Skip to main content
Erschienen in: Neural Computing and Applications 1/2018

16.11.2016 | Original Article

Detection of copy-move image forgery based on discrete cosine transform

verfasst von: Mohammed Hazim Alkawaz, Ghazali Sulong, Tanzila Saba, Amjad Rehman

Erschienen in: Neural Computing and Applications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since powerful editing software is easily accessible, manipulation on images is expedient and easy without leaving any noticeable evidences. Hence, it turns out to be a challenging chore to authenticate the genuineness of images as it is impossible for human’s naked eye to distinguish between the tampered image and actual image. Among the most common methods extensively used to copy and paste regions within the same image in tampering image is the copy-move method. Discrete Cosine Transform (DCT) has the ability to detect tampered regions accurately. Nevertheless, in terms of precision (FP) and recall (FN), the block size of overlapping block influenced the performance. In this paper, the researchers implemented the copy-move image forgery detection using DCT coefficient. Firstly, by using the standard image conversion technique, RGB image is transformed into grayscale image. Consequently, grayscale image is segregated into overlying blocks of m × m pixels, m = 4.8. 2D DCT coefficients are calculated and reposition into a feature vector using zig-zag scanning in every block. Eventually, lexicographic sort is used to sort the feature vectors. Finally, the duplicated block is located by the Euclidean Distance. In order to gauge the performance of the copy-move detection techniques with various block sizes with respect to accuracy and storage, threshold D_similar = 0.1 and distance threshold (N)_d = 100 are used to implement the 10 input images in order. Consequently, 4 × 4 overlying block size had high false positive thus decreased the accuracy of forged detection in terms of accuracy. However, 8 × 8 overlying block accomplished more accurately for forged detection in terms of precision and recall as compared to 4 × 4 overlying block. In a nutshell, the result of the accuracy performance of different overlying block size are influenced by the diverse size of forged area, distance between two forged areas and threshold value used for the research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pinsky LE, Wipf JE (2000) A picture is worth a thousand words. J Gen Int Med 15:805–810CrossRef Pinsky LE, Wipf JE (2000) A picture is worth a thousand words. J Gen Int Med 15:805–810CrossRef
3.
Zurück zum Zitat Mundher M, Muhamad D, Rehman A, Saba T, Kausar F (2014) Digital watermarking for images security using discrete slant let transform. Appl Math Inf Sci 8(6):2823–2830. doi:10.12785/amis/080618 CrossRef Mundher M, Muhamad D, Rehman A, Saba T, Kausar F (2014) Digital watermarking for images security using discrete slant let transform. Appl Math Inf Sci 8(6):2823–2830. doi:10.​12785/​amis/​080618 CrossRef
4.
Zurück zum Zitat Belk RW (2013) Extended self in a digital world. J Consum Res 40:477–500CrossRef Belk RW (2013) Extended self in a digital world. J Consum Res 40:477–500CrossRef
5.
Zurück zum Zitat Saba T, Rehman A, Sulong G (2011) Cursive script segmentation with neural confidence. Int J Innov Comput Inf Control (IJICIC) 7(7):1–10 Saba T, Rehman A, Sulong G (2011) Cursive script segmentation with neural confidence. Int J Innov Comput Inf Control (IJICIC) 7(7):1–10
7.
Zurück zum Zitat Karie NM, Venter HS (2014) Toward a general ontology for digital forensic disciplines. J Forensic Sci 59:1231–1241CrossRef Karie NM, Venter HS (2014) Toward a general ontology for digital forensic disciplines. J Forensic Sci 59:1231–1241CrossRef
8.
Zurück zum Zitat Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284–295CrossRef Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284–295CrossRef
10.
Zurück zum Zitat Anand V, Hashmi MF, Keskar AG (2014) A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and sift methods. In: Intelligent information and database systems. Lecture Notes in Computer Science, vol 8397. Springer, pp 530–542 Anand V, Hashmi MF, Keskar AG (2014) A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and sift methods. In: Intelligent information and database systems. Lecture Notes in Computer Science, vol 8397. Springer, pp 530–542
12.
Zurück zum Zitat Zhao Y, Sutardja A, Ramadan O (2015) Digital image manipulation forensic. Technical Report No. UCB/EECS-2015-125, Electrical Engineering and Computer Sciences, University of California at Berkeley Zhao Y, Sutardja A, Ramadan O (2015) Digital image manipulation forensic. Technical Report No. UCB/EECS-2015-125, Electrical Engineering and Computer Sciences, University of California at Berkeley
13.
Zurück zum Zitat Sutardja A, Ramadan O, Zhao Y (2015) Forensic methods for detecting image manipulation-copy move. Technical Report No. UCB/EECS-2015-84, Electrical Engineering and Computer Sciences, University of California at Berkeley Sutardja A, Ramadan O, Zhao Y (2015) Forensic methods for detecting image manipulation-copy move. Technical Report No. UCB/EECS-2015-84, Electrical Engineering and Computer Sciences, University of California at Berkeley
14.
Zurück zum Zitat Yazdani S et al (2015) Image segmentation methods and applications in MRI brain images. IETE Tech Rev 32:413–427CrossRef Yazdani S et al (2015) Image segmentation methods and applications in MRI brain images. IETE Tech Rev 32:413–427CrossRef
15.
Zurück zum Zitat Saba T, Rehman A (2012) Machine learning and script recognition. Lambert Academic publisher, pp 39–45. ISBN-13: 978-3659111709 Saba T, Rehman A (2012) Machine learning and script recognition. Lambert Academic publisher, pp 39–45. ISBN-13: 978-3659111709
16.
17.
Zurück zum Zitat Granty REJ, Aditya T, Madhu SS (2010) Survey on passive methods of image tampering detection. In: Communication and computational intelligence (INCOCCI), 2010 international conference on, pp 431–436 Granty REJ, Aditya T, Madhu SS (2010) Survey on passive methods of image tampering detection. In: Communication and computational intelligence (INCOCCI), 2010 international conference on, pp 431–436
18.
Zurück zum Zitat Mire AV et al (2014) Digital forensic of JPEG images. In: Signal and image processing (ICSIP), 2014 fifth international conference on 2014, pp 131–136 Mire AV et al (2014) Digital forensic of JPEG images. In: Signal and image processing (ICSIP), 2014 fifth international conference on 2014, pp 131–136
19.
Zurück zum Zitat Rehman A, Saba T (2014) Evaluation of artificial intelligent techniques to secure information in enterprises. Artif Intell Rev 42(4):1029–1044. doi:10.1007/s10462-012-9372-9 Rehman A, Saba T (2014) Evaluation of artificial intelligent techniques to secure information in enterprises. Artif Intell Rev 42(4):1029–1044. doi:10.​1007/​s10462-012-9372-9
20.
Zurück zum Zitat Saba T, Rehman A, Al-Dhelaand A, Al-Rodhaand M (2014) Evaluation of current documents image denoising techniques: a comparative study. Appl Artif Intell 28(9):879–887. doi:10.1080/08839514.2014.954344 Saba T, Rehman A, Al-Dhelaand A, Al-Rodhaand M (2014) Evaluation of current documents image denoising techniques: a comparative study. Appl Artif Intell 28(9):879–887. doi:10.​1080/​08839514.​2014.​954344
23.
Zurück zum Zitat Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: Acoustics, speech and signal processing, 2009. ICASSP 2009. IEEE international conference on 2009, pp 1053–1056 Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: Acoustics, speech and signal processing, 2009. ICASSP 2009. IEEE international conference on 2009, pp 1053–1056
24.
Zurück zum Zitat Meethongjan K, Dzulkifli M, Rehman A, Altameem A, Saba T (2013) An intelligent fused approach for face recognition. J Intell Syst 22(2):197–212. doi:10.1515/jisys-2013-0010 Meethongjan K, Dzulkifli M, Rehman A, Altameem A, Saba T (2013) An intelligent fused approach for face recognition. J Intell Syst 22(2):197–212. doi:10.​1515/​jisys-2013-0010
25.
Zurück zum Zitat Al-Ameen Z, Sulong G, Rehman A, Al-Dhelaan A, Saba T, Al-Rodhaan M (2015) An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization. EURASIP J Adv Signal Process 32:1–12. doi:10.1186/s13634-015-0214-1 Al-Ameen Z, Sulong G, Rehman A, Al-Dhelaan A, Saba T, Al-Rodhaan M (2015) An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization. EURASIP J Adv Signal Process 32:1–12. doi:10.​1186/​s13634-015-0214-1
26.
Zurück zum Zitat Basori AH, Alkawaz MH, Saba T, Rehman A (2016) An overview of interactive wet cloth simulation in virtual reality and serious games. Comput Methods Biomech Biomed Eng Imaging Vis. doi:10.1080/21681163.2016.1178600 Basori AH, Alkawaz MH, Saba T, Rehman A (2016) An overview of interactive wet cloth simulation in virtual reality and serious games. Comput Methods Biomech Biomed Eng Imaging Vis. doi:10.​1080/​21681163.​2016.​1178600
27.
Zurück zum Zitat Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25:389–399CrossRef Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process Image Commun 25:389–399CrossRef
29.
Zurück zum Zitat Pan X, Lyu S (2010) Region duplication detection using image feature matching. Inf Forensics Secur IEEE Trans 5:857–867CrossRef Pan X, Lyu S (2010) Region duplication detection using image feature matching. Inf Forensics Secur IEEE Trans 5:857–867CrossRef
30.
Zurück zum Zitat Ahmad AM, Sulong G, Rehman A, Alkawaz MH, Saba T (2014) Data hiding based on improved exploiting modification direction method and Huffman coding. J Intell Syst 23(4):451–459. doi:10.1515/jisys-2014-0007 Ahmad AM, Sulong G, Rehman A, Alkawaz MH, Saba T (2014) Data hiding based on improved exploiting modification direction method and Huffman coding. J Intell Syst 23(4):451–459. doi:10.​1515/​jisys-2014-0007
31.
Zurück zum Zitat Amerini I et al (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. Inf Forensics Secur IEEE Trans 6:1099–1110CrossRef Amerini I et al (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. Inf Forensics Secur IEEE Trans 6:1099–1110CrossRef
32.
Zurück zum Zitat Boato G, Natale F, Zontone P (2010) How digital forensics may help assessing the perceptual impact of image formation and manipulation. In: Proceedings of fifth international workshop on video processing and quality metrics for consumer electronics–VPQM, 2010 Boato G, Natale F, Zontone P (2010) How digital forensics may help assessing the perceptual impact of image formation and manipulation. In: Proceedings of fifth international workshop on video processing and quality metrics for consumer electronics–VPQM, 2010
33.
Zurück zum Zitat Nodehi A, Sulong G, Al-Rodhaan M, Al-Dhelaan A, Rehman A, Saba T (2014) Intelligent fuzzy approach for fast fractal image compression. EURASIP J Adv Signal Process. doi:10.1186/1687-6180-2014-112 Nodehi A, Sulong G, Al-Rodhaan M, Al-Dhelaan A, Rehman A, Saba T (2014) Intelligent fuzzy approach for fast fractal image compression. EURASIP J Adv Signal Process. doi:10.​1186/​1687-6180-2014-112
34.
Zurück zum Zitat Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE 87:1062–1078CrossRef Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE 87:1062–1078CrossRef
35.
Zurück zum Zitat Christlein V, Riess C, Angelopoulou E (2010) A study on features for the detection of copy-move forgeries. Sicherheit 2010:105–116 Christlein V, Riess C, Angelopoulou E (2010) A study on features for the detection of copy-move forgeries. Sicherheit 2010:105–116
36.
Zurück zum Zitat Lu W, Wu M (2010) Multimedia forensic hash based on visual words. In: Image processing (ICIP), 2010 17th IEEE international conference on 2010, pp 989–992 Lu W, Wu M (2010) Multimedia forensic hash based on visual words. In: Image processing (ICIP), 2010 17th IEEE international conference on 2010, pp 989–992
37.
Zurück zum Zitat Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32:479–496CrossRef Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32:479–496CrossRef
38.
Zurück zum Zitat Christlein V et al (2012) An evaluation of popular copy-move forgery detection approaches. Inf Forensics Secur IEEE Trans 7:1841–1854CrossRef Christlein V et al (2012) An evaluation of popular copy-move forgery detection approaches. Inf Forensics Secur IEEE Trans 7:1841–1854CrossRef
39.
Zurück zum Zitat Sunil K, Jagan D, Shaktidev M (2014) DCT-PCA based method for copy-move forgery detection. In: ICT and critical infrastructure: proceedings of the 48th annual convention of computer society of India, vol II, pp 577–583 Sunil K, Jagan D, Shaktidev M (2014) DCT-PCA based method for copy-move forgery detection. In: ICT and critical infrastructure: proceedings of the 48th annual convention of computer society of India, vol II, pp 577–583
40.
Zurück zum Zitat Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR), 2003 Farid H, Lyu S (2003) Higher-order wavelet statistics and their application to digital forensics. In: IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR), 2003
41.
Zurück zum Zitat Khan S, Kulkarni A (2010) Robust method for detection of copy-move forgery in digital images. In: Signal and image processing (ICSIP), 2010 international conference on 2010, pp 69–73 Khan S, Kulkarni A (2010) Robust method for detection of copy-move forgery in digital images. In: Signal and image processing (ICSIP), 2010 international conference on 2010, pp 69–73
42.
Zurück zum Zitat Sridevi M, Mala C, Sanyam S (2012) Comparative study of image forgery and copy-move techniques. In: Advances in computer science, engineering and applications. Advances in Intelligent and Soft Computing, vol 166. Springer, pp 715–723 Sridevi M, Mala C, Sanyam S (2012) Comparative study of image forgery and copy-move techniques. In: Advances in computer science, engineering and applications. Advances in Intelligent and Soft Computing, vol 166. Springer, pp 715–723
43.
Zurück zum Zitat Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, 2003 Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, 2003
44.
Zurück zum Zitat Mahmood T, Nawaz T, Irtaza A, Ashraf R, Shah M, Mahmood MT (2016) Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images. Math Probl Eng 2016(2016) ID 8713202, doi:10.1155/2016/8713202 Mahmood T, Nawaz T, Irtaza A, Ashraf R, Shah M, Mahmood MT (2016) Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images. Math Probl Eng 2016(2016) ID 8713202, doi:10.​1155/​2016/​8713202
45.
Zurück zum Zitat Pun CM, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive over segmentation and feature point matching. Inf Forensics Secur IEEE Trans 10:1705–1716CrossRef Pun CM, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive over segmentation and feature point matching. Inf Forensics Secur IEEE Trans 10:1705–1716CrossRef
46.
Zurück zum Zitat Yan CP, Pun C-M, Yuan X-C (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16CrossRef Yan CP, Pun C-M, Yuan X-C (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16CrossRef
47.
Zurück zum Zitat Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1-3):33–34 Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1-3):33–34
48.
Zurück zum Zitat Yavuz F, Bal A, Cukur H (2016) An effective detection algorithm for region duplication forgery in digital images. Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O. doi:10.1117/12.2223732 Yavuz F, Bal A, Cukur H (2016) An effective detection algorithm for region duplication forgery in digital images. Proc. SPIE 9845, Optical Pattern Recognition XXVII, 98450O. doi:10.​1117/​12.​2223732
49.
Zurück zum Zitat Zampoglou M, Papadopoulos S, Kompatsiaris Y (2015) Detecting image splicing in the wild (WEB). In: Multimedia and expo workshops (ICMEW), 2015 IEEE international conference on 2015, pp 1–6 Zampoglou M, Papadopoulos S, Kompatsiaris Y (2015) Detecting image splicing in the wild (WEB). In: Multimedia and expo workshops (ICMEW), 2015 IEEE international conference on 2015, pp 1–6
Metadaten
Titel
Detection of copy-move image forgery based on discrete cosine transform
verfasst von
Mohammed Hazim Alkawaz
Ghazali Sulong
Tanzila Saba
Amjad Rehman
Publikationsdatum
16.11.2016
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 1/2018
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-016-2663-3

Weitere Artikel der Ausgabe 1/2018

Neural Computing and Applications 1/2018 Zur Ausgabe