Skip to main content

2019 | OriginalPaper | Buchkapitel

A Robust Method for Image Copy-Move Passive Forgery Detection with Enhanced Speed

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Forgery detection of images is presently one of the fascinated research fields. Copy-move forgery is the most commonly used methods for image forgery. A novel method is proposed in this paper, which is an effective and advanced method for detecting copy-move forgery. The proposed method is a block matching technique with reduced computational speed and less computational complexities. The efficiency of outcome is also improved. The image is segmented into fixed dimensions of overlying blocks and then discrete cosine transform (DCT) is applied to each block to extract its features. Then, the mean of each block is obtained. The mean of each block is compared with other blocks to find the similarity between the blocks. The computational outcomes are shown that indicates the proposed method is robust to detect copy-move forgery efficiently with enhanced speed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection. In: Visual communications and image processing conference, IEEE Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection. In: Visual communications and image processing conference, IEEE
2.
Zurück zum Zitat Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRef Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRef
3.
Zurück zum Zitat Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184 Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184
4.
Zurück zum Zitat Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Sig Process (World Sci Eng Acad Soc) 5(5):188–197 Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Sig Process (World Sci Eng Acad Soc) 5(5):188–197
5.
Zurück zum Zitat Bhargava N, Sharma MM, Garhwal AS (2012) An improved image authentication technique using random-sequence based secret-sharing scheme. In: 2012 International conference on radar, communication and computing (ICRCC), 21–22 Dec. 2012. IEEE 07 Feb 2013 Bhargava N, Sharma MM, Garhwal AS (2012) An improved image authentication technique using random-sequence based secret-sharing scheme. In: 2012 International conference on radar, communication and computing (ICRCC), 21–22 Dec. 2012. IEEE 07 Feb 2013
6.
Zurück zum Zitat Katzenbeisser S, Petitcols FAP (2000) Information techniques for stenography and digital watermarking. Norwood, A, Artec House Katzenbeisser S, Petitcols FAP (2000) Information techniques for stenography and digital watermarking. Norwood, A, Artec House
7.
Zurück zum Zitat Alam S, Jamil A, Saldhi A (2015) Digital image authentication and encryption using digital signature. In: 2015 international conference on advances in computer engineering and applications (ICACEA), 19–20 Mar 2015. IEEE 23 July 2015 Alam S, Jamil A, Saldhi A (2015) Digital image authentication and encryption using digital signature. In: 2015 international conference on advances in computer engineering and applications (ICACEA), 19–20 Mar 2015. IEEE 23 July 2015
8.
Zurück zum Zitat Singh VK, Tripathi RC (2011) Fast and efficient region duplication detection in digital images using sub-blocking method. Int J Adv Sci Technol 35:93–102 Singh VK, Tripathi RC (2011) Fast and efficient region duplication detection in digital images using sub-blocking method. Int J Adv Sci Technol 35:93–102
9.
Zurück zum Zitat Liu G, Wang J, Lian S, Wang Z (2010) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565 Liu G, Wang J, Lian S, Wang Z (2010) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565
10.
Zurück zum Zitat Sebe N, Liu Y, Zhuang Y, Huang T, Chang S-F (2007) Blind passive media forensics: motivation and opportunity. In: Multimedia content analysis and mining. Springer, Berlin, pp 57–59 Sebe N, Liu Y, Zhuang Y, Huang T, Chang S-F (2007) Blind passive media forensics: motivation and opportunity. In: Multimedia content analysis and mining. Springer, Berlin, pp 57–59
11.
Zurück zum Zitat Chen C-H, Tang Y-L, Hsieh W-S (2014) Color image authentication and recovery via adaptive encoding. In: 2014 international symposium on computer, consumer and control (IS3C), 10–12 June 2014. IEEE 30 June 2014 Chen C-H, Tang Y-L, Hsieh W-S (2014) Color image authentication and recovery via adaptive encoding. In: 2014 international symposium on computer, consumer and control (IS3C), 10–12 June 2014. IEEE 30 June 2014
12.
Zurück zum Zitat Zhang Z, Ren Y, Ping XJ, He ZY, Zhang SZ (2008) A survey on passive-blind image forgery by doctor method detection. In: Proceedings of seventh international conference on machine learning and cybernetics, pp 3463–3467 Zhang Z, Ren Y, Ping XJ, He ZY, Zhang SZ (2008) A survey on passive-blind image forgery by doctor method detection. In: Proceedings of seventh international conference on machine learning and cybernetics, pp 3463–3467
13.
Zurück zum Zitat Kou G, Ma Y (2015) Color image authentication method based on triple-channel spiking cortical model. In: 2015 10th international conference on broadband and wireless computing, communication and applications (BWCCA), 4–6 Nov 201. IEEE 03 Mar 2016 Kou G, Ma Y (2015) Color image authentication method based on triple-channel spiking cortical model. In: 2015 10th international conference on broadband and wireless computing, communication and applications (BWCCA), 4–6 Nov 201. IEEE 03 Mar 2016
14.
Zurück zum Zitat Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking San Francisco. Morgan Kaufmann, Burlington Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking San Francisco. Morgan Kaufmann, Burlington
Metadaten
Titel
A Robust Method for Image Copy-Move Passive Forgery Detection with Enhanced Speed
verfasst von
Asif Hassan
V. K. Sharma
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-00665-5_136

Neuer Inhalt