Skip to main content
Top

2021 | OriginalPaper | Chapter

Copy-Move Forgery Detection Methods: A Critique

Authors : Monika Kharanghar, Amit Doegar

Published in: Advances in Information Communication Technology and Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the advancement of image editing tools, legitimacy and creditability of the images are put in jeopardy. There are various types of image forgeries techniques like splicing, retouching, false captioning, and copy-move. But the most predominant forgery techniques are splicing and copy-move forgery. In copy-move forgery, a part of the image is copied in the same image and in splicing another image in order to conceal or to duplicate the information residing in the image. In this critique, the copy-move forgery detection (CMFD) methods from 2013 onwards are reviewed under four categories—block-based, keypoint-based, hybrid-, and deep learning-based methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chauhan D, Kasat D, Jain S, Thakare, V (2016) Survey on keypoint based copy-move forgery detection methods on image. Procedia—Procedia Comput Sci 85:206–212 Chauhan D, Kasat D, Jain S, Thakare, V (2016) Survey on keypoint based copy-move forgery detection methods on image. Procedia—Procedia Comput Sci 85:206–212
2.
go back to reference Warbhe AD, Dharaskar RV, Thakare VM (2016) A survey on keypoint based copy-paste forgery detection techniques. in Phys Procedia 78(December 2015):61–67 Warbhe AD, Dharaskar RV, Thakare VM (2016) A survey on keypoint based copy-paste forgery detection techniques. in Phys Procedia 78(December 2015):61–67
3.
go back to reference Warif NBA et al (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259–278CrossRef Warif NBA et al (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259–278CrossRef
4.
go back to reference Soni B, Das PK, Thounaojam DM (2017) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Proc 12(2):167–178CrossRef Soni B, Das PK, Thounaojam DM (2017) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Proc 12(2):167–178CrossRef
5.
go back to reference Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1–3):59–67CrossRef Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1–3):59–67CrossRef
6.
go back to reference Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72CrossRef Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72CrossRef
7.
go back to reference Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995CrossRef Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995CrossRef
8.
go back to reference Uliyan DM, Jalab HA, Wahab AWA Copy move image forgery detection using Hessian and center symmetric local binary pattern. In: 2015 IEEE conference on open systems (ICOS), 2015, pp 7–11 Uliyan DM, Jalab HA, Wahab AWA Copy move image forgery detection using Hessian and center symmetric local binary pattern. In: 2015 IEEE conference on open systems (ICOS), 2015, pp 7–11
9.
go back to reference Tralic D, Grgic S, Sun X, Rosin PL (2016) Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed Tools Appl 75(24):16881–16903MATHCrossRef Tralic D, Grgic S, Sun X, Rosin PL (2016) Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed Tools Appl 75(24):16881–16903MATHCrossRef
10.
go back to reference Lee JC, Chang CP, Chen WK (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci 321:250–262CrossRef Lee JC, Chang CP, Chen WK (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci 321:250–262CrossRef
11.
go back to reference Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) Improved copy-move forgery detection based on the CLDs and colour moments. The Imaging Sci J 64(4):215–225CrossRef Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) Improved copy-move forgery detection based on the CLDs and colour moments. The Imaging Sci J 64(4):215–225CrossRef
12.
go back to reference Lee JC (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31(July):320–334CrossRef Lee JC (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31(July):320–334CrossRef
13.
go back to reference Malviya AV, Ladhake SA (2016) Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Comput Sci 79:383–390CrossRef Malviya AV, Ladhake SA (2016) Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Comput Sci 79:383–390CrossRef
14.
go back to reference Yang B, Sun X, Chen X, Zhang J, Li X (2013) An efficient forensic method for copy-move forgery detection based on DWT-FWHT. Radioengineering 22(4):1098–1105 Yang B, Sun X, Chen X, Zhang J, Li X (2013) An efficient forensic method for copy-move forgery detection based on DWT-FWHT. Radioengineering 22(4):1098–1105
15.
go back to reference Ranjani MB(2016) Image duplication copy move forgery detection using discrete cosine transforms method matrix sorting—row wise matrix sorting—colum wise 11(4):2671–2674 Ranjani MB(2016) Image duplication copy move forgery detection using discrete cosine transforms method matrix sorting—row wise matrix sorting—colum wise 11(4):2671–2674
16.
go back to reference Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. AEU—Int J Electroni Commun 70(8):1076–1087CrossRef Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. AEU—Int J Electroni Commun 70(8):1076–1087CrossRef
17.
go back to reference Shah TJ, Banday, MT Copy-move forgery detection using hybrid transform and K-means clustering technique. In: 2017 3rd international conference on applied and theoretical computing and communication technology (iCATccT), 2017, pp. 79–83 Shah TJ, Banday, MT Copy-move forgery detection using hybrid transform and K-means clustering technique. In: 2017 3rd international conference on applied and theoretical computing and communication technology (iCATccT), 2017, pp. 79–83
18.
go back to reference Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy–move image forgery detection using DCT. Iran J Comput Sci 0123456789 Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy–move image forgery detection using DCT. Iran J Comput Sci 0123456789
19.
go back to reference Mahmood T, Mehmood Z, Shah M, Khan Z (2018) An efficient forensic technique for exposing region duplication forgery in digital images. Appl Intell 48(7):1791–1801CrossRef Mahmood T, Mehmood Z, Shah M, Khan Z (2018) An efficient forensic technique for exposing region duplication forgery in digital images. Appl Intell 48(7):1791–1801CrossRef
20.
go back to reference Jaiswal AK, Srivastava R (2019) Copy-move forgery detection using shift-invariant SWT and block division mean features. In: Khare A, Tiwary US, Sethi IK, Singh N (eds) vol 524. Springer Singapore, Singapore, pp 289–299 Jaiswal AK, Srivastava R (2019) Copy-move forgery detection using shift-invariant SWT and block division mean features. In: Khare A, Tiwary US, Sethi IK, Singh N (eds) vol 524. Springer Singapore, Singapore, pp 289–299
21.
go back to reference Chen B, Yu M, Su Q, Li L (2019) Fractional quaternion cosine transform and its application in color image copy-move forgery detection. Multimed Tools Appl 78(7):8057–8073CrossRef Chen B, Yu M, Su Q, Li L (2019) Fractional quaternion cosine transform and its application in color image copy-move forgery detection. Multimed Tools Appl 78(7):8057–8073CrossRef
22.
go back to reference Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202–214CrossRef Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202–214CrossRef
23.
go back to reference Soni B, Das PK, Thounaojam DM (2017) Blur Invariant block based copy-move forgery detection technique using FWHT features. Proc Int Conf Watermarking Image Process—ICWIP 2017:22–26 Soni B, Das PK, Thounaojam DM (2017) Blur Invariant block based copy-move forgery detection technique using FWHT features. Proc Int Conf Watermarking Image Process—ICWIP 2017:22–26
24.
go back to reference Imamoglu MB, Ulutas G, Ulutas M Detection of copy-move forgery using Krawtchouk moment. In: 2013 8th international conference on electrical and electronics engineering (ELECO), 2013, pp 311–314 Imamoglu MB, Ulutas G, Ulutas M Detection of copy-move forgery using Krawtchouk moment. In: 2013 8th international conference on electrical and electronics engineering (ELECO), 2013, pp 311–314
25.
go back to reference Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370 Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370
26.
go back to reference Wang X, Liu Y, Xu H, Wang P, Yang H (2018) Robust copy–move forgery detection using quaternion exponent moments. Pattern Anal Appl 21(2):451–467 Wang X, Liu Y, Xu H, Wang P, Yang H (2018) Robust copy–move forgery detection using quaternion exponent moments. Pattern Anal Appl 21(2):451–467
27.
go back to reference Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy-move forgery detection by means of Zernike moments 485–497 Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy-move forgery detection by means of Zernike moments 485–497
28.
go back to reference Chen B, Yu M, Su Q, Shim HJ, Shi Y-Q (2018) Fractional Quaternion Zernike moments for robust color image copy-move forgery detection. IEEE Access 6:56637–56646CrossRef Chen B, Yu M, Su Q, Shim HJ, Shi Y-Q (2018) Fractional Quaternion Zernike moments for robust color image copy-move forgery detection. IEEE Access 6:56637–56646CrossRef
29.
go back to reference Zhong J, Gan Y (2016) Detection of copy–move forgery using discrete analytical Fourier-Mellin transform. Nonlinear Dyn 84(1):189–202MathSciNetMATHCrossRef Zhong J, Gan Y (2016) Detection of copy–move forgery using discrete analytical Fourier-Mellin transform. Nonlinear Dyn 84(1):189–202MathSciNetMATHCrossRef
30.
go back to reference Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962CrossRef Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962CrossRef
31.
go back to reference Wo Y, Yang K, Han G, Chen H, Wu W (2016) Copy–move forgery detection based on multi-radius PCET. IET Image Proc 11(2):99–108CrossRef Wo Y, Yang K, Han G, Chen H, Wu W (2016) Copy–move forgery detection based on multi-radius PCET. IET Image Proc 11(2):99–108CrossRef
32.
go back to reference Park C-S, Kim C, Lee J, Kwon G-R (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimed Tools Appl 75(23):16577–16595CrossRef Park C-S, Kim C, Lee J, Kwon G-R (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimed Tools Appl 75(23):16577–16595CrossRef
33.
go back to reference Yuan Y, Zhang Y, Chen S, Wang H (2017) Robust region duplication detection on log-polar domain using band limitation. Arab J Sci Eng 42(2):559–565CrossRef Yuan Y, Zhang Y, Chen S, Wang H (2017) Robust region duplication detection on log-polar domain using band limitation. Arab J Sci Eng 42(2):559–565CrossRef
34.
go back to reference Fadl SM, Semary NA (2017) Robust copy-move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57–65CrossRef Fadl SM, Semary NA (2017) Robust copy-move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57–65CrossRef
35.
go back to reference Granty REJ, Kousalya G (2016) Spectral-hashing-based image retrieval and copy-move forgery detection. Aust J Forensic Sci 48(6):643–658CrossRef Granty REJ, Kousalya G (2016) Spectral-hashing-based image retrieval and copy-move forgery detection. Aust J Forensic Sci 48(6):643–658CrossRef
36.
go back to reference Kashyap A, Agarwal M, Gupta H (2018) Detection of copy-move image forgery using SVD and cuckoo search algorithm. Int J Eng Technol 7(2.13):79 Kashyap A, Agarwal M, Gupta H (2018) Detection of copy-move image forgery using SVD and cuckoo search algorithm. Int J Eng Technol 7(2.13):79
37.
go back to reference Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD. IET Image Proc 11(5):301–309CrossRef Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD. IET Image Proc 11(5):301–309CrossRef
38.
go back to reference Mahmood T, Irtaza A, Mehmood Z, Tariq Mahmood M (2017) Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int 279:8–21 Mahmood T, Irtaza A, Mehmood Z, Tariq Mahmood M (2017) Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int 279:8–21
39.
go back to reference Kuznetsov A, Myasnikov V (2017) A new copy-move forgery detection algorithm using image preprocessing procedure. Procedia Eng 201:436–444CrossRef Kuznetsov A, Myasnikov V (2017) A new copy-move forgery detection algorithm using image preprocessing procedure. Procedia Eng 201:436–444CrossRef
40.
go back to reference Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRef Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRef
41.
go back to reference Khayeat ARH, Sun X, Rosin PL Improved DSIFT descriptor based copy-rotate-move forgery detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, vol 9431, pp 642–655 Khayeat ARH, Sun X, Rosin PL Improved DSIFT descriptor based copy-rotate-move forgery detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, vol 9431, pp 642–655
42.
go back to reference Wenchang S, Fei Z, Bo Q, Bin L (2016) Improving image copy-move forgery detection with particle swarm optimization techniques. China Commun 13(1):139–149CrossRef Wenchang S, Fei Z, Bo Q, Bin L (2016) Improving image copy-move forgery detection with particle swarm optimization techniques. China Commun 13(1):139–149CrossRef
43.
go back to reference Jin G, Wan X (2017) An improved method for SIFT-based copy–move forgery detection using non-maximum value suppression and optimized J-linkage. Sig Process Image Commun 57:113–125CrossRef Jin G, Wan X (2017) An improved method for SIFT-based copy–move forgery detection using non-maximum value suppression and optimized J-linkage. Sig Process Image Commun 57:113–125CrossRef
44.
go back to reference Kumar S et al (2015) A fast keypoint based hybrid method for copy move forgery detection. Int J Comput Dig Syst 4(2):91–99CrossRef Kumar S et al (2015) A fast keypoint based hybrid method for copy move forgery detection. Int J Comput Dig Syst 4(2):91–99CrossRef
45.
go back to reference Mishra P, Mishra N, Sharma S, Patel R (2013) Region duplication forgery detection technique based on SURF and HAC. Sci World J 2013:1–8 Mishra P, Mishra N, Sharma S, Patel R (2013) Region duplication forgery detection technique based on SURF and HAC. Sci World J 2013:1–8
46.
go back to reference Pandey RC, Agrawal R, Singh SK, Shukla KK (2015) Passive copy move forgery detection using SURF, HOG and SIFT features. In: Satapathy SC, Biswal BN, Udgata SK, Mandal JK (eds) Advances in intelligent systems and computing, vol 327. Springer International Publishing, Cham, pp 659–666 Pandey RC, Agrawal R, Singh SK, Shukla KK (2015) Passive copy move forgery detection using SURF, HOG and SIFT features. In: Satapathy SC, Biswal BN, Udgata SK, Mandal JK (eds) Advances in intelligent systems and computing, vol 327. Springer International Publishing, Cham, pp 659–666
47.
go back to reference Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef
48.
go back to reference Vaishnavi D, Subashini TS (2015) A passive technique for image forgery detection using contrast context histogram features. Int J Electron Secur Digit Forensics 7(3):278CrossRef Vaishnavi D, Subashini TS (2015) A passive technique for image forgery detection using contrast context histogram features. Int J Electron Secur Digit Forensics 7(3):278CrossRef
49.
go back to reference Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83 Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83
50.
go back to reference Li Y, Zhou J (2019) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur 14(5):1307–1322CrossRef Li Y, Zhou J (2019) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur 14(5):1307–1322CrossRef
51.
go back to reference Soni B, Das PK, Thounaojam DM (2018) Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm. IET Image Proc 12(11):2092–2099CrossRef Soni B, Das PK, Thounaojam DM (2018) Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm. IET Image Proc 12(11):2092–2099CrossRef
52.
go back to reference Raj R, Joseph N (2016) Keypoint extraction using SURF algorithm for CMFD. Procedia Comput Sci 93(September):375–381CrossRef Raj R, Joseph N (2016) Keypoint extraction using SURF algorithm for CMFD. Procedia Comput Sci 93(September):375–381CrossRef
53.
go back to reference Isaac MM, Wilscy M (2016) A key point based copy-move forgery detection using HOG features. In: 2016 international conference on circuit, power and computing technologies (ICCPCT), 2016, pp 1–6 Isaac MM, Wilscy M (2016) A key point based copy-move forgery detection using HOG features. In: 2016 international conference on circuit, power and computing technologies (ICCPCT), 2016, pp 1–6
54.
go back to reference Muzaffer G, Ulutas G, Gedikli E PSO and SURF based digital image forgery detection. In: 2017 international conference on computer science and engineering (UBMK), 2017, pp 688–692 Muzaffer G, Ulutas G, Gedikli E PSO and SURF based digital image forgery detection. In: 2017 international conference on computer science and engineering (UBMK), 2017, pp 688–692
55.
go back to reference Pandey RC, Singh SK, Shukla KK, Agrawal R (2015) Fast and robust passive copy-move forgery detection using SURF and SIFT image features. In: 9th international conference on industrial and information systems, ICIIS 2014 Pandey RC, Singh SK, Shukla KK, Agrawal R (2015) Fast and robust passive copy-move forgery detection using SURF and SIFT image features. In: 9th international conference on industrial and information systems, ICIIS 2014
56.
go back to reference Niyishaka P, Bhagvati C (2018) Digital image forensics technique for copy-move forgery detection using DoG and ORB. In: Bolc L, Tadeusiewicz R, Chmielewski LJ, Wojciechowski K (eds), vol. 7594. Springer, Berlin Heidelberg, pp 472–483 Niyishaka P, Bhagvati C (2018) Digital image forensics technique for copy-move forgery detection using DoG and ORB. In: Bolc L, Tadeusiewicz R, Chmielewski LJ, Wojciechowski K (eds), vol. 7594. Springer, Berlin Heidelberg, pp 472–483
57.
go back to reference Yeap YY, Sheikh UU, Rahman AA-HA (2018) Image forensic for digital image copy move forgery detection. In: 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA), pp 239–244 Yeap YY, Sheikh UU, Rahman AA-HA (2018) Image forensic for digital image copy move forgery detection. In: 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA), pp 239–244
58.
go back to reference Manu VT, Mehtre BM Detection of copy-move forgery in images using segmentation and SURF. Adv Intell Syst Comput 425:645–654 Manu VT, Mehtre BM Detection of copy-move forgery in images using segmentation and SURF. Adv Intell Syst Comput 425:645–654
59.
go back to reference Pun C-M, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716CrossRef Pun C-M, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716CrossRef
60.
go back to reference Zheng J, Liu Y, Ren J, Zhu T, Yan Y, Yang H (2016) Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimens Syst Signal Process 27(4):989–1005MathSciNetMATHCrossRef Zheng J, Liu Y, Ren J, Zhu T, Yan Y, Yang H (2016) Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimens Syst Signal Process 27(4):989–1005MathSciNetMATHCrossRef
61.
go back to reference Soni B, Das PK, Meitei Thounaojam D (2018) Improved block-based technique using SURF and FAST keypoints matching for copy-move attack detection. In: 2018 5th international conference on signal processing and integrated networks, SPIN 2018, pp 197–202 Soni B, Das PK, Meitei Thounaojam D (2018) Improved block-based technique using SURF and FAST keypoints matching for copy-move attack detection. In: 2018 5th international conference on signal processing and integrated networks, SPIN 2018, pp 197–202
62.
go back to reference Das T, Hasan R, Azam MR, Uddin J A robust method for detecting copy-move image forgery using stationary wavelet transform and scale invariant feature transform. In: 2018 international conference on computer, communication, chemical, material and electronic engineering (IC4ME2), 2018, pp 1–4 Das T, Hasan R, Azam MR, Uddin J A robust method for detecting copy-move image forgery using stationary wavelet transform and scale invariant feature transform. In: 2018 international conference on computer, communication, chemical, material and electronic engineering (IC4ME2), 2018, pp 1–4
63.
go back to reference Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur 11(11):2499–2512CrossRef Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur 11(11):2499–2512CrossRef
64.
go back to reference Hashmi MF, Anand V, Keskar AG (2014) Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia 9:84–91 Hashmi MF, Anand V, Keskar AG (2014) Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia 9:84–91
65.
go back to reference Rao Y, Ni J (2017) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 8th IEEE international workshop on information forensics and security, WIFS 2016 Rao Y, Ni J (2017) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 8th IEEE international workshop on information forensics and security, WIFS 2016
66.
go back to reference Zhang J, Zhu W, Li B, Hu W, Yang J (2016) Image copy detection based on convolutional neural networks. In: CCIS, vol 2, pp 111–121 Zhang J, Zhu W, Li B, Hu W, Yang J (2016) Image copy detection based on convolutional neural networks. In: CCIS, vol 2, pp 111–121
67.
go back to reference Zhang Y, Goh J, Win LL, Thing V (2016) Image region forgery detection: a deep learning approach. Cryptol Inf Secur Ser 14:1–11 Zhang Y, Goh J, Win LL, Thing V (2016) Image region forgery detection: a deep learning approach. Cryptol Inf Secur Ser 14:1–11
68.
go back to reference J. Zhou, J. Ni, and Y. Rao (2017) Block-based convolutional neural network for image forgery detection vol 10431, Kraetzer C, Shi Y-Q, Dittmann J, Kim HJ (eds) Springer International Publishing, Cham, pp 65–76 J. Zhou, J. Ni, and Y. Rao (2017) Block-based convolutional neural network for image forgery detection vol 10431, Kraetzer C, Shi Y-Q, Dittmann J, Kim HJ (eds) Springer International Publishing, Cham, pp 65–76
69.
go back to reference Zhou H, Shen Y, Zhu X, Liu B, Fu Z, Fan N (2016) Digital image modification detection using color information and its histograms. Forensic Sci Int 266:379–388CrossRef Zhou H, Shen Y, Zhu X, Liu B, Fu Z, Fan N (2016) Digital image modification detection using color information and its histograms. Forensic Sci Int 266:379–388CrossRef
70.
go back to reference Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77(14):18269–18293CrossRef Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77(14):18269–18293CrossRef
71.
go back to reference Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: detecting copy-move image forgery with source/target localization, pp 170–186 Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: detecting copy-move image forgery with source/target localization, pp 170–186
72.
go back to reference Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef
73.
go back to reference Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—new database for copy-move forgery detection. In: Proceedings of 55th international symposium ELMAR-2013 (September):25–27 Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—new database for copy-move forgery detection. In: Proceedings of 55th international symposium ELMAR-2013 (September):25–27
74.
go back to reference Wen B, Zhu Y, Subramanian R, Ng T-T, Shen X, Winkler S (2016) COVERAGE—a novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP), pp 161–165 Wen B, Zhu Y, Subramanian R, Ng T-T, Shen X, Winkler S (2016) COVERAGE—a novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP), pp 161–165
75.
go back to reference Dong J, Wang W, Tan T (2013) CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp 422–426 Dong J, Wang W, Tan T (2013) CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp 422–426
76.
go back to reference Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef
77.
go back to reference Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef
78.
go back to reference Zandi M, Mahmoudi-Aznaveh A, Mansouri A (2014) Adaptive matching for copy-move Forgery detection. In: 2014 IEEE international workshop on information forensics and security (WIFS), 2014, pp 119–124 Zandi M, Mahmoudi-Aznaveh A, Mansouri A (2014) Adaptive matching for copy-move Forgery detection. In: 2014 IEEE international workshop on information forensics and security (WIFS), 2014, pp 119–124
79.
go back to reference Ouyang J, Liu Y, Liao M (2017) Copy-move forgery detection based on deep learning. In: 2017 10th international congress on image and signal processing, biomedical engineering and informatics (CISP-BMEI), pp 1–5 Ouyang J, Liu Y, Liao M (2017) Copy-move forgery detection based on deep learning. In: 2017 10th international congress on image and signal processing, biomedical engineering and informatics (CISP-BMEI), pp 1–5
80.
go back to reference Bayar B, Stamm MC (2018) Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans Inf Forensics Secur 13(11):2691–2706CrossRef Bayar B, Stamm MC (2018) Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans Inf Forensics Secur 13(11):2691–2706CrossRef
Metadata
Title
Copy-Move Forgery Detection Methods: A Critique
Authors
Monika Kharanghar
Amit Doegar
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5421-6_49