Advertisement

A Review of Passive Image Cloning Detection Approaches

  • Amit DoegarEmail author
  • Maitreyee Dutta
  • Gaurav Kumar
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 46)

Abstract

Image Cloning is also known as copy-paste/copy-move image forgery where a fragment of the image or object is copy and paste into some other area of the same image. It is a type of image tampering with a motive either to hide the object or to falsify the information of the image. Thus it makes difficulty in the trustworthiness of the images in various real-time applications. With the easy accessibility of image manipulation software, the number of cases of image tampering is increasing. Hence there is a growing need for robust, accurate and efficient digital image forgery detection approaches. This review presented a brief discussion of various approaches for image cloning detection and will be useful for the researchers as a future direction in the area of image forensics and image forgery detection approaches implementation.

Keywords

Image forgery Image cloning detection Image forensics 

References

  1. 1.
    S. Murali, B.S. Anami, G.B. Chittapur, Detection of copy-create image forgery using luminance level techniques, in Proceedings of 3rd National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, NCVPRIPG (2011), pp. 215–218Google Scholar
  2. 2.
    O.M. Al-Qershi, B.E. Khoo, Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci. Int. 231(1–3), 284–295 (2013)CrossRefGoogle Scholar
  3. 3.
    M.A. Quereshi, M. Deriche, A review on copy move image forgery detection techniques, in Proceedings of IEEE 11th International Multi-Conference on Systems, Signals and Devices (SSD) (2014), pp. 1–5Google Scholar
  4. 4.
    H. Farid, Image Analysis. [Online]. Available: http://www.cs.dartmouth.edu/farid. Accessed 22 Oct 2017
  5. 5.
    D. Chauhan, D. Kasat, S. Jain, V. Thakare, Survey on Keypoint Based Copy-Move Forgery Detection Methods on Image, vol. 85 (Elsevier, Science Direct, Procedia Computer Science, 2016), pp. 206–212Google Scholar
  6. 6.
    C.N. Bharti, P. Tandel, A survey of image forgery detection techniques, in Proceedings of IEEE International Conference on Wireless Communications, Signal Processing and Networking, (WiSPNET 2016) (2016), pp. 877–881Google Scholar
  7. 7.
    S.I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRefGoogle Scholar
  8. 8.
    Y. Cao, T. Gao, L. Fan, Q. Yang, A robust detection algorithm for copy-move forgery in digital images. Forensic Sci. Int. 214(1–3), 33–43 (2012)CrossRefGoogle Scholar
  9. 9.
    G.B. Chittapur, B.S. Anami, S. Murali, H. Prabhakara, B.S. Anami, Comparison and analysis of photo image forgery detection techniques. Int. J. Comput. Sci. Appl. 2(6), 45–56 (2012)Google Scholar
  10. 10.
    A. Costanzo, I. Amerini, R. Caldelli, M. Barni, Forensic analysis of SIFT keypoint removal and injection. IEEE Trans. Inf. Forensics Secur. 9(9), 1450–1464 (2014)CrossRefGoogle Scholar
  11. 11.
    S. Ye, Q. Sun, E. Chang, Detecting digital image forgeries by measuring inconsistencies of blocking artifact, in Proceedings of IEEE International Conference on Multimedia and Expo (July 2007), pp. 12–15Google Scholar
  12. 12.
    P.G. Gomase, N.R. Wankhade, Advanced digital image forgery detection: a review. IOSR J. Comput. Sci. (IOSR-JCE) 2014, 80–83 (2014e-ISSN: 2278-0661, p-ISSN: 2278-8727)Google Scholar
  13. 13.
    F.J. Huang, J.W. Huang, Y.Q. Shi, Detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Forensics Secur. 5(4), 848–856 (2010)CrossRefGoogle Scholar
  14. 14.
    T. Bianchi, A. Piva, Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Trans. Inf. Forensics Secur. 7(2), 842–848 (2012)CrossRefGoogle Scholar
  15. 15.
    C.M. Hsu, J.C. Lee, W.K. Chen, An efficient detection algorithm for copy-move forgery, Proceedings—2015 10th Asia Joint Conference on Information Security (2015), pp. 33–36Google Scholar
  16. 16.
    E. Ardizzone, A. Bruno, G. Mazzola, Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10(10), 2084–2094 (2015)CrossRefGoogle Scholar
  17. 17.
    M.D. Ansari, S.P. Ghrera, V. Tyagi, Pixel-based image forgery detection: a review. IETE J. Educ. 55(1), 40–46 (2014)CrossRefGoogle Scholar
  18. 18.
    E. Ardizzone, A. Bruno, G. Mazzola, Detecting multiple copies in tampered images, in Proceedings of IEEE International Conference on Image Processing, (ICIP) (2010), pp. 2117–2120Google Scholar
  19. 19.
    S. Ryu, M. Lee, H. Lee, Detection of copy-rotate-move forgery using zernike moments, in Proceedings of Springer International Workshop on Information Hiding, Berlin Heidelberg, vol. 1 (2010), pp. 51–65Google Scholar
  20. 20.
    S. Bayram, H. Sencar, N. Memon, An efficient and robust method for detecting copy-move forgery, in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (2009), pp. 1053–1056Google Scholar
  21. 21.
    K.-F. Li, T.-S. Chen, S.-C. Wu, Image tamper detection and recovery system based on discrete wavelet transformation, in IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, vol. 1 (2001), pp. 164–167Google Scholar
  22. 22.
    M. Ghorbani, A. Faraahi, DWT-DCT (QCD) based copy-move image forgery detection, in IEEE 18th International Conference on Systems, Signals and Image Processing (IWSSIP) (June 2011)Google Scholar
  23. 23.
    S. Sadeghi, H.A Jalab, S. Dadkhah, Efficient copy-move forgery detection for digital images, in Proceedings of World Academy of Science, Engineering and Technology(WASET), vol. 71 (2012), p. 755Google Scholar
  24. 24.
    G. Muhammad, M.H. Al-Hammadi, M. Hussain, A.M. Mirza, G. Bebis, Copy move image forgery detection method using steerable pyramid transform and texture descriptor. IEEE EuroCon 2013(July), 1586–1592 (2013)Google Scholar
  25. 25.
    M. Jaberi, G. Bebis, M. Hussain, G. Muhammad, Accurate and robust localization of duplicated region in copy-move image forgery. Mach. Vis. Appl. 25(2), 451–475 (2014)CrossRefGoogle Scholar
  26. 26.
    X.K.X. Kang, S.W.S. Wei, Identifying tampered regions using singular value decomposition in digital image forensics, in Proceedings of International Conference on Computer Science and Software Engineering, vol. 3 (2008), pp. 926–930Google Scholar
  27. 27.
    T. Chihaoui, S. Bourouis, K. Hamrouni, Copy move image forgery detection based on SIFT descriptors and SVD matching, in Proceedings of the International Conference on Advanced Technologies for Signal and Image Processing (2014), pp. 125–129Google Scholar
  28. 28.
    A. Fridrich, B. Jessica, D. Soukal, A.J. Lukas, Detection of copy-move forgery in digital images, in Proceedings of Digital Forensic Research Workshop (2003)Google Scholar
  29. 29.
    B. Liu, C. Pun, A SIFT and local features based integrated method for copy-move attack detection in digital image, in Proceedings of IEEE International Conference on Information and Automation (2013), pp. 865–869Google Scholar
  30. 30.
    H. Wang, H.-X. Wang, X.-M. Sun, Q. Qian, A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multimedia Tools Appl. 76(10), 12627–12644 (2017)CrossRefGoogle Scholar
  31. 31.
    J. Zhong, Y. Gan, Detection of copy–move forgery using discrete analytical Fourier-Mellin transform. Nonlinear Dyn. 84(1), 189–202 (2016)MathSciNetCrossRefGoogle Scholar
  32. 32.
    D.-Y. Huang, C.-N. Huang, H. Wu-Chih, C.-H. Chou, Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimedia Tools Appl. 76(1), 1509–1530 (2017)CrossRefGoogle Scholar
  33. 33.
    Y. Gan, J. Zhong, Application of AFMT method for composite forgery detection. Nonlinear Dyn. 84(1), 341–353 (2016)CrossRefGoogle Scholar
  34. 34.
    Y. Yuan, Y. Zhang, S. Chen, H. Wang, Robust Region duplication detection on log-polar domain using band limitation. Arab. J. Sci. Eng. 42(2), 559–565 (2017)CrossRefGoogle Scholar
  35. 35.
    B. Xu, W. Junwen, L. Guangjie, D. Yuewei, Image copy-move forgery detection based on SURF, in IEEE International Conference on Multimedia information networking and security (MINES) (2010), pp. 889–892Google Scholar
  36. 36.
    [Online]. Available: http://klapetek.cz/wdwt.html. Accessed 2 Nov 2017
  37. 37.
    M. Sonka, V. Hlavac, R. Boyle, Image Processing, Analysis and Machine Vision (Cengage Publisher, 2017)Google Scholar
  38. 38.
    J. Zhao, J. Guo, Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci. Int. 233(1–3), 158–166 (2013)CrossRefGoogle Scholar
  39. 39.
    S. Khan, A. Kulkarni, Robust method for detection of copy-move forgery in digital images, in Proceedings of IEEE International Conference on Signal and image processing (ICSIP 2010) (2010), pp. 69–73Google Scholar
  40. 40.
    B.-S. Sergio, A.K. Nandi. Exposing duplicated regions affected by reflection, rotation and scaling, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2011), pp. 1880–1883Google Scholar
  41. 41.
    A.N. Myna, M.G. Venkateshmurthy, C.G. Patil, Detection of region duplication forgery in digital images using wavelets and log-polar mapping, in International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) (2007), pp. 371–377Google Scholar
  42. 42.
    X. Guo, Z. Xu, Y. Lu, Y. Pang, An application of Fourier-Mellin transform in image registration, in Proceedings of the 5th International Conference on Computer and Information Technology (CIT) (2005), pp. 619–623Google Scholar
  43. 43.
    S.X. Liao, M. Pawlak, On the accuracy of zernike moments for image analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(12), 1358–1364 (1998)CrossRefGoogle Scholar
  44. 44.
    A.C. Popescu, H. Farid, Exposing Digital Forgeries by Detecting Duplicated Image Regions, vol. 2000 (Department Computer Science, Dartmouth College, Technology Report TR2004-515, 2004), pp. 1–11Google Scholar
  45. 45.
    S. Mariam, A key-point based robust algorithm for detecting cloning forgery, in IEEE International Conference on Control System, Computing and Engineering (ICCSCE), vol. 4 (2014), pp. 2775–2779Google Scholar
  46. 46.
    H. Hailing, W. Guo, Y. Zhang, Detection of copy-move forgery in digital images using SIFT algorithm, in IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA’08, vol. 2 (2008), pp. 272–276Google Scholar
  47. 47.
    N.B.A. Warif, A.W.A. Wahab, M.Y.I. Idris, R. Ramli, R. Salleh, S. Shamshirband, K.-K.R. Choo, Copy-move forgery detection: survey, challenges and future directions. J. Netw. Comput. Appl. 75, 259–278 (2016)Google Scholar
  48. 48.
    J. Zhong, Y. Gan, J. Young, L. Huang, P. Lin, A new block-based method for copymove forgery detection under image geometric transforms. Multimedia Tools Appl. 76(13), 14887–14903 (2017)CrossRefGoogle Scholar
  49. 49.
    [Online]. Available: http://forensics.idealtest.org/. Accessed 7 Nov 2017

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNITTTRChandigarhIndia
  2. 2.Magma Research and Consultancy ServicesAmbalaIndia

Personalised recommendations