Skip to main content

A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images

  • Conference paper
  • First Online:
Micro-Electronics and Telecommunication Engineering (ICMETE 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 894))

  • 63 Accesses

Abstract

A decade of research has been conducted on detecting copy-move forgeries (CMFD). Technology has enabled the manipulation of images, once the most authentic source of information. This paper proposes a copy-move forgery detection algorithm based on fused features to address issues such as time complexity and difficulty detecting forgeries in smooth regions. To extract descriptive features, a low-contrast threshold was used in conjunction with three detection methods, including scale-invariant feature transform (SIF), speeded-up robust features (SURF), and accelerated KAZE (AKAZE). SURF and accelerated KAZE (AKAZE) are used in our keypoint-based CMFD technique. To detect manipulated regions efficiently, AKZAE, SURF, and SIFT can be used to extract major keypoints in smooth regions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fridrich J (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, 2003

    Google Scholar 

  2. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184

    Article  Google Scholar 

  3. Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions

    Google Scholar 

  4. Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: 18th International conference on pattern recognition (ICPR’06), IEEE, pp 746–749

    Google Scholar 

  5. Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503

    Article  Google Scholar 

  6. Bayram S, Avcıbaş İ, Sankur B, Memon N (2005) Image manipulation detection with binary similarity measures. In: 2005 13th European signal processing conference. IEEE, pp 1–4

    Google Scholar 

  7. Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 1750–1753

    Google Scholar 

  8. Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1880–1883

    Google Scholar 

  9. Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multim Signal Process 4(1):46–56

    Google Scholar 

  10. Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962

    Article  Google Scholar 

  11. Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using Zernike moments. In: International workshop on information hiding. Springer, pp 51–65

    Google Scholar 

  12. Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370

    Article  Google Scholar 

  13. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297

    Article  Google Scholar 

  14. Qazi T et al (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670

    Article  Google Scholar 

  15. Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056

    Google Scholar 

  16. Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056

    Google Scholar 

  17. Hussain N, Rani P, Chouhan H, Gaur US (2022) Cyber security and privacy of connected and automated vehicles (CAVs)-based federated learning: challenges, opportunities, and open issues. In: Yadav SP, Bhati BS, Mahato DP, Kumar S (eds) Federated learning for IoT applications. EAI/Springer Innovations in Communication and Computing. Springer International Publishing, Cham, pp 169–183. https://doi.org/10.1007/978-3-030-85559-8_11

  18. Hussain N, Rani P (2020) Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security. In: Distributed artificial intelligence. CRC Press, pp 217–236. Accessed: Oct 19 2023. (Online). Available: https://www.taylorfrancis.com/chapters/edit/10.1201/9781003038467-13/comparative-studied-based-attack-resilient-efficient-protocol-intrusion-detection-system-based-deep-neural-network-vehicular-system-security-naziya-hussain-preeti-rani

  19. Armas Vega EA, González Fernández E, Sandoval Orozco AL, García Villalba LJ (2021) Copy-move forgery detection technique based on discrete cosine transform blocks features. Neural Comput Appl 33(10):4713–4727. https://doi.org/10.1007/s00521-020-05433-1

  20. Darem A, Al-Hashmi A, Javed M, Abubaker A (2020) Digital forgery detection of official document images in compressed domain. https://doi.org/10.22937/IJCSNS.2020.20.12.12

  21. Diwan A, Sharma R, Roy AK, Mitra SK (2021) Keypoint based comprehensive copy-move forgery detection. IET Image Process 15(6):1298–1309. https://doi.org/10.1049/ipr2.12105

    Article  Google Scholar 

  22. Sunitha K, Krishna AN (2020) Efficient keypoint based copy move forgery detection method using hybrid feature extraction. In: 2020 2nd International conference on innovative mechanisms for industry applications (ICIMIA), pp 670–675. https://doi.org/10.1109/ICIMIA48430.2020.9074951

  23. Hegazi A, Taha A, Selim MM (2021) An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal. J King Saud Univ Comput Inf Sci 33(9):1055–1063. https://doi.org/10.1016/j.jksuci.2019.07.007

  24. Babu ST, Rao CS (2022) An optimized technique for copy–move forgery localization using statistical features. ICT Express 8(2):244–249

    Article  Google Scholar 

  25. Yue G, Duan Q, Liu R, Peng W, Liao Y, Liu J (2022) SMDAF: a novel keypoint based method for copy-move forgery detection. IET Image Process 16(13):3589–3602

    Article  Google Scholar 

  26. Uma S, Sathya PD (2022) Copy-move forgery detection of digital images using football game optimization. Aust J Forensic Sci 54(2):258–279

    Article  Google Scholar 

  27. Gan Y, Zhong J, Vong C (2022) A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf Process Manag 59(1):102783

    Google Scholar 

  28. Fatima B, Ghafoor A, Ali SS, Riaz MM (2022) FAST, BRIEF and SIFT based image copy-move forgery detection technique. Multimed Tools Appl 81(30):43805–43819

    Article  Google Scholar 

  29. Tahaoglu G, Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2022) Ciratefi based copy move forgery detection on digital images. Multimed Tools Appl 81(16):22867–22902

    Article  Google Scholar 

  30. Yadav SP, Jindal M, Rani P, De Albuquerque VHC, Dos Santos Nascimento C, Kumar M (2023) An improved deep learning-based optimal object detection system from images. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16736-5

  31. Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: European conference on computer vision. Springer, pp 404–417

    Google Scholar 

  32. Prakash CS, Panzade PP, Om H, Maheshkar S (2019) Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimed Tools Appl 78:23535–23558

    Article  Google Scholar 

  33. Rani P, Singh PN, Verma S, Ali N, Shukla PK, Alhassan M (2022) An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment. Wirel Commun Mob Comput 2022:1–14

    Article  Google Scholar 

  34. Rani P, Verma S, Yadav SP, Rai BK, Naruka MS, Kumar D (2022) Simulation of the lightweight blockchain technique based on privacy and security for healthcare data for the cloud system. Int J E-Health Med Commun IJEHMC 13(4):1–15

    Article  Google Scholar 

  35. Rani P, Sharma R (2023) Intelligent transportation system for internet of vehicles based vehicular networks for smart cities. Comput Electr Eng 105:108543

    Article  Google Scholar 

  36. Pun C-M, Chung J-L (2018) A two-stage localization for copy-move forgery detection. Inf Sci 463–464:33–55. https://doi.org/10.1016/j.ins.2018.06.040

    Article  MathSciNet  Google Scholar 

  37. Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimed Tools Appl 76(22). Art. no. 22

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaleemur Rehman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rehman, K., Islam, S. (2024). A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images. In: Sharma, D.K., Peng, SL., Sharma, R., Jeon, G. (eds) Micro-Electronics and Telecommunication Engineering. ICMETE 2023. Lecture Notes in Networks and Systems, vol 894. Springer, Singapore. https://doi.org/10.1007/978-981-99-9562-2_66

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9562-2_66

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9561-5

  • Online ISBN: 978-981-99-9562-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics