Skip to main content
Log in

A fast copy-move image forgery detection approach on a reduced search space

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes an overlapping block-based passive forensic scheme for copy–move forgery detection in digital images that works on a reduced search space. It uses a Gaussian image pyramid to generate and analyze input images at different resolutions. The conventional overlapping block-based procedures produce satisfactory results but are highly compute-intensive for large and medium-sized images. An increase in image size leads to a rapid rise in the number of overlapping blocks in the image, making processes like feature extraction, matching, and shift-vector calculations very expensive. The proposed approach initially performs relative forgery detection through block-wise processing of lower resolution components of the original image. In this process, discrete cosine transform is used to extract significant coefficients from each block and further analyzed to identify forgeries relatively in the selected lower resolution components. This process aids in selecting a smaller search space for potentially forged areas in the original image. Finally, the actual forgery detection is performed on this reduced search space, decreasing the computational overhead while maintaining accuracy in the results. The proposed procedure also shows robustness against various attacks and post-processing operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Algorithm 2
Fig. 4
Algorithm 3
Algorithm 4
Fig. 5
Algorithm 5
Algorithm 6
Fig. 6
Algorithm 7
Algorithm 8
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

The self-generated dataset used to analyze the current study is included within the article and is available from the corresponding author upon reasonable request. The current study analysis also referred to and used a subset of the dataset D0 created by [3].

References

  1. Abd Warif NB, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, Choo KKR (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259–278. https://doi.org/10.1016/j.jnca.2016.09.008

    Article  Google Scholar 

  2. Alberry HA, Hegazy AA, Salama GI (2018) A fast sift based method for copy move forgery detection. Future Comput Inform J 3(2):159–165. https://doi.org/10.1016/j.fcij.2018.03.001

    Article  Google Scholar 

  3. Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10 (10):2084–2094. https://doi.org/10.1109/TIFS.2015.2445742

    Article  Google Scholar 

  4. Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Transactions on Image Processing. https://doi.org/10.1109/TIP.2010.2046599

  5. Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (surf). Comput Vis Image Underst 110(3):346–359. https://doi.org/10.1016/j.cviu.2007.09.014

    Article  Google Scholar 

  6. Bo X, Junwen W, Guangjie L, Yuewei D (2010) .. In: 2010 International Conference on Multimedia Information Networking and Security, IEEE, pp 889–892. https://doi.org/10.1109/MINES.2010.189

  7. Bovik A (2010) Handbook of Image and Video Processing. Communications, Networking and Multimedia, Elsevier Science. https://books.google.co.in/books?id=UM_GCfJe88sC

  8. Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1-3):33–43. https://doi.org/10.1016/j.forsciint.2011.07.015

    Article  Google Scholar 

  9. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854. https://doi.org/10.1109/TIFS.2012.2218597

    Article  Google Scholar 

  10. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297. https://doi.org/10.1109/TIFS.2015.2455334

    Article  Google Scholar 

  11. Dixit A, Bag S (2021) A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks. Expert Syst Appl 182 (115):282. https://doi.org/10.1016/j.eswa.2021.115282

    Article  Google Scholar 

  12. Florindo JB, Casanova D, Bruno OM (2018) A gaussian pyramid approach to bouligand–minkowski fractal descriptors. Inf Sci 459:36–52. https://doi.org/10.1016/j.ins.2018.05.037

    Article  MathSciNet  Google Scholar 

  13. Fridrich AJ, Soukal BD, Lukáš AJ (2003) .. In: Inproceedings of digital forensic research workshop, Citeseer

  14. Gonzalez R, Woods R (2017) Digital Image Processing, Global Edition, Pearson. https://books.google.co.in/books?id=XmZvtAEACAAJ

  15. Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Comput Electr Eng 62:448–458. https://doi.org/10.1016/j.compeleceng.2017.03.013

    Article  Google Scholar 

  16. Huang Y, Lu W, Sun W, Long D (2011) Improved dct-based detection of copy-move forgery in images. Forensic Sci Int 206(1-3):178–184. https://doi.org/10.1016/j.forsciint.2010.08.001

    Article  Google Scholar 

  17. Kaur J, Khan AI, Abushark YB, Alam MM, Khan SA, Agrawal A, Kumar R, Khan RA (2020) Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective. Risk Manag Healthc Policy 13:355. https://doi.org/10.2147/RMHP.S233706

    Article  Google Scholar 

  18. Kumar R, Khan AI, Abushark YB, Alam MM, Agrawal A, Khan RA (2020) A knowledge-based integrated system of hesitant fuzzy set, ahp and topsis for evaluating security-durability of web applications. IEEE Access 8:48,870–48,885. https://doi.org/10.1109/ACCESS.2020.2978038

    Article  Google Scholar 

  19. Kumar R, Khan AI, Abushark YB, Alam MM, Agrawal A, Khan RA (2020) An integrated approach of fuzzy logic, ahp and topsis for estimating usable-security of web applications. IEEE Access 8:50,944–50,957. https://doi.org/10.1109/ACCESS.2020.2970245

    Article  Google Scholar 

  20. Lin X, Li JH, Wang SL, Cheng F, Huang XS, et al. (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4 (1):29–39. https://doi.org/10.1016/j.eng.2018.02.008

    Article  Google Scholar 

  21. Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60 (2):91–110. https://doi.org/10.1023/B:VISI.0000029664.99615.94

    Article  Google Scholar 

  22. Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202–214. https://doi.org/10.1016/j.jvcir.2018.03.015

    Article  Google Scholar 

  23. Meena KB, Tyagi V (2019) .. In: Data, engineering and applications, Springer. https://doi.org/10.1007/978-981-13-6351-1_14, pp 163–194

  24. Niu Pp, Wang C, Chen W, Yang H, Wang X (2021) Fast and effective keypoint-based image copy-move forgery detection using complex-valued moment invariants. J Vis Commun Image Represent 77(103):068. https://doi.org/10.1016/j.jvcir.2021.103068

    Article  Google Scholar 

  25. Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy–move image forgery detection using dct. Iran J Comput Sci, 1–11. https://doi.org/10.1007/s42044-019-00029-y

  26. Paul S, Pal AK (2021) .. In: Cloud Security. https://www.taylorfrancis.com/chapters/edit/10.1201/9780367821555-9/active-forgery-detection-grayscale-images-using-crc-8-based-fragile-watermarking-srilekha-paul-arup-kumar-pal. CRC Press, pp 114–132

  27. Prasad S, Pal AK, Paul S (2022) A block-level image tamper detection scheme using modulus function based fragile watermarking. Wirel Pers Commun, 1–39. https://doi.org/10.1007/s11277-022-09675-1

  28. Rao KR, Yip P (2014) Discrete cosine transform: algorithms, advantages applications. Academic Press

  29. Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry 12 (5):754. https://doi.org/10.3390/sym12050754

    Article  Google Scholar 

  30. Schetinger V, Iuliani M, Piva A, Oliveira MM (2017) Image forgery detection confronts image composition. Comput Graph 68:152–163. https://doi.org/10.1016/j.cag.2017.08.014

    Article  Google Scholar 

  31. Sencar HT, Memon N (2014) Digital image forensics: there is more to a picture than meets the eye. Springer Publishing Company, Incorporated

  32. Shelke NA, Kasana SS (2021) A comprehensive survey on passive techniques for digital video forgery detection. Multimed Tools Appl 80(4):6247–6310. https://doi.org/10.1007/s11042-020-09974-4

    Article  Google Scholar 

  33. Shelke NA, Kasana SS (2022) Multiple forgery detection and localization technique for digital video using pct and nbap. Multimed Tools Appl 81(16):22,731–22,759. https://doi.org/10.1007/s11042-021-10989-8

    Article  Google Scholar 

  34. Shivakumar B, Baboo SS (2011) Automated forensic method for copy-move forgery detection based on harris interest points and sift descriptors. Int J Comput Appl 27(3):9–17

    Google Scholar 

  35. Soni B, Das PK, Thounaojam DM (2018) Cmfd: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167–178. https://doi.org/10.1049/iet-ipr.2017.0441

    Article  Google Scholar 

  36. Sunil K, Jagan D, Shaktidev M (2014) .. In: ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II, Springerpp 577–583. https://doi.org/10.1007/978-3-319-03095-1_62

  37. Tharwat A (2018) Classification assessment methods. Applied Computing and Informatics. https://doi.org/10.1016/j.aci.2018.08.003

  38. Walia S, Kumar K (2019) Digital image forgery detection: a systematic scrutiny. Aust J Forensic Sci 51(5):488–526. https://doi.org/10.1080/00450618.2018.1424241

    Article  Google Scholar 

  39. Yadav AR, Anand R, Dewal M, Gupta S (2015) Gaussian image pyramid based texture features for classification of microscopic images of hardwood species. Optik 126(24):5570–5578. https://doi.org/10.1016/j.ijleo.2015.09.030

    Article  Google Scholar 

  40. Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on dct and svd. Forensic Sci Int 233(1-3):158–166. https://doi.org/10.1016/j.forsciint.2013.09.013

    Article  Google Scholar 

Download references

Acknowledgements

The authors sincerely thank the Department of Science & Technology (DST), New Delhi, for supporting this work under FIST project grant (No. SR/FST/ET-I/ 2017/75).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arup Kumar Pal.

Ethics declarations

Conflict of Interests

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Paul, S., Pal, A.K. A fast copy-move image forgery detection approach on a reduced search space. Multimed Tools Appl 82, 25917–25944 (2023). https://doi.org/10.1007/s11042-022-14224-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14224-w

Keywords

Navigation