Abstract
Creating copy-move forgery became even easier using a wide range of software and platforms. Many algorithms have been proposed to solve the problem, but each one of those algorithms has its own drawbacks. Researchers face many challenges in developing copy-move detection algorithms, and in this paper, we focus on two challenges. The first is the benchmark dataset, and the second involves evaluation metrics. In this paper, we investigate the available copy-move datasets and their advantages and disadvantages. In addition, we discuss the different metrics that have been used by researchers to evaluate the copy-move forgery detection (CMFD) algorithms. On that basis, we suggest the standard specifications of the appropriate copy-move dataset and the metrics that should be used to evaluate the detection algorithms. The findings of this paper will help researchers evaluate their algorithms effectively and fairly essential for developing reliable algorithms.
Similar content being viewed by others
Notes
Dataset here refers to the pixels of an image.
References
Al-Qershi OM, Khoo BE (Sep. 2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1–3):284–295
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28(6):659–669
Amtullah S, Koul DA (2014) Passive image forensic method to detect copy move forgery in digital images. IOSR J Comput Eng 16(2):96–104
Ardizzone E, Bruno A, Mazzola G (2010) Copy-move forgery detection via texture description. In: Proceedings of the 2010 ACM Workshop on Multimedia in Forensics, Security and Intelligence,(MiFor’10), pp. 59–64
Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of Keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094
Bakiah N et al (2016) Copy-move forgery detection : survey, challenges and future directions. J Netw Comput Appl 75:259–278
Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10:226–245
Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91(8):1759–1770
Brownlee J (2015) Metrics To Evaluate Machine Learning Algorithms in Python. Machine Learning Mastery. [Online]. Available: http://machinelearningmastery.com/metrics-evaluate-machine-learning-algorithms-python/. Accessed 06 Oct 2016
Cao Y, Gao T, Fan L, Yang Q (2011) A robust detection algorithm for region duplication in digital images. Int J Digit Content Technol its Appl 5(6):95–103
Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 2014(1–3):33–43
Chihaoui T, Bourouis S, Hamrouni K (2014) Copy move image forgery detection based on SIFT descriptors and SVD matching. In: Proceedings of the International Conference on Advanced Technologies for Signal and Image Processing, pp 125–129
Christlein V, Riess C, Jordan J, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854
Chubb M (2014) In-depth Social Media picture sizes. Available: http://www.onlinesocialmedia.net/20140821/in-depth-social-media-picture-sizes/. Accessed 23 Sep 2016
Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: The International Conference on Image Processing (ICIP), pp 5247–5251
Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy – move forgery detection. Ieee Trans Inf Forensics Secur 10(11):2284–2297
Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (Sep. 2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72
Doyoddorj M, Rhee K-H (2013) Robust copy-move forgery detection based on dual-transform. In: Proceedings of the 5th International Conference on Digital Forensics and Cyber Crime, pp. 3–16
Emam M, Han Q, Niu X (2015) PCET based copy-move forgery detection in images under geometric transforms. Multimed Tools Appl 75(18):11513–11527
Fadl SM, Semary NA (2015) A proposed accelerated image copy-move forgery detection. In: Proceedings of the IEEE Visual Communications and Image Processing Conference, VCIP, pp. 253–257
Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. Proceedings of DFRWS 2003. Cleveland
Hashmi MF, Anand V, Keskar AG (2014) Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia 9:84–91
Hashmi MF, Hambarde AR, Keskar AG (2014) Copy move forgery detection using DWT and SIFT features. In: Proceedings of the international conference on intelligent systems design and applications, ISDA, pp 188–193
He H, Huang X, Kuang J (2013) Exposing copy-move forgeries based on a dimension-reduced Sift method. Inf Technol J 12(14):2975–2979
Hsu H-C, Wang M-S (2012) Detection of copy-move forgery image using Gabor descriptor. In: Anti-counterfeiting, security and identification (ASID), 2012 international conference on, pp 1–4
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184
Kirchner M, Sch P (2015) Thinking beyond the block: block matching for copy – move forgery detection revisited. In: Proc. SPIE 9409, Media Watermarking, Security, and Forensics 2015, vol. 9409, pp. 1–12
Kohavi R, Provost F (1998) Glossary of terms. Mach Learn 30(2/3):271–274
Kulkarni VS, Chavan YV (2014) Comparison of methods for detection of copy-move forgery in digital images. Spvryan’s Int J Eng Sci Technol 1(1):1–6
Kumar S, Desai J, Mukherjee S (2013) A fast DCT based method for copy move forgery detection. In: IEEE Second International Conference on Image Information Processing, pp 649–654
J. Lee, K. Chang, C. Chang, and C. Cheng (2014) Image copy-move forgery detection based on HOG. In: Proceedings of the 27th IPPR conference on computer vision, graphics, and image processing, pp 1–5
Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1–3):59–67
L. Li, S. Li, and J. Wang (2012) Copy-move forgery detection based on PHT. In: Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012, pp. 1061–1065
Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimed Signal Process 4(1):46–56
Liu F, Feng H (2014) An efficient algorithm for image copy-move forgery detection based on DWT and SVD. Int J Secur Its Appl 8(5):377–390
Liu F, Feng H (2014) A novel algorithm for image copy-move forgery detection and localization based on SVD and projection data. Int J Multimed Ubiquitous Eng 9(9):189–200
Liu G, Wang J, Lian S, Wang Z (2010) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565
Liu L, Ni R, Zhao Y, Li S (2014) Improved SIFT-based copy-move detection using BFSN clustering and CFA features. In: Proceedings of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 626–629
Lynch G, Shih FY, Liao H-YM (Aug. 2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci (Ny) 239(0):253–265
Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25(6):389–399
Maind RA, Khade A, Chitre DK (2014) Image copy move forgery detection using block representing method. Int J Soft Comput Eng 4(2):49–53
Malviya AV, Ladhake SA (2015) Copy move forgery detection using low complexity feature extraction. In: Proceedings of the IEEE UP Section Conference on Electrical Computer and Electronics, pp. 1–5
Manning CD, Raghavan P, Schütze H (2009) Chapter 8: evaluation in information retrieval. In: Introduction to Information Retrieval, no. c, pp. 151–175
Manu VT, Mehtre BM (2016) Detection of Copy-Move Forgery in Images Using Segmentation and SURF. Proceedings of the 2nd International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS) 425:645–654
Metz CE (1978) Basic principles of ROC analysis. Semin Nucl Med 8(4):283–298
Muhammad G, Hussain M, Khawaji K, Bebis G (2011) Blind copy move image forgery detection using dyadic undecimated wavelet transform. In: 17th DSP 2011 International Conference on Digital Signal Processing, Proceedings
Oommen RS, Jayamohan M, Sruthy S (2016) Scale Invariant Detection of Copy-Move Forgery Using Fractal Dimension and Singular Values. Proceedings of the 2nd International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS) 425:559–570
Park C-S, Kim C, Lee J, Kwon G-R (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimed Tools Appl 1–19
Powers DMW (2007) Evaluation: from precision, recall and F-factor to ROC, Informedness, Markedness & Correlation. J Mach Learn Technol 2(1):37–63
Pun C, Member S, Yuan X, Bi X (2015) Image forgery detection using adaptive over segmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1–12
Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51(1):133–162
Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6387 LNCS, pp. 51–65
Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370
Satapathy SC, Biswal BN, Udgata SK, Mandal JK (2014) Passive copy move forgery detection using SURF, HOG and SIFT Features. In: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), vol. 327, pp. 659–666
Sharma S, Ghanekar U (2015) A rotationally invariant texture descriptor to detect copy move forgery in medical images. In: Proceedings of the IEEE International Conference on Computational Intelligence & Communication Technology, pp. 795–798
Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32
Singh VK, Tripathi RC (2015) Fast rotation invariant detection of region duplication attacks even on uniform background containing digital images. Procedia Comput Sci 54:772–780
Sunil K, Jagan D, Shaktidev M (2014) DCT-PCA based method for copy-move forgery detection. Advances in Intelligent Systems and Computing 249:577–583
Thajeel SA, Sulong G (2015) A Novel Approach for detection of copy move forgery using completed robust local binary pattern. J Inf Hiding Multimed Signal Process 6(2):351–364
Torralba A, Efros AA (2011) Unbiased look at dataset bias. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 1521–1528
Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD - new database for copy-move forgery detection. In: Proceedings of 55th international symposium ELMAR, pp 49–54
Tralic D, Rosin PL, Sun X, Grgic S (2014) Detection of duplicated image regions using cellular automata,” In: Proceedings of the international conference on systems, signals and image processing (IWSSIP), pp. 167–170
Tralic D, Grgic S, Sun X, Rosin PL (2015) Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed Tools Appl, pp. 1–23
Uliyan DM, Jalab H, Abdul Wahab AW (2015) Copy move image forgery detection using hessian and center symmetric local binary pattern. In: Proceedings of the IEEE Conference on Open Systems ICOS, pp 7–11
Uliyan D, Jalab H, Abdul Wahab A, Sadeghi S (2016) Image region duplication forgery detection based on angular radial partitioning and Harris key-points. Symmetry (Basel) 8(7):62
Ulysses JN, Conci A (2010) Measuring similarity in medical registration. In: International Conference on Systems, Signals and Image Processing, p. 4
Ustubioglu B, Ulutas G, Ulutas M, Nabiyev V (2016) A new copy move forgery detection technique with automatic threshold determination. AEU Int J Electron Commun 70(8):1076–1087
Wang T, Tang J, Zhao W, Xu Q, Luo B (2012) Blind detection of copy-move forgery based on multi-scale autoconvolution invariants. Communications in Computer and Information Science 321: 438–446. CCIS
Wang T, Tang J, Luo B (2013) Blind detection of region duplication forgery by merging blur and affine moment invariants. In: Proceedings of Seventh International Conference on Image and Graphics, pp. 258–264
Wen B, Ye Z, Ng RST-T, Shen X, Winkler S (2016) COVERAGE – a novel database for copy-move forgery detection,” In: Proceedings of the IEEE international conference on image processing (ICIP), pp. 161–165
What Size Should Online Images Be Uploaded to Avoid Theft?. 2014. [Online]. Available: https://www.plagiarismtoday.com/2014/08/28/size-online-images-uploaded-avoid-theft/. [Accessed: 23-Sep-2016]
Yang J, Ran P, Xiao D, Tan J (2013) Digital image forgery forensics by using undecimated dyadic wavelet transform and Zernike moments. J Comput Inf Syst 9(16):6399–6408
Yu L, Han Q, Niu X (2014) Copy-rotation-move forgery detection using the MROGH descriptor. In: Proceedings of the IEEE international conference on cloud engineering, IC2E, pp 510–513
Yu L, Han Q, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimed Tools Appl 75(2):1159–1176
Zhang J, Feng Z, Su Y (2008) A new approach for detecting copy-move forgery in digital images. In: Communication systems, 2008. ICCS 2008. 11th IEEE Singapore international conference on, pp. 362–366
Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166
Acknowledgments
The authors would like to acknowledge the financial assistance provided by the Ministry of Education Malaysia through FRGS grant number 203/PELECT/6071305.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Al-Qershi, O.M., Khoo, B.E. Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multimed Tools Appl 77, 31807–31833 (2018). https://doi.org/10.1007/s11042-018-6201-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6201-4