Skip to main content

2024 | OriginalPaper | Buchkapitel

A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images

verfasst von : Kaleemur Rehman, Saiful Islam

Erschienen in: Micro-Electronics and Telecommunication Engineering

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A decade of research has been conducted on detecting copy-move forgeries (CMFD). Technology has enabled the manipulation of images, once the most authentic source of information. This paper proposes a copy-move forgery detection algorithm based on fused features to address issues such as time complexity and difficulty detecting forgeries in smooth regions. To extract descriptive features, a low-contrast threshold was used in conjunction with three detection methods, including scale-invariant feature transform (SIF), speeded-up robust features (SURF), and accelerated KAZE (AKAZE). SURF and accelerated KAZE (AKAZE) are used in our keypoint-based CMFD technique. To detect manipulated regions efficiently, AKZAE, SURF, and SIFT can be used to extract major keypoints in smooth regions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fridrich J (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, 2003 Fridrich J (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, 2003
2.
Zurück zum Zitat Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184CrossRef Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184CrossRef
3.
Zurück zum Zitat Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions
4.
Zurück zum Zitat Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: 18th International conference on pattern recognition (ICPR’06), IEEE, pp 746–749 Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: 18th International conference on pattern recognition (ICPR’06), IEEE, pp 746–749
5.
Zurück zum Zitat Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503CrossRef Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503CrossRef
6.
Zurück zum Zitat Bayram S, Avcıbaş İ, Sankur B, Memon N (2005) Image manipulation detection with binary similarity measures. In: 2005 13th European signal processing conference. IEEE, pp 1–4 Bayram S, Avcıbaş İ, Sankur B, Memon N (2005) Image manipulation detection with binary similarity measures. In: 2005 13th European signal processing conference. IEEE, pp 1–4
7.
Zurück zum Zitat Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 1750–1753 Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 1750–1753
8.
Zurück zum Zitat Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1880–1883 Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1880–1883
9.
Zurück zum Zitat Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multim Signal Process 4(1):46–56 Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multim Signal Process 4(1):46–56
10.
Zurück zum Zitat Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962CrossRef Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962CrossRef
11.
Zurück zum Zitat Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using Zernike moments. In: International workshop on information hiding. Springer, pp 51–65 Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using Zernike moments. In: International workshop on information hiding. Springer, pp 51–65
12.
Zurück zum Zitat Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef
13.
Zurück zum Zitat Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef
14.
Zurück zum Zitat Qazi T et al (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670CrossRef Qazi T et al (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670CrossRef
15.
Zurück zum Zitat Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056 Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056
16.
Zurück zum Zitat Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056 Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 1053–1056
17.
Zurück zum Zitat Hussain N, Rani P, Chouhan H, Gaur US (2022) Cyber security and privacy of connected and automated vehicles (CAVs)-based federated learning: challenges, opportunities, and open issues. In: Yadav SP, Bhati BS, Mahato DP, Kumar S (eds) Federated learning for IoT applications. EAI/Springer Innovations in Communication and Computing. Springer International Publishing, Cham, pp 169–183. https://doi.org/10.1007/978-3-030-85559-8_11 Hussain N, Rani P, Chouhan H, Gaur US (2022) Cyber security and privacy of connected and automated vehicles (CAVs)-based federated learning: challenges, opportunities, and open issues. In: Yadav SP, Bhati BS, Mahato DP, Kumar S (eds) Federated learning for IoT applications. EAI/Springer Innovations in Communication and Computing. Springer International Publishing, Cham, pp 169–183. https://​doi.​org/​10.​1007/​978-3-030-85559-8_​11
24.
Zurück zum Zitat Babu ST, Rao CS (2022) An optimized technique for copy–move forgery localization using statistical features. ICT Express 8(2):244–249CrossRef Babu ST, Rao CS (2022) An optimized technique for copy–move forgery localization using statistical features. ICT Express 8(2):244–249CrossRef
25.
Zurück zum Zitat Yue G, Duan Q, Liu R, Peng W, Liao Y, Liu J (2022) SMDAF: a novel keypoint based method for copy-move forgery detection. IET Image Process 16(13):3589–3602CrossRef Yue G, Duan Q, Liu R, Peng W, Liao Y, Liu J (2022) SMDAF: a novel keypoint based method for copy-move forgery detection. IET Image Process 16(13):3589–3602CrossRef
26.
Zurück zum Zitat Uma S, Sathya PD (2022) Copy-move forgery detection of digital images using football game optimization. Aust J Forensic Sci 54(2):258–279CrossRef Uma S, Sathya PD (2022) Copy-move forgery detection of digital images using football game optimization. Aust J Forensic Sci 54(2):258–279CrossRef
27.
Zurück zum Zitat Gan Y, Zhong J, Vong C (2022) A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf Process Manag 59(1):102783 Gan Y, Zhong J, Vong C (2022) A novel copy-move forgery detection algorithm via feature label matching and hierarchical segmentation filtering. Inf Process Manag 59(1):102783
28.
Zurück zum Zitat Fatima B, Ghafoor A, Ali SS, Riaz MM (2022) FAST, BRIEF and SIFT based image copy-move forgery detection technique. Multimed Tools Appl 81(30):43805–43819CrossRef Fatima B, Ghafoor A, Ali SS, Riaz MM (2022) FAST, BRIEF and SIFT based image copy-move forgery detection technique. Multimed Tools Appl 81(30):43805–43819CrossRef
29.
Zurück zum Zitat Tahaoglu G, Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2022) Ciratefi based copy move forgery detection on digital images. Multimed Tools Appl 81(16):22867–22902CrossRef Tahaoglu G, Ulutas G, Ustubioglu B, Ulutas M, Nabiyev VV (2022) Ciratefi based copy move forgery detection on digital images. Multimed Tools Appl 81(16):22867–22902CrossRef
31.
Zurück zum Zitat Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: European conference on computer vision. Springer, pp 404–417 Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: European conference on computer vision. Springer, pp 404–417
32.
Zurück zum Zitat Prakash CS, Panzade PP, Om H, Maheshkar S (2019) Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimed Tools Appl 78:23535–23558CrossRef Prakash CS, Panzade PP, Om H, Maheshkar S (2019) Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimed Tools Appl 78:23535–23558CrossRef
33.
Zurück zum Zitat Rani P, Singh PN, Verma S, Ali N, Shukla PK, Alhassan M (2022) An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment. Wirel Commun Mob Comput 2022:1–14CrossRef Rani P, Singh PN, Verma S, Ali N, Shukla PK, Alhassan M (2022) An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment. Wirel Commun Mob Comput 2022:1–14CrossRef
34.
Zurück zum Zitat Rani P, Verma S, Yadav SP, Rai BK, Naruka MS, Kumar D (2022) Simulation of the lightweight blockchain technique based on privacy and security for healthcare data for the cloud system. Int J E-Health Med Commun IJEHMC 13(4):1–15CrossRef Rani P, Verma S, Yadav SP, Rai BK, Naruka MS, Kumar D (2022) Simulation of the lightweight blockchain technique based on privacy and security for healthcare data for the cloud system. Int J E-Health Med Commun IJEHMC 13(4):1–15CrossRef
35.
Zurück zum Zitat Rani P, Sharma R (2023) Intelligent transportation system for internet of vehicles based vehicular networks for smart cities. Comput Electr Eng 105:108543CrossRef Rani P, Sharma R (2023) Intelligent transportation system for internet of vehicles based vehicular networks for smart cities. Comput Electr Eng 105:108543CrossRef
37.
Zurück zum Zitat Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimed Tools Appl 76(22). Art. no. 22 Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimed Tools Appl 76(22). Art. no. 22
Metadaten
Titel
A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images
verfasst von
Kaleemur Rehman
Saiful Islam
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9562-2_66

Neuer Inhalt