Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

06.01.2017

Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering

verfasst von: V. Thirunavukkarasu, J. Satheesh Kumar, Gyoo Soo Chae, J. Kishorkumar

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The key intention of non-intrusive image forensic detection is to resolve whether an image is original or tampered. In contrast to intrusive methods, there is no supporting pattern that has been embedded into an image to ensure image authenticity. The only accessible cue is the original characteristics of an image. Various non-intrusive techniques have been proposed to ensure image authenticity but no adequate solution exists so far. This article introduced a robust technique by means of Discrete Stationary Wavelet Transform along with Multi Dimension Scaling to detect familiar category of copy-move image tampering. Experimental outcomes shows that proposed technique decreases computational complexity by reducing feature dimension and locate the tampered region more accurately even when the tampered image is blurred, brightness altered, colour reduced and pasted in multiple locations. Overall tamper detection accuracy is greater than 97% and false positive rate close to zero, which indicates that proposed technique will discover tampered region more precisely compared with existing methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mahdian, B., & Saic, S. (2010). A bibliography on blind methods for identifying image forgery. Signal Processing and Image Communication, 25(6), 389–399.CrossRef Mahdian, B., & Saic, S. (2010). A bibliography on blind methods for identifying image forgery. Signal Processing and Image Communication, 25(6), 389–399.CrossRef
2.
Zurück zum Zitat Satheeshkumar, J., & Thirunavukkarasu, V. (2014). Passive tamper detection techniques in digital images-A survey. NCDS, pp. 237–244. Satheeshkumar, J., & Thirunavukkarasu, V. (2014). Passive tamper detection techniques in digital images-A survey. NCDS, pp. 237–244.
3.
Zurück zum Zitat Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of digital image forgery detection techniques. International Conference on Convergence Technology, 4(1), 1000–1002. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of digital image forgery detection techniques. International Conference on Convergence Technology, 4(1), 1000–1002.
4.
Zurück zum Zitat Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Intrusive and non-intrusive techniques for detecting fake images. IJBI, 3(1), 374–379. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Intrusive and non-intrusive techniques for detecting fake images. IJBI, 3(1), 374–379.
5.
Zurück zum Zitat Farid, H. (2009). A survey of image forgery detection. IEEE Signal Processing, 2(26), 6–25. Farid, H. (2009). A survey of image forgery detection. IEEE Signal Processing, 2(26), 6–25.
6.
Zurück zum Zitat Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of various noise models and filtering techniques used for image restoration. IJRCSIT, 3(1), 4–9. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Analysis of various noise models and filtering techniques used for image restoration. IJRCSIT, 3(1), 4–9.
7.
Zurück zum Zitat Satheesh Kumar, J., & Thirunavukkarsu, V. (2015). Image splicing detection based on camera characteristics and lighting inconsistencies. ICIoTC, 1(1), 10–14. Satheesh Kumar, J., & Thirunavukkarsu, V. (2015). Image splicing detection based on camera characteristics and lighting inconsistencies. ICIoTC, 1(1), 10–14.
8.
Zurück zum Zitat Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231, 284–295.CrossRef Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231, 284–295.CrossRef
9.
Zurück zum Zitat Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Evolution of blind methods for image tamper detection-A review. IJAER, 9(21), 5069–5076. Thirunavukkarsu, V., & Satheesh Kumar, J. (2014). Evolution of blind methods for image tamper detection-A review. IJAER, 9(21), 5069–5076.
10.
Zurück zum Zitat Thirunavukkarsu, V., & Satheesh Kumar, J. (2016). A novel method to detect copy-move tampering in digital images. IND-JST, 9(8), 1–4. Thirunavukkarsu, V., & Satheesh Kumar, J. (2016). A novel method to detect copy-move tampering in digital images. IND-JST, 9(8), 1–4.
11.
Zurück zum Zitat Fridrich, A. J., Soukalm, B. D., Lukas, A, J. (2003). Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop, pp. 19–23. Fridrich, A. J., Soukalm, B. D., Lukas, A, J. (2003). Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop, pp. 19–23.
12.
Zurück zum Zitat Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries in color fil-ter array interpolated images. IEEE Transactions on Signal Processing, 53(10), 3948–3959.MathSciNetCrossRefMATH Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries in color fil-ter array interpolated images. IEEE Transactions on Signal Processing, 53(10), 3948–3959.MathSciNetCrossRefMATH
13.
Zurück zum Zitat Mehdi G., Mohammad F., Ahmad F. (2011). DWT-DCT (QCD) based copy-move image forgery detection. IWSSIP, 1–4. Mehdi G., Mohammad F., Ahmad F. (2011). DWT-DCT (QCD) based copy-move image forgery detection. IWSSIP, 1–4.
14.
Zurück zum Zitat Zhao, J., & Guo, J. (2013). Passive forgeries for copy-move image forgery using a method based on DCT and SVD. Forensic Science International, 233(1), 158–166.CrossRef Zhao, J., & Guo, J. (2013). Passive forgeries for copy-move image forgery using a method based on DCT and SVD. Forensic Science International, 233(1), 158–166.CrossRef
15.
Zurück zum Zitat Bravo-Solorio, S. Nandi, A. K., (2009). Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling. EUSIPCO, pp. 824–828. Bravo-Solorio, S. Nandi, A. K., (2009). Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling. EUSIPCO, pp. 824–828.
16.
Zurück zum Zitat Cao, Y., Gao, T., Fan, L., & Yang, Q. (2012). A robust detection algorithm for copy-move forgery in digital images. Forensic Science International, 214(1), 33–43.CrossRef Cao, Y., Gao, T., Fan, L., & Yang, Q. (2012). A robust detection algorithm for copy-move forgery in digital images. Forensic Science International, 214(1), 33–43.CrossRef
17.
Zurück zum Zitat Chang, C., Cloud, Y., & Chang, C.-C. (2013). A forgery detection algorithm for exemplar-based in-painting images using multi-region relation. Image and Vision Computing, 31(1), 57–71.CrossRef Chang, C., Cloud, Y., & Chang, C.-C. (2013). A forgery detection algorithm for exemplar-based in-painting images using multi-region relation. Image and Vision Computing, 31(1), 57–71.CrossRef
18.
Zurück zum Zitat Li, L., Li, S., Zhu, H., & Xiaoyue, W. (2014). Detecting copy-move forgery under affine transforms for image forensics. Computers & Electrical Engineering, 40(6), 1951–1962.CrossRef Li, L., Li, S., Zhu, H., & Xiaoyue, W. (2014). Detecting copy-move forgery under affine transforms for image forensics. Computers & Electrical Engineering, 40(6), 1951–1962.CrossRef
19.
Zurück zum Zitat Guohui L., Qiong W., Dan T., Shaojie S., (2007). A sorted neighbourhood approach for detecting duplicated regions in image forgeries based on dwt and svd. IEEE International conference on multimedia and expo, pp. 1750–1753. Guohui L., Qiong W., Dan T., Shaojie S., (2007). A sorted neighbourhood approach for detecting duplicated regions in image forgeries based on dwt and svd. IEEE International conference on multimedia and expo, pp. 1750–1753.
20.
Zurück zum Zitat Yang, B., Sun, X., Chen, X., Zhang, J., & Li, X. (2013). An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radio Engineering, 22(4), 1098–1105. Yang, B., Sun, X., Chen, X., Zhang, J., & Li, X. (2013). An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radio Engineering, 22(4), 1098–1105.
21.
Zurück zum Zitat Lee, J.-C. (2015). Copy-move image forgery detection based on Gabor magnitude. Journal of visual communication image representation, 31, 320–334.CrossRef Lee, J.-C. (2015). Copy-move image forgery detection based on Gabor magnitude. Journal of visual communication image representation, 31, 320–334.CrossRef
22.
Zurück zum Zitat Bashar, M., Noda, K., Ohnishi, N., & Mori, K. (2010). Exploring duplicated regions in natural images. IEEE Transactions on Image Processing, 9(9), 1–40. Bashar, M., Noda, K., Ohnishi, N., & Mori, K. (2010). Exploring duplicated regions in natural images. IEEE Transactions on Image Processing, 9(9), 1–40.
23.
Zurück zum Zitat Burges, C. J. C. (2009). Dimension reduction: A guided tour. Foundations and TrendsR in Machine Learning, 2(4), 275–365.CrossRefMATH Burges, C. J. C. (2009). Dimension reduction: A guided tour. Foundations and TrendsR in Machine Learning, 2(4), 275–365.CrossRefMATH
25.
Zurück zum Zitat Tralic, D., Zupancic, I., Grgic, S., Grgic, M., (2013). CoMoFoD—New database for copy-move forgery detection. In Proceedings of 55th International Smposium ELMAR, pp. 49–54. Tralic, D., Zupancic, I., Grgic, S., Grgic, M., (2013). CoMoFoD—New database for copy-move forgery detection. In Proceedings of 55th International Smposium ELMAR, pp. 49–54.
26.
Zurück zum Zitat Lee, J.-C., Chang, C.-P., & Chen, W.-K. (2015). Detection of copy–move image forgery using histogram of orientated gradients. Information Sciences, 321, 250–262.CrossRef Lee, J.-C., Chang, C.-P., & Chen, W.-K. (2015). Detection of copy–move image forgery using histogram of orientated gradients. Information Sciences, 321, 250–262.CrossRef
27.
Zurück zum Zitat Surya Prabha, D., & Satheesh Kumar, J. (2015). Assessment of banana fruit maturity by image processing technique. Journal of Food Science and Technology, 52(3), 1316–1327.CrossRef Surya Prabha, D., & Satheesh Kumar, J. (2015). Assessment of banana fruit maturity by image processing technique. Journal of Food Science and Technology, 52(3), 1316–1327.CrossRef
Metadaten
Titel
Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering
verfasst von
V. Thirunavukkarasu
J. Satheesh Kumar
Gyoo Soo Chae
J. Kishorkumar
Publikationsdatum
06.01.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3941-1

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt