An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10040)


Digital images can be easily manipulated due to availability of powerful image processing software. Passive authentication as a common challenge method of digital image authentication is extensively used to detect the copy-move forgery images. In this paper, a passive authentication scheme is proposed to authenticate copy-move forgery based on discrete cosine transform (DCT). At the feature extraction step, DCT is applied to image blocks and makes use of the means of DCT coefficients to represent image blocks. The size of feature vectors are optimized. At the matching step, a set number of packages is used to store the feature vectors. The similar blocks can be found by comparing the feature vectors that are contained in adjacent packages. The experimental results demonstrate that the proposed scheme can locate irregular and meaningful tampered regions and multiply duplicated regions. In addition, it can also locate the duplicated regions in digital images that are distorted by adding white Gaussian noise, Gaussian blurring and their mixed operations.


Passive authentication Copy-move forgery Feature extraction Packages 



This research is supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.


  1. 1.
    Chang, S.-F., Sebe, N., Liu, Y., Zhuang, Y., Huang, T., Chang, S.F.: Blind passive media forensics: motivation and opportunity. In: Sebe, N., Liu, Y., Zhuang, Y., Huang, T.S. (eds.) MCAM 2007. LNCS, vol. 4577, pp. 57–59. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73417-8_11 CrossRefGoogle Scholar
  2. 2.
    Lian, S., Kanellopoulos, D.: Recent advances in multimedia information system security. Informatica 33, 3–24 (2009)MathSciNetGoogle Scholar
  3. 3.
    Mishra, A., Goel, A., Singh, R., Chelty, G., Singh, L.: Anovel image watermarking scheme using extreme learning machine. In: The 2012 International Joint Conference on Neural Networks (IJCNN), pp. 1–6 (2012)Google Scholar
  4. 4.
    Tong, X., Liu, Y., Zhang, M., Chen, Y.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery signal process. Image Commun. 28, 301–308 (2013)Google Scholar
  5. 5.
    Zhou, L., Wang, D., Guo, Y., Zhang, J.: Blur detection of digital forgery using mathematical morphology. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 990–998. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72830-6_105 CrossRefGoogle Scholar
  6. 6.
    Popscu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical report TR2003-515, Dartmouth College (2004)Google Scholar
  7. 7.
    Zimba, M., Xingming, S.: DWT-PCA (EVD) based copy-move image forgery detection. Int. J. Digital ContentTechnol. Appl. 5(1), 251–258 (2011)CrossRefGoogle Scholar
  8. 8.
    Fridrich, J., Soukalm, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Digital Forensic Research workshop, Cleveland, pp. 19–23 (2003)Google Scholar
  9. 9.
    Huang, Y.P., Lu, W., Sun, W., Long, D.Y.: Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 206(1–3), 178–184 (2011)CrossRefGoogle Scholar
  10. 10.
    Wang, X., Zhang, X., Li, S., Wang, S.: A DWT-DCT based passive forencis method for copy-move attacks. In: 2011 Third International Conference on Multimedia Information Networking and Security, pp. 304–308 (2011)Google Scholar
  11. 11.
    Kumar, S., Desai, J., Mukherjee, S.: DCT-PCA based method for copy-move forgery detection. In: Satapathy, S.C., Avadhani, P.S., Udgata, S.K., Lakshminarayana, S. (eds.) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India - Volume II. Advances in Intelligent systems and computing, vol. 249, pp. 577–583. Springer, Cham (2014)Google Scholar
  12. 12.
    Yu, J., Han, Q.L.: Detection of copy-move forgery in digital images using discrete cosine transform and cluster analysis. In: International Conference on Computer Networks and Information Security (CNIS), pp. 73–76 (2015)Google Scholar
  13. 13.
    The USC-SIPI Image Database.
  14. 14.
    Kodak Lossless True Color Image.

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  1. 1.School of Information Science and TechnologySouthwest Jiaotong UniversityChengduChina

Personalised recommendations