Skip to main content
Top
Published in: Neural Computing and Applications 10/2021

20-10-2020 | S.I. : Higher Level Artificial Neural Network Based Intelligent Systems

Copy-move forgery detection technique based on discrete cosine transform blocks features

Authors: Esteban Alejandro Armas Vega, Edgar González Fernández, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Published in: Neural Computing and Applications | Issue 10/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increasing number of software applications that allow altering digital images and their ease of use, they weaken the credibility of an image. This problem, together with the ease of distributing information through the Internet (blogs, social networks, etc.), has led to a tendency for information to be accepted as true without its veracity being questioned. Image counterfeiting has become a major threat to the credibility of the information. To deal with this threat, forensic image analysis is aimed at detecting and locating image forgeries using multiple clues that allows it to determine the veracity or otherwise of an image. In this paper, we present a method for the authentication of images. The proposed method performs detection of copy-move alterations within an image, using the discrete cosine transform. The characteristics obtained from these coefficients allow us to obtain transfer vectors, which are grouped together. Through the use of a tolerance threshold, it is possible to determine whether there are regions copied and pasted within the analysed image. The results obtained from the experiments reported in this paper demonstrate the effectiveness of the proposed method. For the evaluation of the proposed methods, experiments were carried out with public databases of falsified images that are widely used in the literature.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Appl 30(1):183–192CrossRef Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Appl 30(1):183–192CrossRef
3.
go back to reference Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef
4.
go back to reference Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef
6.
go back to reference Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef
9.
go back to reference Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef
11.
go back to reference Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef
12.
go back to reference Ding F, Zhu G, Dong W, Shi YQ (2018) An efficient weak sharpening detection method for image forensics. J Vis Commun Image Represent 50:93–99CrossRef Ding F, Zhu G, Dong W, Shi YQ (2018) An efficient weak sharpening detection method for image forensics. J Vis Commun Image Represent 50:93–99CrossRef
15.
go back to reference Freeman L (2017) Digital evidence and war crimes prosecutions: the impact of digital technologies on international criminal investigations and trials. Fordham Int Law J 41(2):283 Freeman L (2017) Digital evidence and war crimes prosecutions: the impact of digital technologies on international criminal investigations and trials. Fordham Int Law J 41(2):283
16.
go back to reference Fridrich J, Soukal D, Lukas J (2003) Detection of copy move forgery in digital images. In: Proceedings of the digital forensic research workshop. Binghamton, New York, pp 5–8 Fridrich J, Soukal D, Lukas J (2003) Detection of copy move forgery in digital images. In: Proceedings of the digital forensic research workshop. Binghamton, New York, pp 5–8
17.
go back to reference Fu Q, Zhou X, Wang C, Jiang B (2016) Mathematical relation between APBT-based and DCT-based JPEG image compression schemes. J Commun 11:84–92 Fu Q, Zhou X, Wang C, Jiang B (2016) Mathematical relation between APBT-based and DCT-based JPEG image compression schemes. J Commun 11:84–92
23.
go back to reference Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25(6):389–399CrossRef Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25(6):389–399CrossRef
24.
go back to reference Malin DF (1977) Unsharp masking. Am Astron Soc Photo Bull 16:10–13 Malin DF (1977) Unsharp masking. Am Astron Soc Photo Bull 16:10–13
25.
go back to reference Niu Y, Li X, Zhao Y, Ni R (2019) An enhanced approach for detecting double JPEG compression with the same quantization matrix. Signal Process Image Commun 76:89–96CrossRef Niu Y, Li X, Zhao Y, Ni R (2019) An enhanced approach for detecting double JPEG compression with the same quantization matrix. Signal Process Image Commun 76:89–96CrossRef
26.
go back to reference Park CS, Choeh JY (2018) Fast and robust copy-move forgery detection based on scale-space representation. Multimed Tools Appl 77(13):16795–16811CrossRef Park CS, Choeh JY (2018) Fast and robust copy-move forgery detection based on scale-space representation. Multimed Tools Appl 77(13):16795–16811CrossRef
27.
go back to reference Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, vol 646 Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, vol 646
29.
go back to reference Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32CrossRef Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32CrossRef
30.
go back to reference da Silva EAB, Mendonça GV (2005) 4—digital image processing. In: Chen WK (ed) The electrical engineering handbook. Academic Press, Burlington, pp 891–910CrossRef da Silva EAB, Mendonça GV (2005) 4—digital image processing. In: Chen WK (ed) The electrical engineering handbook. Academic Press, Burlington, pp 891–910CrossRef
32.
go back to reference Tralic D, Zupancic I, Grgic S, Grgic M (2013) Comofod–new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, pp 49–54 Tralic D, Zupancic I, Grgic S, Grgic M (2013) Comofod–new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, pp 49–54
34.
go back to reference Xia Z, Yuan C, Sun X, Sun D, Lv R (2016) Combining wavelet transform and LBP related features for fingerprint liveness detection. IAENG Int J Comput Sci 43(3):290–298 Xia Z, Yuan C, Sun X, Sun D, Lv R (2016) Combining wavelet transform and LBP related features for fingerprint liveness detection. IAENG Int J Comput Sci 43(3):290–298
36.
go back to reference Zhang Z, Wang D, Wang C, Zhou X (2017) Detecting copy-move forgeries in images based on DCT and main transfer vectors. KSII Trans Internet Inf Syst 11:4567–4587 Zhang Z, Wang D, Wang C, Zhou X (2017) Detecting copy-move forgeries in images based on DCT and main transfer vectors. KSII Trans Internet Inf Syst 11:4567–4587
37.
go back to reference Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1):158–166CrossRef Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1):158–166CrossRef
38.
go back to reference Zhao X, Li J (2011) Detecting digital image splicing in chroma spaces. In: Digital watermarking. Springer, Berlin, vol 6526, pp 12–22 Zhao X, Li J (2011) Detecting digital image splicing in chroma spaces. In: Digital watermarking. Springer, Berlin, vol 6526, pp 12–22
Metadata
Title
Copy-move forgery detection technique based on discrete cosine transform blocks features
Authors
Esteban Alejandro Armas Vega
Edgar González Fernández
Ana Lucila Sandoval Orozco
Luis Javier García Villalba
Publication date
20-10-2020
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 10/2021
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05433-1

Other articles of this Issue 10/2021

Neural Computing and Applications 10/2021 Go to the issue

S.I.: Higher Level Artificial Neural Network Based Intelligent Systems

Multi-source data fusion for economic data analysis

S.I. : Higher Level Artificial Neural Network Based Intelligent Systems

A combined deep learning method for internet car evaluation

S.I. : Higher Level Artificial Neural Network Based Intelligent Systems

Time segment language model for microblog retrieval

Premium Partner