Scale Invariant Detection of Copy-Move Forgery Using Fractal Dimension and Singular Values

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 425)


Digital image forgery is a nightmare in the current scenario. The authenticity of images that circulates through media and public outlets is therefore critical with a caution: “Do not believe everything you see”. Copy-move forgery is the most frequently created image forgery that conceals a particular feature from the scene by replacing it with another feature of the same image. In this paper, a hybrid approach based on local fractal dimension (LFD) and singular value decomposition (SVD) to efficiently detect and localize the copy-move forged region is proposed. In order to reduce the computational complexity of the classification procedure, we propose to arrange image blocks in a B+ tree structure ordered based on the LFD values. Pair of blocks within each segment is compared using singular values, to find regions that exhibit maximum resemblance. This reduces the need for comparison to the most suspected image portions alone. The experimental results show how effectively the method identifies the duplicated region; also presents the robustness of the method to detect and localize forgery even in the presence of after-copying manipulations such as rotation, blurring and noise addition. Furthermore it also detect multiple copy-move forgery within the image.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barnsley, M.: Fractals Everywhere, 2nd edn. Academic Press, Cambridge (1993)MATHGoogle Scholar
  2. 2.
    Cao, L.: Singular value decomposition applied to digital image processing. Division of Computing Studies, Arizona State University Polytechnic Campus, Mesa, Arizona State University polytechnic Campus (2006)Google Scholar
  3. 3.
    Conci, A., Campos, C.F.J.: An efficient box-counting fractal dimension approach for experimental image variation characterization. In: Proceedings of IWSIP (1996)Google Scholar
  4. 4.
    Samanta, D.: Classic Data Structures. Prentice Hall of India, New Delhi (2000)Google Scholar
  5. 5.
    Fonda, K., Fakery, P.: The Washington PostWriting. (cited February 28, 2004-1)
  6. 6.
    Fridrich, J.: Methods for tamper detection in digital images. In: Multimedia and Security, Workshop at ACM Multimedia, vol. 99 (1999)Google Scholar
  7. 7.
    Fridrich, A.J., Soukal, B.D., Lukas, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)Google Scholar
  8. 8.
    Liu, F., Feng, H.: An efficient algorithm for image copy-move forgery detection based on DWT and SVD. International Journal of Security and Its Applications 8(5), 377–390 (2014)CrossRefGoogle Scholar
  9. 9.
    Horowitz, E., Sahni, S.: Fundamentals of data structures. Pitman (1983)Google Scholar
  10. 10.
    Jayamohan, M., Revathy, K.: Domain classification using B+trees in fractal image compression. In: 2012 National Conference on Computing and Communication Systems (NCCCS). IEEE (1989)Google Scholar
  11. 11.
    Keller, J.M., Chen, S., Crownover, R.M.: Texture description and segmentation through fractal geometry. Computer Vision, Graphics, and Image Processing 45(2), 150–166 (1989)CrossRefGoogle Scholar
  12. 12.
    Li, L., et al.: An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4(1), 46–56 (2013)Google Scholar
  13. 13.
    Li, J., Du, Q., Sun, C.: An improved box-counting method for image fractal dimension estimation. Pattern Recognition 42(11), 2460–2469 (2009)CrossRefMATHGoogle Scholar
  14. 14.
    Mohamadian, Z., Pouyan, A.A.: Detection of duplication forgery in digital images in uniform and non-uniform regions. In: 2013 UKSim 15th International Conference on Computer Modelling and Simulation (UKSim). IEEE (2013)Google Scholar
  15. 15.
    Novianto, S., Suzuki, Y., Maeda, J.: Near optimum estimation of local fractal dimension for image segmentation. Pattern Recognition Letters 24(1), 365–374 (2003)CrossRefGoogle Scholar
  16. 16.
    Pan, X., Lyu, S.: Detecting image region duplication using SIFT features. In: 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). IEEE (2010)Google Scholar
  17. 17.
    Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated region. Technical Report, TR2004-515, Dartmouth College, Computer Science, August 2004Google Scholar
  18. 18.
    Sarkar, N., Chaudhuri, B.B.: An efficient differential box-counting approach to compute fractal dimension of image. IEEE Transactions on Systems, Man and Cybernetics 24(1), 115–120 (1994)CrossRefGoogle Scholar
  19. 19.
    Sadek, R.A.: SVD Based image processing applications: State of the art, contributions and research challenges. arXiv preprint arXiv: 1211.7102 (2012)
  20. 20.
    Kertscher, T.: Barack Obama met with Iran president, says PAC backing Wisconsin Sen. Ron Johnson for re-election (2015). (cited July 24, 2015)
  21. 21.
    Zhang, G., Wang, H.: SURF-based Detection of Copy-Move Forgery in Flat Region. International Journal of Advancements in Computing Technology 4(17), 8 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Sree Buddha College of Engineering for WomenPathanamthittaIndia
  2. 2.College of Applied ScienceAdoorIndia

Personalised recommendations