A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods
In the present digital world integrity and trustworthiness of the digital images is an important issue. And most probably copy- move forgery is used to tamper the digital images. Thus as a solution to this problem, through this paper we proposes a unique and blind method for detecting copy-move forgery using dyadic wavelet transform (DyWT) in combination with scale invariant feature transform (SIFT). First we applied DyWT on a given test image to decompose it into four sub-bands LL, LH, HL, HH. Out of these four sub-bands LL band contains most of the information we intended to apply SIFT on LL part only to extract the key features and using these key features we obtained descriptor vector and then went on finding similarities between various descriptors vector to come to a decision that there has been some copy-move tampering done to the given image. In this paper, we have done a comparative study based on the methods like (a).DyWT (b).DWT and SIFT (c). DyWT and SIFT. Since DyWT is invariant to shift whereas discrete wavelet transform (DWT) is not, thus DyWT is more accurate in analysis of data. And it is shown that by using DyWT with SIFT we are able to extract more numbers of key points that are matched and thus able to detect copy-move forgery more efficiently.
KeywordsCopy-move forgery Dyadic Wavelet Transform (DyWT) DWT SIFT
Unable to display preview. Download preview PDF.
- 1.Muhammad, N., Hussain, M., Muhammad, G., Bebis, G.: Copy-move forgery detection using dyadic wavelet transform. In: Proceedings of IEEE Eighth International Conference on Computer Graphics, Imaging and Visualization (CGIV 2011), pp. 103–108 (2011)Google Scholar
- 3.Muhammad, G., Hussain, M., Khawaji, K., Bebis, G.: Blind copy move image forgery detection using dyadic undecimated wavelet transform. In: Proceedings of IEEE 17th International Conference on Digital Signal Processing (DSP 2011), pp. 1–6 (2011)Google Scholar
- 4.Fridrich, A.J., Soukal, B.D., Lukáš, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, Cleveland, OH, USA, pp. 55–61 (August 2003)Google Scholar
- 5.Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions, Department of Computer Science, Dartmouth College. Technical Report. TR2004-515 (August 2004)Google Scholar
- 6.Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighbourhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 1750–1753 (2007)Google Scholar
- 7.Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2009), pp. 1053–1056 (2009)Google Scholar
- 8.Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. Proceedings of the IEEE International Conference on Computer Science and Software Engineering 3, 926–930 (2008)Google Scholar
- 9.Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: Proceedings of Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA 2008), vol. 2, pp. 272–276 (2008)Google Scholar
- 11.Amerini, I., Ballan, L., Caldelli, R., Bimbo, A.D., Tongo, L.D., Serra, G.: Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Processing: Image Communication 28, 659–669 (2013)Google Scholar
- 16.Li, L., Li, S., Zhu, H., Chu, S.-C., Roddick, J.F., Pan, J.-S.: An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns. Journal of Information Hiding and Multimedia Signal Processing 4(1), 46–56 (2013)Google Scholar
- 19.Hashmi, M.F., Hambarde, A.R., Keskar, A.G.: Copy Move Forgery Detection using DWT and SIFT Features. In: Proceeding of 13th IEEE International Conference on Intelligent Systems Design and Applications (ISDA 2013), pp. 188–193 (December 2013)Google Scholar