Abstract
Security and awareness are deemed as the primary aim in digital forensic research to assess whether a recorded picture is authentic or forged. In the case of digital pictures, this can be a critical task that may be used as evidence for many judgments. Nowadays, anyone can manipulate or create a forged image simply using tools like Photoshop, GIMP, PicsArt, etc. on desktop or on mobile devices. Various image manipulation techniques are available to forge an image, but the copy–move image forgery is considered one of the most popular attacks. Here a region is copied twice or more to manipulate information. For detecting copy–move forgery, we proposed a technique that is based on block-based forgery detection methods and also used a brute force algorithm to speed up the process and reducing the false results to improve the accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sharma, K.: Computationally efficient copy-move image forgery detection based on DCT and SVD. Adv. Res. Electr. Electron. Eng. 1(3), 76–81 (2014)
Cozzolino, D., Poggi, G., Verdoliva, L.: Copy-move forgery detection based on patchmatch. In: IEEE International Conference on Image Processing (2014)
Mursi, M., Salama, M., Habeb, M.: An Improved SIFT-PCA-based copy-move image forgery detection method. Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARCSEE), 6(3), 23–28 (2017)
Zimba, M., Xingming, S.: DWT-PCA (EVD) based copy-move image forgery detection. Int. J. Digit. Content Technol. Appl. 5(1), 251–258 (2011)
Wang, X., He, G., Tang, C., Han, Y., Wang, S.: Keypoints-based image passive forensics method for copy-move attacks. Int. J. Pattern Recognit. Artif. Intell. 30(3), 304–308 (2016)
Pan, X.Y., Lyu, S.W.: Region duplication detection using image feature matching. IEEE Trans. Inf. ForensSec 5(4), 857–867 (2010)
Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. Forens. Sci. Int. 206(1–3), 178–184 (2011)
Jha, R.K., Soni, B., Chouhan, R., Aizawa, K.: Improved Watermark Extraction from Audio Signals by Scaling of Internal Noise in DCT Domain, Springer Berlin Heidelberg, Berlin, Heidelberg, 235–243. Image copy detection. IEEE Trans. Inf. Forens. Secur. 12(1), 48–63 (2012)
Soni, B., Das, P.K., Thounaojam, D.M.: MultiCMFD: fast and efficient system for multiple copy-move forgeries detection in an image. In: Proceedings of the 2018 International Conference on Image and Graphics Processing (ICIGP 2018), pp. 53–58. Association for Computing Machinery, New York (2018)
Chen, C., Lu, W., Chou, C.: Rotational copy-move forgery detection using SIFT and region growing strategies. Multimedia Tools Appl. 78, 18293–18308 (2019)
Yang, H., Qi, S., Niu, Y., et al.: Copy-move forgery detection based on adaptive keypoints extraction and matching. Multimed Tools Appl. 78, 34585–34612 (2019)
Gürbüz, E., Ulutas, G., Ulutas, M.: Detection of Free-Form Copy-Move Forgery on Digital Images, Security and Communication Networks, vol. 2019, Article ID 8124521, 14 pages (2019)
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forens. Secur. 6(3), 1099–1110 (2011)
Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forens. Secur. 10 (2015)
Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forens. Secur. 7(6), 1841–1854 (2012)
Goutte C., Gaussier, E.: A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In: Losada, D.E., Fernández-Luna, J.M. (eds) Advances in Information Retrieval. ECIR 2005. Lecture Notes in Computer Science, vol 3408. Springer, Berlin, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31865-1_25
Wu, Y., Abd-Almageed, W., Natarajan, P.: BusterNet: detecting copy-move image forgery with source target localization. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds) Computer Vision ECCV 2018. ECCV 2018. Lecture Notes in Computer Science, vol 11210. Springer, Cham (2018)
Wei, Y., Bi, X., Xiao, B.: C2R net: the coarse to refined network for image forgery detection. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York (2018)
Image forgery detection using image similarity: alZahir, S., Hammad, R. Multimed Tools Appl. 79, 28643–28659 (2020)
Roy, K., Mukherjee, J.: Image similarity measure using color histogram, color coherence vector, and sobel method. Int. J. Sci. Res. 2(1), 538–543 (2013)
Wang, H., Wang, H., Sun, X., Qian, Q.: A passive authentication scheme for copy-move forgery based onpackage clustering algorithm. Multimedia Tools Appl. (2017)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Roy, S., Roy, K. (2022). Block Based Copy–Move Forgery Detection for Digital Image Forensic. In: Mandal, J.K., Buyya, R., De, D. (eds) Proceedings of International Conference on Advanced Computing Applications. Advances in Intelligent Systems and Computing, vol 1406. Springer, Singapore. https://doi.org/10.1007/978-981-16-5207-3_42
Download citation
DOI: https://doi.org/10.1007/978-981-16-5207-3_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5206-6
Online ISBN: 978-981-16-5207-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)