Skip to main content
Top
Published in: Wireless Personal Communications 4/2018

06-01-2017

Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering

Authors: V. Thirunavukkarasu, J. Satheesh Kumar, Gyoo Soo Chae, J. Kishorkumar

Published in: Wireless Personal Communications | Issue 4/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The key intention of non-intrusive image forensic detection is to resolve whether an image is original or tampered. In contrast to intrusive methods, there is no supporting pattern that has been embedded into an image to ensure image authenticity. The only accessible cue is the original characteristics of an image. Various non-intrusive techniques have been proposed to ensure image authenticity but no adequate solution exists so far. This article introduced a robust technique by means of Discrete Stationary Wavelet Transform along with Multi Dimension Scaling to detect familiar category of copy-move image tampering. Experimental outcomes shows that proposed technique decreases computational complexity by reducing feature dimension and locate the tampered region more accurately even when the tampered image is blurred, brightness altered, colour reduced and pasted in multiple locations. Overall tamper detection accuracy is greater than 97% and false positive rate close to zero, which indicates that proposed technique will discover tampered region more precisely compared with existing methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mahdian, B., & Saic, S. (2010). A bibliography on blind methods for identifying image forgery. Signal Processing and Image Communication, 25(6), 389–399.CrossRef Mahdian, B., & Saic, S. (2010). A bibliography on blind methods for identifying image forgery. Signal Processing and Image Communication, 25(6), 389–399.CrossRef
2.
go back to reference Satheeshkumar, J., & Thirunavukkarasu, V. (2014). Passive tamper detection techniques in digital images-A survey. NCDS, pp. 237–244. Satheeshkumar, J., & Thirunavukkarasu, V. (2014). Passive tamper detection techniques in digital images-A survey. NCDS, pp. 237–244.
3.
go back to reference Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of digital image forgery detection techniques. International Conference on Convergence Technology, 4(1), 1000–1002. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of digital image forgery detection techniques. International Conference on Convergence Technology, 4(1), 1000–1002.
4.
go back to reference Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Intrusive and non-intrusive techniques for detecting fake images. IJBI, 3(1), 374–379. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Intrusive and non-intrusive techniques for detecting fake images. IJBI, 3(1), 374–379.
5.
go back to reference Farid, H. (2009). A survey of image forgery detection. IEEE Signal Processing, 2(26), 6–25. Farid, H. (2009). A survey of image forgery detection. IEEE Signal Processing, 2(26), 6–25.
6.
go back to reference Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of various noise models and filtering techniques used for image restoration. IJRCSIT, 3(1), 4–9. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of various noise models and filtering techniques used for image restoration. IJRCSIT, 3(1), 4–9.
7.
go back to reference Satheesh Kumar, J., & Thirunavukkarsu, V. (2015). Image splicing detection based on camera characteristics and lighting inconsistencies. ICIoTC, 1(1), 10–14. Satheesh Kumar, J., & Thirunavukkarsu, V. (2015). Image splicing detection based on camera characteristics and lighting inconsistencies. ICIoTC, 1(1), 10–14.
8.
go back to reference Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231, 284–295.CrossRef Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231, 284–295.CrossRef
9.
go back to reference Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Evolution of blind methods for image tamper detection-A review. IJAER, 9(21), 5069–5076. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Evolution of blind methods for image tamper detection-A review. IJAER, 9(21), 5069–5076.
10.
go back to reference Thirunavukkarsu, V., & Satheesh Kumar, J. (2016). A novel method to detect copy-move tampering in digital images. IND-JST, 9(8), 1–4. Thirunavukkarsu, V., & Satheesh Kumar, J. (2016). A novel method to detect copy-move tampering in digital images. IND-JST, 9(8), 1–4.
11.
go back to reference Fridrich, A. J., Soukalm, B. D., Lukas, A, J. (2003). Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop, pp. 19–23. Fridrich, A. J., Soukalm, B. D., Lukas, A, J. (2003). Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop, pp. 19–23.
12.
go back to reference Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries in color fil-ter array interpolated images. IEEE Transactions on Signal Processing, 53(10), 3948–3959.MathSciNetCrossRefMATH Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries in color fil-ter array interpolated images. IEEE Transactions on Signal Processing, 53(10), 3948–3959.MathSciNetCrossRefMATH
13.
go back to reference Mehdi G., Mohammad F., Ahmad F. (2011). DWT-DCT (QCD) based copy-move image forgery detection. IWSSIP, 1–4. Mehdi G., Mohammad F., Ahmad F. (2011). DWT-DCT (QCD) based copy-move image forgery detection. IWSSIP, 1–4.
14.
go back to reference Zhao, J., & Guo, J. (2013). Passive forgeries for copy-move image forgery using a method based on DCT and SVD. Forensic Science International, 233(1), 158–166.CrossRef Zhao, J., & Guo, J. (2013). Passive forgeries for copy-move image forgery using a method based on DCT and SVD. Forensic Science International, 233(1), 158–166.CrossRef
15.
go back to reference Bravo-Solorio, S. Nandi, A. K., (2009). Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling. EUSIPCO, pp. 824–828. Bravo-Solorio, S. Nandi, A. K., (2009). Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling. EUSIPCO, pp. 824–828.
16.
go back to reference Cao, Y., Gao, T., Fan, L., & Yang, Q. (2012). A robust detection algorithm for copy-move forgery in digital images. Forensic Science International, 214(1), 33–43.CrossRef Cao, Y., Gao, T., Fan, L., & Yang, Q. (2012). A robust detection algorithm for copy-move forgery in digital images. Forensic Science International, 214(1), 33–43.CrossRef
17.
go back to reference Chang, C., Cloud, Y., & Chang, C.-C. (2013). A forgery detection algorithm for exemplar-based in-painting images using multi-region relation. Image and Vision Computing, 31(1), 57–71.CrossRef Chang, C., Cloud, Y., & Chang, C.-C. (2013). A forgery detection algorithm for exemplar-based in-painting images using multi-region relation. Image and Vision Computing, 31(1), 57–71.CrossRef
18.
go back to reference Li, L., Li, S., Zhu, H., & Xiaoyue, W. (2014). Detecting copy-move forgery under affine transforms for image forensics. Computers & Electrical Engineering, 40(6), 1951–1962.CrossRef Li, L., Li, S., Zhu, H., & Xiaoyue, W. (2014). Detecting copy-move forgery under affine transforms for image forensics. Computers & Electrical Engineering, 40(6), 1951–1962.CrossRef
19.
go back to reference Guohui L., Qiong W., Dan T., Shaojie S., (2007). A sorted neighbourhood approach for detecting duplicated regions in image forgeries based on dwt and svd. IEEE International conference on multimedia and expo, pp. 1750–1753. Guohui L., Qiong W., Dan T., Shaojie S., (2007). A sorted neighbourhood approach for detecting duplicated regions in image forgeries based on dwt and svd. IEEE International conference on multimedia and expo, pp. 1750–1753.
20.
go back to reference Yang, B., Sun, X., Chen, X., Zhang, J., & Li, X. (2013). An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radio Engineering, 22(4), 1098–1105. Yang, B., Sun, X., Chen, X., Zhang, J., & Li, X. (2013). An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radio Engineering, 22(4), 1098–1105.
21.
go back to reference Lee, J.-C. (2015). Copy-move image forgery detection based on Gabor magnitude. Journal of visual communication image representation, 31, 320–334.CrossRef Lee, J.-C. (2015). Copy-move image forgery detection based on Gabor magnitude. Journal of visual communication image representation, 31, 320–334.CrossRef
22.
go back to reference Bashar, M., Noda, K., Ohnishi, N., & Mori, K. (2010). Exploring duplicated regions in natural images. IEEE Transactions on Image Processing, 9(9), 1–40. Bashar, M., Noda, K., Ohnishi, N., & Mori, K. (2010). Exploring duplicated regions in natural images. IEEE Transactions on Image Processing, 9(9), 1–40.
23.
go back to reference Burges, C. J. C. (2009). Dimension reduction: A guided tour. Foundations and TrendsR in Machine Learning, 2(4), 275–365.CrossRefMATH Burges, C. J. C. (2009). Dimension reduction: A guided tour. Foundations and TrendsR in Machine Learning, 2(4), 275–365.CrossRefMATH
25.
go back to reference Tralic, D., Zupancic, I., Grgic, S., Grgic, M., (2013). CoMoFoD—New database for copy-move forgery detection. In Proceedings of 55th International Smposium ELMAR, pp. 49–54. Tralic, D., Zupancic, I., Grgic, S., Grgic, M., (2013). CoMoFoD—New database for copy-move forgery detection. In Proceedings of 55th International Smposium ELMAR, pp. 49–54.
26.
go back to reference Lee, J.-C., Chang, C.-P., & Chen, W.-K. (2015). Detection of copy–move image forgery using histogram of orientated gradients. Information Sciences, 321, 250–262.CrossRef Lee, J.-C., Chang, C.-P., & Chen, W.-K. (2015). Detection of copy–move image forgery using histogram of orientated gradients. Information Sciences, 321, 250–262.CrossRef
27.
go back to reference Surya Prabha, D., & Satheesh Kumar, J. (2015). Assessment of banana fruit maturity by image processing technique. Journal of Food Science and Technology, 52(3), 1316–1327.CrossRef Surya Prabha, D., & Satheesh Kumar, J. (2015). Assessment of banana fruit maturity by image processing technique. Journal of Food Science and Technology, 52(3), 1316–1327.CrossRef
Metadata
Title
Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering
Authors
V. Thirunavukkarasu
J. Satheesh Kumar
Gyoo Soo Chae
J. Kishorkumar
Publication date
06-01-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3941-1

Other articles of this Issue 4/2018

Wireless Personal Communications 4/2018 Go to the issue