A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter

  • Mostafa Mokhtari ArdakanEmail author
  • Masoud Yerokh
  • Mostafa Akhavan Saffar
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 480)


Copy-move forgery is one of the types of image manipulation which is widely used due to simplicity and effectiveness. In this method, part of the original image is copied and pasted to the desired location in the same image. The goal of detecting copy-move forgery is to find areas of the image that are identical or very similar. One of the important issues that some of the earlier algorithms suffer from is that the forged area is rotated or resized after attachment. In this research, a new approach is presented to detect copy-move forgery in digital images based on discrete wavelet decomposition along with multiple features extracted by Gabor filter to improve the function of detecting similar areas of the image. Experiments have shown that this algorithm recognizes similar areas with relatively good accuracy and is resistant to rotation and change in the scale of the forged area.


Detection of forgery Copy-move forgery Discrete wavelet transform Gabor filter Feature matrix 


  1. 1.
    Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Invest: 226–245Google Scholar
  2. 2.
    Chauhan A (2015) Digital watermarking-revisit. J Comput Sci Inf Technol 6(1):833–838Google Scholar
  3. 3.
    Diane N, Xingming WNS, Moise FK (2014) A survey of partition-based techniques for copy-move forgery detection. Sci World J 1–13Google Scholar
  4. 4.
    Myna AN, Venkateshmurthy MG, Patil C (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In: International conference on computing intelligence multimedia application, pp 371–377Google Scholar
  5. 5.
    Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: IEEE international conference on multimedia and expo, pp 1750–1753Google Scholar
  6. 6.
    Khan S, Kulkarni A, Khan ES, Kulkarni EA (2010) An efficient method for detection of copy-move forgery using discrete wavelet transform. Int J Comput Sci Eng: 1810Google Scholar
  7. 7.
    Gan Y, Zhong J (2015) Image copy-move forgery blind detection algorithm based on the normalized histogram multi-feature vectors. J Softw Eng: 254–264Google Scholar
  8. 8.
    Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: 18th international conference pattern recognition, pp 18–21Google Scholar
  9. 9.
    Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. Lecture notes computing science (including Subseries. Lecture notes artificial intelligence lecture notes bioinformatics), pp 51–65CrossRefGoogle Scholar
  10. 10.
    Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: IEEE international conference on acoustics speech signal process. ICASSP 2009. IEEE, pp 1053–1056Google Scholar
  11. 11.
    AndaJan L, Fridrich J, Soukal D (2008) Detection of copy-move forgery in digital images using sift algorithm. In: Proceedings—2008 Pacific-Asia workshop on computational intelligence and industrial application, PACIIA, pp 272–276Google Scholar
  12. 12.
    Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department Computing Science, Dartmouth College. Technical Report. TR2004-515, no. 2000, pp 1–11, 2004Google Scholar
  13. 13.
    Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int: 61–72CrossRefGoogle Scholar
  14. 14.
    Gabor D (1946) Theory of communication. Part 1: the analysis of information. J Inst Electr Eng III Radio Commun Eng: 429–441Google Scholar
  15. 15.
    Daugman JG (1985) Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. J Opt Soc Am A:1160CrossRefGoogle Scholar
  16. 16.
    Seryasat OR, Haddadnia J, Ghayoumi-Zadeh H (2015) A new method to classify breast cancer tumors and their fractionation. Ciência e Nat 37:51–57CrossRefGoogle Scholar
  17. 17.
    Haghighat M, Zonouz S, Abdel-Mottaleb M (2013) Identification using encrypted biometrics. In: Computer analysis of images and patterns, pp 440–448CrossRefGoogle Scholar
  18. 18.
    Kang X, Li Y, Qu Z, Huang J (2012) Enhancing source camera identification performance with a camera reference phase sensor pattern noise. IEEE Trans Inf Forensics Secur: 393–402CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Mostafa Mokhtari Ardakan
    • 1
    Email author
  • Masoud Yerokh
    • 1
  • Mostafa Akhavan Saffar
    • 1
  1. 1.Department of Computer and Information Technology, Faculty of EngineeringPayame Noor UniversityTehranIslamic Republic of Iran

Personalised recommendations