Abstract
A decade of research has been conducted on detecting copy-move forgeries (CMFD). Technology has enabled the manipulation of images, once the most authentic source of information. This paper proposes a copy-move forgery detection algorithm based on fused features to address issues such as time complexity and difficulty detecting forgeries in smooth regions. To extract descriptive features, a low-contrast threshold was used in conjunction with three detection methods, including scale-invariant feature transform (SIF), speeded-up robust features (SURF), and accelerated KAZE (AKAZE). SURF and accelerated KAZE (AKAZE) are used in our keypoint-based CMFD technique. To detect manipulated regions efficiently, AKZAE, SURF, and SIFT can be used to extract major keypoints in smooth regions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fridrich J (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, 2003
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184
Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions
Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: 18th International conference on pattern recognition (ICPR’06), IEEE, pp 746–749
Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503
Bayram S, Avcıbaş İ, Sankur B, Memon N (2005) Image manipulation detection with binary similarity measures. In: 2005 13th European signal processing conference. IEEE, pp 1–4
Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 1750–1753
Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1880–1883
Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multim Signal Process 4(1):46–56
Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962
Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using Zernike moments. In: International workshop on information hiding. Springer, pp 51–65
Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370
Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297
Qazi T et al (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670
Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056
Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056
Hussain N, Rani P, Chouhan H, Gaur US (2022) Cyber security and privacy of connected and automated vehicles (CAVs)-based federated learning: challenges, opportunities, and open issues. In: Yadav SP, Bhati BS, Mahato DP, Kumar S (eds) Federated learning for IoT applications. EAI/Springer Innovations in Communication and Computing. Springer International Publishing, Cham, pp 169–183. https://doi.org/10.1007/978-3-030-85559-8_11
Hussain N, Rani P (2020) Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security. In: Distributed artificial intelligence. CRC Press, pp 217–236. Accessed: Oct 19 2023. (Online). Available: https://www.taylorfrancis.com/chapters/edit/10.1201/9781003038467-13/comparative-studied-based-attack-resilient-efficient-protocol-intrusion-detection-system-based-deep-neural-network-vehicular-system-security-naziya-hussain-preeti-rani
Armas Vega EA, González Fernández E, Sandoval Orozco AL, GarcÃa Villalba LJ (2021) Copy-move forgery detection technique based on discrete cosine transform blocks features. Neural Comput Appl 33(10):4713–4727. https://doi.org/10.1007/s00521-020-05433-1
Darem A, Al-Hashmi A, Javed M, Abubaker A (2020) Digital forgery detection of official document images in compressed domain. https://doi.org/10.22937/IJCSNS.2020.20.12.12
Diwan A, Sharma R, Roy AK, Mitra SK (2021) Keypoint based comprehensive copy-move forgery detection. IET Image Process 15(6):1298–1309. https://doi.org/10.1049/ipr2.12105
Sunitha K, Krishna AN (2020) Efficient keypoint based copy move forgery detection method using hybrid feature extraction. In: 2020 2nd International conference on innovative mechanisms for industry applications (ICIMIA), pp 670–675. https://doi.org/10.1109/ICIMIA48430.2020.9074951
Hegazi A, Taha A, Selim MM (2021) An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal. J King Saud Univ Comput Inf Sci 33(9):1055–1063. https://doi.org/10.1016/j.jksuci.2019.07.007
Babu ST, Rao CS (2022) An optimized technique for copy–move forgery localization using statistical features. ICT Express 8(2):244–249
Yue G, Duan Q, Liu R, Peng W, Liao Y, Liu J (2022) SMDAF: a novel keypoint based method for copy-move forgery detection. IET Image Process 16(13):3589–3602
Uma S, Sathya PD (2022) Copy-move forgery detection of digital images using football game optimization. Aust J Forensic Sci 54(2):258–279
Gan Y, Zhong J, Vong C (2022) A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf Process Manag 59(1):102783
Fatima B, Ghafoor A, Ali SS, Riaz MM (2022) FAST, BRIEF and SIFT based image copy-move forgery detection technique. Multimed Tools Appl 81(30):43805–43819
Tahaoglu G, Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2022) Ciratefi based copy move forgery detection on digital images. Multimed Tools Appl 81(16):22867–22902
Yadav SP, Jindal M, Rani P, De Albuquerque VHC, Dos Santos Nascimento C, Kumar M (2023) An improved deep learning-based optimal object detection system from images. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16736-5
Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: European conference on computer vision. Springer, pp 404–417
Prakash CS, Panzade PP, Om H, Maheshkar S (2019) Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimed Tools Appl 78:23535–23558
Rani P, Singh PN, Verma S, Ali N, Shukla PK, Alhassan M (2022) An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment. Wirel Commun Mob Comput 2022:1–14
Rani P, Verma S, Yadav SP, Rai BK, Naruka MS, Kumar D (2022) Simulation of the lightweight blockchain technique based on privacy and security for healthcare data for the cloud system. Int J E-Health Med Commun IJEHMC 13(4):1–15
Rani P, Sharma R (2023) Intelligent transportation system for internet of vehicles based vehicular networks for smart cities. Comput Electr Eng 105:108543
Pun C-M, Chung J-L (2018) A two-stage localization for copy-move forgery detection. Inf Sci 463–464:33–55. https://doi.org/10.1016/j.ins.2018.06.040
Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimed Tools Appl 76(22). Art. no. 22
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rehman, K., Islam, S. (2024). A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images. In: Sharma, D.K., Peng, SL., Sharma, R., Jeon, G. (eds) Micro-Electronics and Telecommunication Engineering. ICMETE 2023. Lecture Notes in Networks and Systems, vol 894. Springer, Singapore. https://doi.org/10.1007/978-981-99-9562-2_66
Download citation
DOI: https://doi.org/10.1007/978-981-99-9562-2_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9561-5
Online ISBN: 978-981-99-9562-2
eBook Packages: EngineeringEngineering (R0)