Skip to main content

2021 | OriginalPaper | Buchkapitel

25. An Improvement in Dense Field Copy-Move Image Forgery Detection

verfasst von : Harsimran Kaur, Sunil Agrawal, Anaahat Dhindsa

Erschienen in: Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The advancements in image editing software besides enhanced multi-media storage and transmission systems have increased the number of counterfeit images being shared. These can have serious consequences; therefore, it becomes important to detect tampering. Copy-move image forgery being a simple yet, quite elusive way, is one of the most frequently used forgery techniques. In this type of forgery, a small region of the source image is copied and pasted somewhere else within that image. Many algorithms have been proposed to detect copy-move attack but those are computationally complex making them unfit for real-time systems. Also, accuracy in detection systems still needs to be improved to rely on these. In this paper, an effort has been made to enhance the accuracy of already existing five dense field detection techniques by experimental analysis of the minimum size of duplication and linear fitting error used in the post-processing stage. After the former analysis, a combination of morphological operations dilation and closing, and sharpening technique unsharp masking, has been proposed in the pre-processing stage for the improvement of results. The results have been tested and compared for accuracy, precision, recall, and F1 score by using the CoMoFoD dataset for each technique.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Garg T, Saini H (2017) A review on various techniques of image forgery detection. Int J Eng Technol Sci Res 4(4):490–493 Garg T, Saini H (2017) A review on various techniques of image forgery detection. Int J Eng Technol Sci Res 4(4):490–493
2.
Zurück zum Zitat Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: 18th international conference on pattern recognition (ICPR’06), vol 4. IEEE, Hong Kong, China, pp 746–749 Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: 18th international conference on pattern recognition (ICPR’06), vol 4. IEEE, Hong Kong, China, pp 746–749
3.
Zurück zum Zitat Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Tech. Rep. TR2004–515, Dartmouth College, United States, pp 1–11 Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Tech. Rep. TR2004–515, Dartmouth College, United States, pp 1–11
4.
Zurück zum Zitat Farid H (2009) A survey of image forgery detection. IEEE Signal Process Mag 26(2):16–25CrossRef Farid H (2009) A survey of image forgery detection. IEEE Signal Process Mag 26(2):16–25CrossRef
5.
Zurück zum Zitat Elwin JGR, Aditya TS, Shankar SM (2010) Survey on passive methods of image tampering detection. In: 2010 international conference on communication and computational intelligence (INCOCCI). IEEE, Erode, India, pp 431–436 Elwin JGR, Aditya TS, Shankar SM (2010) Survey on passive methods of image tampering detection. In: 2010 international conference on communication and computational intelligence (INCOCCI). IEEE, Erode, India, pp 431–436
6.
Zurück zum Zitat Teerakanok S, Uehara T (2019) Copy-move forgery detection: a state-of-the-art technical review and analysis. IEEE Access 7:40550–40568CrossRef Teerakanok S, Uehara T (2019) Copy-move forgery detection: a state-of-the-art technical review and analysis. IEEE Access 7:40550–40568CrossRef
7.
Zurück zum Zitat Lin X, Li JH, Wang SL, Cheng F, Huang XS (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39CrossRef Lin X, Li JH, Wang SL, Cheng F, Huang XS (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39CrossRef
8.
Zurück zum Zitat Zhang L, Zhou PP (2010) Localized affine transform resistant watermarking in region-of-interest. Telecommun Syst 44(3–4):205–220CrossRef Zhang L, Zhou PP (2010) Localized affine transform resistant watermarking in region-of-interest. Telecommun Syst 44(3–4):205–220CrossRef
9.
Zurück zum Zitat Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90(3):727–752CrossRef Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90(3):727–752CrossRef
10.
Zurück zum Zitat Yang B, Sun X, Guo H, Xia Z, Chen X (2018) A copy-move forgery detection method based on CMFD-SIFT. Multimedia Tools Appl 77(1):837–855CrossRef Yang B, Sun X, Guo H, Xia Z, Chen X (2018) A copy-move forgery detection method based on CMFD-SIFT. Multimedia Tools Appl 77(1):837–855CrossRef
11.
Zurück zum Zitat Fadl SM, Semary NA (2017) Robust copy–move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57–65CrossRef Fadl SM, Semary NA (2017) Robust copy–move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57–65CrossRef
12.
Zurück zum Zitat Lee JC (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334CrossRef Lee JC (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334CrossRef
13.
Zurück zum Zitat Nithiya R, Veluchamy S (2016) Key point descriptor based copy and move image forgery detection system. In: 2016 second international conference on science technology engineering and management (ICONSTEM). IEEE, Chennai, India, pp 577–581 Nithiya R, Veluchamy S (2016) Key point descriptor based copy and move image forgery detection system. In: 2016 second international conference on science technology engineering and management (ICONSTEM). IEEE, Chennai, India, pp 577–581
14.
Zurück zum Zitat Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern. SIViP 11(1):81–88CrossRef Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern. SIViP 11(1):81–88CrossRef
15.
Zurück zum Zitat Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. AEU Int J Electron Commun 70(8):1076–1087CrossRef Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. AEU Int J Electron Commun 70(8):1076–1087CrossRef
16.
Zurück zum Zitat Hilal A, Hamzeh T, Chantaf S (2017) Copy-move forgery detection using principal component analysis and discrete cosine transform. In: 2017 sensors networks smart and emerging technologies (SENSET). IEEE, Beirut, Lebanon, pp 1–4 Hilal A, Hamzeh T, Chantaf S (2017) Copy-move forgery detection using principal component analysis and discrete cosine transform. In: 2017 sensors networks smart and emerging technologies (SENSET). IEEE, Beirut, Lebanon, pp 1–4
17.
Zurück zum Zitat Cao G, Chen Y, Zong G (2015) Detection of copy-move forgery in digital image using locality preserving projections. In: 2015 8th international congress on image and signal processing (CISP). IEEE, Shenyang, China, pp 599–603 Cao G, Chen Y, Zong G (2015) Detection of copy-move forgery in digital image using locality preserving projections. In: 2015 8th international congress on image and signal processing (CISP). IEEE, Shenyang, China, pp 599–603
18.
19.
Zurück zum Zitat Shahroudnejad A, Rahmati M (2016) Copy-move forgery detection in digital images using affine-SIFT. In: 2016 2nd international conference of signal processing and intelligent systems (ICSPIS). IEEE, Tehran, Iran, pp 1–5 Shahroudnejad A, Rahmati M (2016) Copy-move forgery detection in digital images using affine-SIFT. In: 2016 2nd international conference of signal processing and intelligent systems (ICSPIS). IEEE, Tehran, Iran, pp 1–5
20.
Zurück zum Zitat Huang HY, Ciou AJ (2019) Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation. EURASIP J Image Video Process 2019(1):68CrossRef Huang HY, Ciou AJ (2019) Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation. EURASIP J Image Video Process 2019(1):68CrossRef
21.
Zurück zum Zitat Sánchez J, Monzón N, Salgado De La Nuez A (2018) An analysis and implementation of the harris corner detector. Image Process On Line 8:305–328 Sánchez J, Monzón N, Salgado De La Nuez A (2018) An analysis and implementation of the harris corner detector. Image Process On Line 8:305–328
22.
Zurück zum Zitat Das T, Hasan R, Azam MR, Uddin J (2018) A robust method for detecting copy-move image forgery using stationary wavelet transform and scale invariant feature transform. In: 2018 international conference on computer, communication, chemical, material and electronic engineering (IC4ME2). IEEE, Rajshahi, Bangladesh, pp 1–4 Das T, Hasan R, Azam MR, Uddin J (2018) A robust method for detecting copy-move image forgery using stationary wavelet transform and scale invariant feature transform. In: 2018 international conference on computer, communication, chemical, material and electronic engineering (IC4ME2). IEEE, Rajshahi, Bangladesh, pp 1–4
23.
Zurück zum Zitat Emam M, Han Q, Li Q, Zhang H (2017) A robust detection algorithm for image copy-move forgery in smooth regions. In: 2017 international conference on circuits, system and simulation (ICCSS). IEEE, London, UK, pp 119–123 Emam M, Han Q, Li Q, Zhang H (2017) A robust detection algorithm for image copy-move forgery in smooth regions. In: 2017 international conference on circuits, system and simulation (ICCSS). IEEE, London, UK, pp 119–123
24.
Zurück zum Zitat Wang C, Zhang Z, Zhou X (2018) An image copy-move forgery detection scheme based on A-KAZE and SURF features. Symmetry 10(12):706CrossRef Wang C, Zhang Z, Zhou X (2018) An image copy-move forgery detection scheme based on A-KAZE and SURF features. Symmetry 10(12):706CrossRef
25.
Zurück zum Zitat Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop (DFRWS’03). IEEE, Ohio, United States Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop (DFRWS’03). IEEE, Ohio, United States
26.
Zurück zum Zitat Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767MathSciNetCrossRef Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767MathSciNetCrossRef
27.
Zurück zum Zitat Karsh RK, Laskar RH (2017) Robust image hashing through DWT-SVD and spectral residual method. EURASIP J Image Video Process 2017(1):31CrossRef Karsh RK, Laskar RH (2017) Robust image hashing through DWT-SVD and spectral residual method. EURASIP J Image Video Process 2017(1):31CrossRef
28.
Zurück zum Zitat Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202–214CrossRef Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202–214CrossRef
29.
Zurück zum Zitat Lowe DG (1999) Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision, vol 2. IEEE, Kerkyra, Greece, pp 1150–1157 Lowe DG (1999) Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision, vol 2. IEEE, Kerkyra, Greece, pp 1150–1157
30.
Zurück zum Zitat Alberry HA, Hegazy AA, Salama GI (2018) A fast SIFT based method for copy move forgery detection. Future Comput Inf J 3(2):159–165CrossRef Alberry HA, Hegazy AA, Salama GI (2018) A fast SIFT based method for copy move forgery detection. Future Comput Inf J 3(2):159–165CrossRef
31.
Zurück zum Zitat Yadav N, Kapdi R (2015) Copy move forgery detection using SIFT and GMM. In: 2015 5th Nirma University International Conference on Engineering (NUiCONE). IEEE, Ahmedabad, India, pp 1–4 Yadav N, Kapdi R (2015) Copy move forgery detection using SIFT and GMM. In: 2015 5th Nirma University International Conference on Engineering (NUiCONE). IEEE, Ahmedabad, India, pp 1–4
32.
Zurück zum Zitat Muzaffer G, Ulutas G (2017) A fast and effective digital image copy move forgery detection with binarized SIFT. In: 2017 40th international conference on telecommunications and signal processing (TSP). IEEE, Barcelona, Spain, pp 595–598 Muzaffer G, Ulutas G (2017) A fast and effective digital image copy move forgery detection with binarized SIFT. In: 2017 40th international conference on telecommunications and signal processing (TSP). IEEE, Barcelona, Spain, pp 595–598
33.
Zurück zum Zitat Jin G, Wan X (2017) An improved method for SIFT-based copy–move forgery detection using non-maximum value suppression and optimized J-Linkage. Sig Process Image Commun 57:113–125CrossRef Jin G, Wan X (2017) An improved method for SIFT-based copy–move forgery detection using non-maximum value suppression and optimized J-Linkage. Sig Process Image Commun 57:113–125CrossRef
34.
Zurück zum Zitat Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur 14(5):1307–1322CrossRef Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur 14(5):1307–1322CrossRef
35.
Zurück zum Zitat Li K, Li H, Yang B, Meng Q, Luo S (2014) Detection of image forgery based on improved PCA-SIFT. In: Wong WE, Zhu T (eds) Computer engineering and networking, vol 277. lecture notes in electrical engineering. Springer, Cham, pp 679–686CrossRef Li K, Li H, Yang B, Meng Q, Luo S (2014) Detection of image forgery based on improved PCA-SIFT. In: Wong WE, Zhu T (eds) Computer engineering and networking, vol 277. lecture notes in electrical engineering. Springer, Cham, pp 679–686CrossRef
36.
Zurück zum Zitat Su B, Kaizhen Z (2012) Detection of copy forgery in digital images based on LPP-SIFT. In: 2012 international conference on industrial control and electronics engineering. IEEE, Xi’an, China, pp 1773–1776 Su B, Kaizhen Z (2012) Detection of copy forgery in digital images based on LPP-SIFT. In: 2012 international conference on industrial control and electronics engineering. IEEE, Xi’an, China, pp 1773–1776
37.
Zurück zum Zitat Hashmi MF, Hambarde AR, Keskar AG (2013) Copy move forgery detection using DWT and SIFT features. In: 2013 13th international conference on intelligent systems design and applications. IEEE, Bangi, Malaysia, pp 188–193 Hashmi MF, Hambarde AR, Keskar AG (2013) Copy move forgery detection using DWT and SIFT features. In: 2013 13th international conference on intelligent systems design and applications. IEEE, Bangi, Malaysia, pp 188–193
38.
Zurück zum Zitat Anand V, Hashmi MF, Keskar AG (2014) A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods. In: Nguyen NT, Attachoo B, Trawiński B, Somboonviwat K (eds) Intelligent information and database systems—2014 Asian conference on intelligent information and database systems, vol 8397. Lecture notes in computer science. Springer, Cham, pp 530–542 Anand V, Hashmi MF, Keskar AG (2014) A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods. In: Nguyen NT, Attachoo B, Trawiński B, Somboonviwat K (eds) Intelligent information and database systems—2014 Asian conference on intelligent information and database systems, vol 8397. Lecture notes in computer science. Springer, Cham, pp 530–542
39.
Zurück zum Zitat Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef
40.
Zurück zum Zitat Abdalla YE, Iqbal MT, Shehata M (2017) Copy-move forgery detection based on enhanced patch-match. Int J Comput Sci Issues (IJCSI) 14(6):1–7CrossRef Abdalla YE, Iqbal MT, Shehata M (2017) Copy-move forgery detection based on enhanced patch-match. Int J Comput Sci Issues (IJCSI) 14(6):1–7CrossRef
41.
Zurück zum Zitat Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef
42.
Zurück zum Zitat Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1–3):59–67CrossRef Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1–3):59–67CrossRef
43.
Zurück zum Zitat Wu Q, Wang S, Zhang X (2011) Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Process Lett 18(10):559–562CrossRef Wu Q, Wang S, Zhang X (2011) Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Process Lett 18(10):559–562CrossRef
44.
Zurück zum Zitat Barnes C, Shechtman E, Goldman DB, Finkelstein A (2010) The generalized patchmatch correspondence algorithm. In: Daniilidis K, Maragos P, Paragios N (eds) Computer vision–2010 European conference on computer vision, vol 6313. Lecture notes in computer science. Springer, Berlin, Heidelberg, pp 29–43 Barnes C, Shechtman E, Goldman DB, Finkelstein A (2010) The generalized patchmatch correspondence algorithm. In: Daniilidis K, Maragos P, Paragios N (eds) Computer vision–2010 European conference on computer vision, vol 6313. Lecture notes in computer science. Springer, Berlin, Heidelberg, pp 29–43
45.
Zurück zum Zitat Warif NBA, Wahab AWA, Idris MYI, Salleh R, Othman F (2017) SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46:219–232CrossRef Warif NBA, Wahab AWA, Idris MYI, Salleh R, Othman F (2017) SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46:219–232CrossRef
46.
Zurück zum Zitat Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83CrossRef Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83CrossRef
47.
Zurück zum Zitat Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, Zadar, Croatia, pp 49–54 Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, Zadar, Croatia, pp 49–54
Metadaten
Titel
An Improvement in Dense Field Copy-Move Image Forgery Detection
verfasst von
Harsimran Kaur
Sunil Agrawal
Anaahat Dhindsa
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-7533-4_25

Neuer Inhalt