Advertisement

Method for Detecting of Clone Areas in a Digital Image under Conditions of Additional Attacks

  • Alla A. Kobozeva
  • Ivan I. BobokEmail author
  • Svitlana M. Grygorenko
Article
  • 26 Downloads

Abstract

The presented new method for detecting of clone areas in a digital image is effective in conditions of disturbing effects on the image that are additional to the cloning, including cases of a small area of clone area (less than 0.4% of the image). The method is based on the detection of geometric comparability of surface parts, which is compared with digital image, corresponding to areas of the clone and its prototype. The quantitative index was found. This index is characterizing the individual areas of the image and coinciding for areas of clone and its prototype, including under attack conditions. This index is the value of the local (global) minimum of function values that interpolate the elements of the matrix G, which is put into correspondence to the analyzed digital image matrix. The elements G represent the smallest difference between the corresponding block of the digital images matrix q × q from any other of its block. The results of the computational experiment are presented. They are confirmed high efficiency of this method in compare to the existing analogues, regardless of the specifics of attack conducted on cloned image, the relative sizes of the cloned area, block sizes used in the image analysis.

Keywords

Digital image Cloning Lossy compression Noise superimposition Blur 

Notes

References

  1. 1.
    Thajeel, S. A., & Bin Sulong, G. (2013). State of the art of copy-move forgery detection techniques: a review. IJCSI International Journal of Computer Science, 10(6), 174–183.Google Scholar
  2. 2.
    Huang, H., Guo, W., & Zhang, Y. (2008). Detection of copy-move forgery in digital image using SIFT algorithm. Proceedings of IEEE Pacific–Asia workshop on computational intelligence and industrial application (PACIIA’08) (Pages: 272–276 Year of Publication: 2008 ISBN 9780769534909).Google Scholar
  3. 3.
    Kotkar, P. S., & Shriramwar, S. S. (2014). Detecting region duplication forgery in digital image using SIFT features. International Journal of Current Engineering and Technology, 4(3), 1437–1440.Google Scholar
  4. 4.
    Pan, X., & Lyu, S. (2010). Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, 5(4), 857–867.CrossRefGoogle Scholar
  5. 5.
    Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., & Serra, G. (2013). Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Processing: Image Communication, 28(6), 659–669.Google Scholar
  6. 6.
    Joglekar, N. P., & Chatur, P. N. (2015). A compressive survey on active and passive methods for image forgery detection. International Journal of Engineering and Computer Science, 4(1), 10187–10190.Google Scholar
  7. 7.
    Singh, R., & Kaur, M. (2016). Copy move tampering detection techniques: A review. International Journal of Applied Engineering Research, 11(5), 3610–3615.Google Scholar
  8. 8.
    Oommen, R. S., Jayamohan, M., & Sruthy, S. (2015). A survey of copy-move forgery detection techniques for digital images. International Journal of Innovations in Engineering and Technology, 5(2), 419–426.Google Scholar
  9. 9.
    Mangat, S. S., & Kaur, H. (2016). A review of literature on copy-move forgery detection techniques. International Journal of Computer Science and Information Technology & Security, 6(1), 482–486.Google Scholar
  10. 10.
    Mahdian, B., & Saic, S. (2007). Detection of copy–move forgery using a method based on blur moment invariants. Forensic Science International, 171(2), 180–189.CrossRefGoogle Scholar
  11. 11.
    Zahra, M., & Pouyan, A. A. (2013). Detection of duplication forgery in digital images in uniform and nonuniform regions. Proceedings of the 15th international conference on computer modelling and simulation (UKSIM’13) (Pages: 455–460 Year of Publication: 2013 ISBN 978-0-7695-4994-1).Google Scholar
  12. 12.
    Singh, V. K., & Tripathi, R. C. (2011). Fast and efficient region duplication detection in digital images using sub-blocking method. International Journal of Advanced Science and Technology, 35, 93–102.Google Scholar
  13. 13.
    Sridevi, M., Mala, C., & Sandeep, S. (2012). Copy–move image forgery detection. Computer Science & Information Technology, 52, 19–29.CrossRefGoogle Scholar
  14. 14.
    Kumar, S., V. Desai, J., & Mukherjee, S. (2015). Copy move forgery detection in contrast variant environment using binary DCT vectors. International Journal of Image, Graphics and Signal Processing, 7(6), 38–44.CrossRefGoogle Scholar
  15. 15.
    Hsu, H.-C., & Wang, M.-S. (2012). Detection of copy-move forgery image using Gabor descriptor. Proceedings of the international conference on anti-counterfeiting, Security and Identification (ASID’12) (Pages: 1–4 Year of Publication: 2012 ISBN 9781467321440).Google Scholar
  16. 16.
    Quan, X., & Zhang, H. (2012). Copy-move forgery detection in digital images based on local dimension estimation. Proceedings of the international conference on cyber security, cyber warfare and digital forensic (CyberSec’12) (Pages: 180–185 Year of Publication: 2012 ISBN 9781467314251).Google Scholar
  17. 17.
    Brajic, M., Tuba, E., & Jovanovic, R. (2016). Overlapping block based algorithm for copy-move forgery detection in digital images. International Journal of Computers, 1, 191–198.Google Scholar
  18. 18.
    Kirchner, M., Schoettle, P., & Riess, C. (2015). Thinking beyond the block: Block matching for copy-move forgery detection revisited. Proceedings of SPIE media watermarking, security, and forensics 2015 (Page: 940903 Year of Publication: 2015 ISBN 9781628414998).Google Scholar
  19. 19.
    Maind, R.A., Khade, A., Chitre, D.K. (2014). Image copy move forgery detection using block representing method. International Journal of Soft Computing and Engineering, 4(2), 49–53.Google Scholar
  20. 20.
    Kaur, H., Saxena, J., & Singh, S. (2015). Key-point based copy-move forgery detection and their hybrid methods: a review. Journal of The International Association of Advanced Technology and Science, 16(2), 7.Google Scholar
  21. 21.
    Yu, L., Han, Q., & Niu, X. (2015). Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications, 74(2), 1159–1176.CrossRefGoogle Scholar
  22. 22.
    Prema, C., Рercy Granaph, J., Angaline, S., & Belsi, I. T. (2013). A keypoint based copy-move forgery detection. International Journal of Advanced Information Science and Technology, 12(12), 175–180.Google Scholar
  23. 23.
    Pan, X., & Lyu, S. (2010). Detecting image region duplication using SIFT features. Proceedings of the international conference on acoustics, speech and signal processing (ICASSP’10) (Pages: 1706–1709 Year of Publication: 2010 ISBN 9781424442959).Google Scholar
  24. 24.
    Bo, X., Junwen, W., Guangjie, L., & Yuewei, D. (2010). Image copy-move forgery detection based on SURF. Proceedings of second international conference on multimedia information networking and security (MINES’2010) (Pages: 889–892 Year of Publication: 2010 ISBN 9781424486267).Google Scholar
  25. 25.
    Zhang, G., & Wang, H. (2012). SURF-based detection of copy-move forgery in flat region. International Journal of Advancements in Computing Technology, 4(17), 521–529.CrossRefGoogle Scholar
  26. 26.
    Zheng, J., Hao, W., & Zhu, W. (2012). Detection of copy-move forgery based on keypoints’ positional relationship. Journal of Information and Computational Science, 1(3), 53–60.Google Scholar
  27. 27.
    Hemalatha, S., & Kumar, S. S. (2016). Image forgery detection using key-point extraction and segmentation. International Journal of Pharmacy & Technology, 8(2), 13219–13229.Google Scholar
  28. 28.
    Uliyan, D. M., Jalab, H. A., Abdul Wahab, A. W., & Sadeghi, S. (2016). Image region duplication forgery detection based on angular radial partitioning and Harris key-points. Symmetry, 8(7), 62–79.MathSciNetCrossRefGoogle Scholar
  29. 29.
    Venitta, A. M., & Kumari, V. S. (2016). Image forgery detection using feature point matching. International Journal of Innovative Research in Science, Engineering and Technology, 5(3), 21–31.Google Scholar
  30. 30.
    Saravana Kumar, S., Barath, R., & Nirmal, A. G. J. (2016). Copy move forgery image detection. International Journal of Advanced Research in Computer Science Engineering and Information Technology, 4(3), 859–864.Google Scholar
  31. 31.
    Bharathi, V., & Dhivyabarathi, D. (2016). An implementation of block and keypoint based forgery detection scheme. Proceedings of the international conference on current research in engineering science and technology (ICCREST-2016) (Pages: 55–60 Year of Publication: 2016 E-ISSN 2348-8549).Google Scholar
  32. 32.
    Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing (2nd Ed.). Upper Saddle River, NJ: Prentice Hall.Google Scholar
  33. 33.
    Kobozeva, A. A., & Grigorenko, S. N. (2015). Theoretical principles of solution the detection cloning results for a digital image saved in lossy format. Data Rec., Storage & Processing, 17(4), 21–30.Google Scholar
  34. 34.
    United States Department of Agriculture. NRCS photo gallery. Retrieved from http://photogallery.nrcs.usda.gov. Accessed 20 Nov 2017.
  35. 35.
    Zorilo, V. V., & Kobozeva, A. A. (2010). Fundamentals of method for the detection of results of blurring an image. Suchasna Spetsialna Tekhnika, 3, 72–82.Google Scholar
  36. 36.
    Konahovich, G. F., & Puzyrenko, A. Yu. (2006). Computer steganography: Theory and practice. Kyiv: MK-Press.Google Scholar
  37. 37.
    Liu, G., Wang, J., Lian, S., & Wang, Z. (2011). A passive image authentication scheme for detecting region-duplication forgery with rotation. Journal of Network and Computer Applications, 34(5), 1557–1565.CrossRefGoogle Scholar
  38. 38.
    Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099–1110.CrossRefGoogle Scholar
  39. 39.
    Hashmi, M. F., Anand, V., & Keskar, A. G. (2014). Copy-move image forgery detection using efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia, 9, 84–91.CrossRefGoogle Scholar
  40. 40.
    Mahmood, T., Nawaz, T., Irtaza, A., Ashraf, R., Shah, M., & Mahmood, M. T. (2016). Copy-move forgery detection technique for forensic analysis in digital images. Mathematical Problems in Engineering, 2016, 13.CrossRefGoogle Scholar
  41. 41.
    Uliyan, D.M., Jalab, H.A., & Abdul Wahab, A.W. (2015). Copy move image forgery detection using hessian and center symmetric local binary pattern. Proceedings of IEEE conference on open systems (ICOS’15) (Pages: 7–11 Year of Publication: 2015 ISBN 9781467394345).Google Scholar
  42. 42.
    Deoli, M., & Joshi, J. (2016). A fast and robust approach to detect copy-move forgery in digital images. International Journal of Computer Applications, 137(5), 29–33.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Informatics and Control of Information Systems ProtectionOdessa National Polytechnic UniversityOdessaUkraine
  2. 2.Department of Computerized Control SystemsOdessa National Polytechnic UniversityOdessaUkraine

Personalised recommendations