, A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)
B.L. Shivakumar, S.S. Baboo, Detection of region duplication forgery in digital images using SURF. IJCSI Int. J. Comput. Sci. Issues 8(4, 1), 199–205 (2011)
X. Bo, W. Junwen, L. Guangjie, D. Yuewei,Image copy-move forgery detection based on SURF, in 2010 International Conference on Multimedia Information Networking and Security (MINES) (2010), pp. 889–892
X. Pan, S. Ly, Region duplication detection using image feature matching. IEEE Trans. Inf. Forensics Secur. 5(4), 857–867 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nithyusha, N., Chaurasiya, R.K., Meena, O.P. (2022). Identifying Forged Digital Image Using Adaptive Over Segmentation and Feature Point. In: Verma, P., Charan, C., Fernando, X., Ganesan, S. (eds) Advances in Data Computing, Communication and Security. Lecture Notes on Data Engineering and Communications Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-16-8403-6_57
Download citation
DOI: https://doi.org/10.1007/978-981-16-8403-6_57
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8402-9
Online ISBN: 978-981-16-8403-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)