Advertisement

A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means

  • V. Hajihashemi
  • A. Alavi Gharahbagh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 683)

Abstract

In recent years, due to the fast development of digital images, a rapid growth of research interest in the forgery detection in digital images has been happened. One of the most common techniques in creating forged images is copy-move (region duplication) technique. In this paper, a new method for copy-move forgery detection in digital images is proposed. In this paper a region duplication detection technique which utilizes the image gradient is proposed. In the proposed approach, first the gradient of image is divided into overlapped blocks. Using gradient versus other techniques, decreases processing time in feature extraction step.

A fast pre clustering algorithm is another added step to speedup method by dividing search area into some subset. The unknown parameters of proposed method are determined by implementing different conditions on two standard databases. Finally, the performance of the proposed method is compared with some state of art methods and the acceptable accuracy and lower run time of it, is verified.

Keywords

Image forgery Copy-move Image gradient Fast k means Forgery detection 

References

  1. 1.
    Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, pp. 1053–1056 (2009)Google Scholar
  2. 2.
    Lin, H.J., Wang, C.W., Kao, Y.T.: Fast copy-move forgery detection. WSEAS Trans. Signal Process. 5(5), 188–197 (2009)Google Scholar
  3. 3.
    Zimba, M., Sun, X.: DWT-PCA(EVD) based copy-move image forgery detection. Int. J. Digit. Content Technol. Appl. 5, 19–29 (2011)CrossRefGoogle Scholar
  4. 4.
    Hu, J., Zhang, H., Gao, Q., Huang, H.: An improved lexicographical sort algorithm of copy-move forgery detection. In: 2011 Second International Conference on Networking and Distributed Computing, Beijing, pp. 23–27 (2011)Google Scholar
  5. 5.
    Li, L., et al.: Detecting copy-move forgery under affine transforms for image forensics. Comput. Electr. Eng. 40(6), 1951–1962 (2014)CrossRefGoogle Scholar
  6. 6.
    Kushol, R., Salekin, M.S., Kabir, M.H., Khan, A.A.: Copy-move forgery detection using color space and moment invariants-based features. In: 2016 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Gold Coast, QLD, pp. 1–6 (2016)Google Scholar
  7. 7.
    Pandey, R.C., Agrawal, R., Singh, S.K., Shukla, K.K.: Passive copy move forgery detection using SURF, HOG and SIFT features. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds.) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 327. Springer, Cham (2014)Google Scholar
  8. 8.
    Al-Hammadi, M.M., Emmanuel, S.: Improving SURF based copy-move forgery detection using super resolution. In: 2016 IEEE International Symposium on Multimedia (ISM), San Jose, CA, pp. 341–344 (2016)Google Scholar
  9. 9.
    Agarwal, V., Mane, V.: Reflective SIFT for improving the detection of copy-move image forgery. In: 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, 2016, pp. 84–88Google Scholar
  10. 10.
    Wenchang, S., Fei, Z., Bo, Q., Bin, L.: Improving image copy-move forgery detection with particle swarm optimization techniques. China Commun. 13(1), 139–149 (2016)CrossRefGoogle Scholar
  11. 11.
    Moradi-Gharghani, H., Nasri, M.: A new block-based copy-move forgery detection method in digital images. In: 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, pp. 1208–1212 (2016)Google Scholar
  12. 12.
    Fadl, S.M., Semary, N.A.: A proposed accelerated image copy-move forgery detection. In: 2014 IEEE Visual Communications and Image Processing Conference, Valletta, pp. 253–257 (2014)Google Scholar
  13. 13.
    Mahmood, T., Nawaz, T., Mehmood, Z., Khan, Z., Shah, M., Ashraf, R.: Forensic analysis of copy-move forgery in digital images using the stationary wavelets. In: 2016 Sixth International Conference on Innovative Computing Technology (INTECH), Dublin, 2016Google Scholar
  14. 14.
    Dixit, R., Naskar, R.: DyWT based copy-move forgery detection with improved detection accuracy. In: 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), Noida, pp. 133–138 (2016)Google Scholar
  15. 15.
    Zhao, F., Shi, W., Qin, B., Liang, B.: A copy-move forgery detection scheme with improved Clone Region Estimation. In: 2016 Third International Conference on Trustworthy Systems and their Applications (TSA), Wuhan, pp. 8–16 (2016)Google Scholar
  16. 16.
    Isaac, M.M., Wilscy, M.: A key point based copy-move forgery detection using HOG features. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, pp. 1–6 (2016)Google Scholar
  17. 17.
    Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, pp. 1–6 (2016)Google Scholar
  18. 18.
    Warbhe, A.D., Dharaskar, R.V., Thakare, V.M.: A survey on keypoint based copy-paste forgery detection techniques. Proc. Comput. Sci. 78, 61–67. ISSN 1877-0509 (2016)Google Scholar
  19. 19.
    Scharr, H.: Optimal second order derivative filter families for transparent motion estimation. In: 2007 15th European Signal Processing Conference, Poznan, pp. 302–306 (2007)Google Scholar
  20. 20.
    Elkan, C.: Using the triangle inequality to accelerate k-means. In: Proceedings of the Twentieth International Conference on Machine Learning (ICML), Washington DC, USA, vol. 3 (2003)Google Scholar
  21. 21.
    Satish, N., Harris, M., Garland, M.: Designing efficient sorting algorithms for manycore GPUs. In: 2009 IEEE International Symposium on Parallel & Distributed Processing, Rome, pp. 1–10 (2009)Google Scholar
  22. 22.
    Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRefGoogle Scholar
  23. 23.
    Ng, T.T., Hsu, J., Chang, S.F.: Columbia Image Splicing Detection Evaluation Dataset. http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Software DepartmentBam Pardazesh Tehran Co.TehranIran
  2. 2.Department of Electrical and Computer EngineeringIslamic Azad University, Shahrood BranchShahroodIran

Personalised recommendations