An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 625)

Abstract

Image morphing is a common practice nowadays. To validate a digital image is considered as a perplexing task in the field of image forensic. With numerous kind of tampering been carried out on a digital image, the paper focuses on a detection of common forgery referred to as copy-move forgery or cloning, which is nearly untraceable. The paper contemplates on the color content of the forged image and employs three different methods of feature extraction to aid the detection of forgery. The experimental results show that the feature extraction methods employed detects the forged region accurately and are also effective to rotation and scaling. A performance analysis in detection of forgery for the three methods in terms precision and recall is also presented in the paper, along with a comparison with other state-of-the-art detection methods.

Keywords

Forgery detection Digital Forensics copy-move forgery detection 

References

  1. 1.
    Farid, H.: A Survey of Image Forgery Detection. Signal Process. Mag. 26(2), 16–25 (2009)CrossRefGoogle Scholar
  2. 2.
    Fridrich, J., Soukal, D., Lukáš, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, August 2003Google Scholar
  3. 3.
    Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Technical report TR2004-515 (2004). www.cs.dartmouth.edu/farid/publications/tr04.html
  4. 4.
    Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital images. Int. Conf. Pattern Recogn. 4, 746–749 (2006)Google Scholar
  5. 5.
    Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: IEEE International Conference on Multimedia and Expo, pp. 1750–1753, July 2007Google Scholar
  6. 6.
    Huang, H., Guo, W., Zhang, Y: Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272–276, December 2008Google Scholar
  7. 7.
    Myna, A.N., Venkateshmurthy, M.G., Patil, C.G.: Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In: IEEE International Conference on Computational Intelligence and Multimedia Applications, pp. 371–377, December 2007Google Scholar
  8. 8.
    Tungkasthan, A., Intarasema, S., Premchaiswadi, W.: Spatial color indexing using ACC algorithm. In: Seventh International Conference on ICT and Knowledge Engineering, pp. 113–117 (2009)Google Scholar
  9. 9.
    Bayram, S., Sencar, H., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1053–1056, April 2009Google Scholar
  10. 10.
    Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRefGoogle Scholar
  11. 11.
    Christlein, V., Riess, C., Jordan, J., Riess, C.: Angelopoulou, E: An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRefGoogle Scholar
  12. 12.
    Guo, J.M., Liu, Y.-F., Wu, Z.-J.: Duplication forgery detection using improved DAISY descriptor. Expert Syst. Appl. 40, 707–714 (2013). Elsevier International JournalCrossRefGoogle Scholar
  13. 13.
    Li, L., Zhu, S., Xiaoyue, H.W.: Detecting copy-move forgery under affine transforms for image forensics. Comput. Electr. Eng. 40(6), 1951–1962 (2014). Elsevier Ltd.CrossRefGoogle Scholar
  14. 14.
    Hsu, C.-M., Lee, J.-C., Chen, W-K.: An efficient detection algorithm for copy-move forgery. In: 10th Asia Joint Conference on Information Security, pp 33-36, May 2015Google Scholar
  15. 15.
    Lin, C.-S., Chen, C.-C., Chang, Y.-C.: An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. In: International Conference on Intelligent Networking and Collaborative Systems (INCOS), pp. 228–231, September 2015Google Scholar
  16. 16.
    Malviya, A.V., Ladhake, S.A.: Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Computer Science 79(2016), 383–390 (2016). In: 7th International Conference on Communication, Computing and Virtualization 2016. Elsevier Ltd.CrossRefGoogle Scholar
  17. 17.
    Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD - new database for copy-move forgery detection. In: Proceedings of 55th International Symposium, ELMAR-2013, pp. 49–54, September 2013Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  1. 1.Sipna College of Engineering and TechnologyAmravatiIndia

Personalised recommendations