Skip to main content
Log in

An improved block based copy-move forgery detection technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the increase in demand for identification of authenticity of the digital images, researchers are widely studying the image forgery detection techniques. Copy-move forgery is amongst the commonly used forgery, which is performed by copying a part of an image and then pasting it on the same or different image. This results in the concealing of image content. Most of the existing copy-move forgery detection techniques are subjected to degradation in results, under the effect of geometric transformations. In this paper, a Discrete Cosine Transformation (DCT) and Singular Value Decomposition (SVD) based technique is proposed to detect the copy-move image forgery. DCT is used to transform the image from the spatial domain to the frequency domain and SVD is used to reduce the feature vector dimension. Combination of DCT and SVD makes the proposed scheme robust against compression, geometric transformations, and noise. For classification of images as forged or authentic, Support Vector Machine (SVM) classifier is used on the feature set. Once the image is detected as forged, then for the localization of forged region, K-means clustering is used on the feature vector. According to the distance threshold, similar blocks are identified and marked. The application of SVD provides stability and invariance from geometric transformations. Evaluation of the proposed scheme is done with and without post-processing operations on the images, both at the pixel level and image level. The proposed scheme outperforms the various state-of-the-art techniques of Copy-Move Forgery Detection (CMFD) in terms of accuracy, precision, recall and F1 parameters. Moreover, the proposed scheme also provides better results against rotation, scaling, noise and JPEG compression.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern, Signal. Image and Video Processing 11(1):81–88

    Article  Google Scholar 

  2. Alhussein M (2016). Image tampering detection based on local texture descriptor and extreme learning machine, Proceedings of18thInternational Conference on Computer Modelling and Simulation (UKSim), [18th: Cambridge, UK: April 2016], pp. 196-199.

  3. Al-Qershi OM, Khoo BE (2018) Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multimed Tools Appl 77:31807–31833

    Article  Google Scholar 

  4. Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6(3):1099–1110

    Article  Google Scholar 

  5. Ardizzone E, Bruno A, and Mazzola G (2010). Copy-move forgery detection via texture description, Proceedings of the 2ndACM Workshop on Multimedia in Forensics, Security and Intelligence, [2nd: Firenze, Italy: October 2010], pp. 59-29.

  6. Bashar MK, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process 99:1–40

    Google Scholar 

  7. Bayram S, Sencar H T, and Memon N (2009). An efficient and robust method for detecting copy-move forgery, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, [Taipei, Taiwan: April 2009], pp. 1053-1056.

  8. Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91(8):1759–1770

    Article  MATH  Google Scholar 

  9. Columbia image splicing detection evaluation dataset, DVMM Laboratory of Columbia University. Available at https://www.ee.columbia.edu/ln/dvmm/AuthSplicedDataSet/photographers.html (Accessed on 6th August 2017).

  10. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Transactions on Information Forensics and Security 10(11):2284–2297

    Article  Google Scholar 

  11. Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72

    Article  Google Scholar 

  12. Fadl SM and Semary NA (2014). A proposed accelerated image copy-move forgery detection, Proceedings of IEEE Visual Communications and Image Processing Conference, [Valletta, Malta: December 2014], pp. 253-257.

  13. Fattah SA, Ullah MMI, Ahmed M, Ahmmed I, and Shahnaz C (2014). A scheme for copy-move forgery detection in digital images based on 2D-DWT, Proceedings of IEEE 57thInternational Midwest Symposium on Circuits and Systems, [57th: TX, USA: August 2014], pp. 801-804.

  14. Fridrich AJ, Soukal BD, and Lukas AJ (2003). Detection of copy-move forgery in digital images, Proceedings of Digital Forensic Research Workshop, [Cleveland, Ohio: August 2003], pp. 1-10.

  15. Hsu HC and Wang MS (2012). Detection of copy-move forgery image using Gabor descriptor, Proceedings of International Conference on Anti-Counterfeiting, Security and Identification (ASID), [Taipei, Taiwan: August 2012], pp. 1-4.

  16. Huang HY, Ciou AJ (2019) Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation. EURASIP Journal on Image and Video Processing 68(1):1–16

    Google Scholar 

  17. Image Manipulation Dataset, Department of computer science, Friedrich Alexander University. Available at https://www5.cs.fau.de/research/data/image-manipulation (Accessed on 16th October 2017).

  18. Lee JC, Chang CP, Chen WK (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321(13):250–262

    Article  Google Scholar 

  19. Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1–3):59–67

    Article  Google Scholar 

  20. Li G, Wu Q, Tu D, and Sun S (2007). A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD, Proceedings of IEEE International Conference on Multimedia and Expo, [Beijing, China: July 2007], pp. 1750-1753.

  21. Li L, Li S, Zhu H, Chu SC, Roddick JF, Pan JS (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4(1):46–56

    Google Scholar 

  22. Lin C, Lu W, Huang X, Liu K, Sun W, Lin H, and Tan Z (2018). Copy-move forgery detection using combined features and transitive matching, Multimedia Tools and Applications, 1-16.

  23. Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77:18269–18293

    Article  Google Scholar 

  24. Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265

    Article  Google Scholar 

  25. Mahdian B, Saic S (2007) Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2–3):180–189

    Article  Google Scholar 

  26. Muhammad G, Al-Hammadi MH, Hussain M, Mirza AM, and Bebis G (2013). Copy move image forgery detection method using steerable pyramid transform and texture descriptor, Proceedings of IEEEEUROCON 2013, [Zagreb, Croatia: July 2013], pp. 1586-1592.

  27. Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995

    Article  Google Scholar 

  28. Prakash CS, Panzade PP, Om H, Maheshkar S (2019) Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimed Tools Appl 78(16):23535–23558

    Article  Google Scholar 

  29. Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive over segmentation and feature point matching. IEEE Transactions on Information Forensics and Security 10(8):1705–1716

    Article  Google Scholar 

  30. Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments, Bohme R, Fong PW and Safavi-Naini R (eds.), information hiding. Berlin, Heidelberg 2010:51–65

    Google Scholar 

  31. Shivakumar BL, Baboo LDSS (2011) Detection of region duplication forgery in digital images using SURF. International Journal of Computer Science Issues 8(4):199–205

    Google Scholar 

  32. Singh VK, Tripathi RC (2011) Fast and efficient region duplication detection in digital images using sub-blocking method. International Journal of Advanced Science and Technology 35:93–102

    Google Scholar 

  33. Uliyan DM, Jalab HA, and Wahab AWA (2015). Copy move image forgery detection using hessian and center symmetric local binary pattern, Proceedings of IEEE Conference on Open Systems, [Bandar Melaka, Malaysia: August 2015], pp. 7-11.

  34. Zhang Y, Li Y, Wen W, Wu Y, Chen JX (2015) Deciphering an image cipher based on 3-cell chaotic map and biological operations. Nonlinear Dynamics 82(4):1831–1837

    Article  MathSciNet  Google Scholar 

  35. Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166

    Article  Google Scholar 

  36. Zhong JL, Pun CM (2019) Copy-move forgery detection using adaptive keypoint filtering and iterative region merging. Multimed Tools Appl:1–27

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kulbir Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Priyanka, Singh, G. & Singh, K. An improved block based copy-move forgery detection technique. Multimed Tools Appl 79, 13011–13035 (2020). https://doi.org/10.1007/s11042-019-08354-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08354-x

Keywords

Navigation