Copy-Paste Forgery Detection in Digital Image Forensic

Authors

  • Anushree U. Tembe  Department of Computer Science & Engineering, YCCE, Nagpur, Maharashtra, India
  • Supriya S. Thombre  Department of Computer Science & Engineering, YCCE, Nagpur, Maharashtra, India

Keywords:

Image Forensic, Tamper Detection, Copy-Paste Forgery

Abstract

The digital image forensic has increased nowadays new trends and creative ways to forged images. The software's are available that are used to manipulate the image so that the image looks like as original. In this paper the point-based approach used, in which relevant keypoints are extracted using Scale Invariant Feature Transforms. Interested points are extracted from the image, and extracted points are modeled as a set of connected triangles using Delaunay Triangulation Copy-paste image forgery where one portion of an image is replaced with the same image. Finally trying to show the efficiency and accuracy of this technique for detecting copy-paste forgery with translation, scaling, rotation, stretching.

References

  1. J. Fridrich, D. Soukal and J. Lukas, “Detection of Copy-Move Forgery in Digital Images, Digital Forensic Research Workshop, Cleveland, pp. 19–23, 2003
  2. C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Duplicated Image Regions”, Tech. Rep. TR2004-515, Dartmouth College, 2004
  3. A. Popescu and H. Farid, "Exposing Digital Forgeries in Color Filter Array Interpolated  Images," in IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3948-3959, Oct. 2005
  4. W. Luo, J. Huang and G. Qiu, “Robust detection of region-duplication forgery in digital images”, in International Conference on Pattern Recognition, vol. 4, (2006), 746–749
  5. G. Li, Q. Wu, D. Tu, and S. Sun, “A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries based on DWT and SVD,” in Proceedings of IEEE International Conference on Multimedia and Expo, Beijing China, pp. 1750-1753, July 2-5, 2007
  6. B. Mahdian and S. Saic, “Detection of copy-move forgery using a method based on blur moment invariants”, Forensic Sci. Int., vol. 171, (2007) pp. 180–189
  7. X. Kang and S. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics”, in Proceedings of International Conference on Com-puter Science and Software Engineering, (2008), pp. 926–930
  8. Z. Ting and W. Rang-Ding, "Copy move Forgery Detection Based on Svd in Digital Image," in Proceedings of Image And Signal Processing, Cisp'09. 2nd International Congress On, pp. 1-5, 2009
  9. J. Wang, G. Liu, Z. Zhang, Y. Dai, and Z. Wang, "Fast And Robust Forensics for Image Region duplication Forgery," in Proceedings of Acta  Automatica  Sinica, Vol. 35, pp. 1488-1495, 2009
  10. S. Bayram, H. Taha Sencar and N. Memon, "An Efficient and Robust Method for Detecting Copy-Move Forgery," in IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, pp. 1053-1056, 2009
  11. S. Ryu, M. Lee and H. Lee, “Detection of Copy-Rotate-Move Forgery Using Zernike Moments,” in Proceedings of Information Hiding Springer Berlin Heidelberg, pp. 1053-1056, 2009
  12. S. Khan and A. Kulkarni, "Robust Method For Detection Of Copy-Move Forgery In Digital Images," in Proceedings of Signal and Image Processing (ICSIP), 2010 International Conference on, Chennai, pp. 69-73, 2010
  13. L. Fitzpatrick and M. Dent, “Region Duplication Detection Using Image Feature Matching,” in IEEE Transactions On Information Forensics And Security, vol. 5, no. 4, 2010
  14. X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, "Image Copy-Move Forgery Detection Based on Surf," in Proceedings of Multimedia Information Networking and Security,  International Conference On,  pp.889-892, 2010
  15. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo and G. Serra, "An SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery," in Proceedings of IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, Sept. 2011
  16. M. Sridevi, C. Mala, And S. Sandeep,"Copy–Move Image Forgery Detection In A Parallel Environment," in Proceedings of Image And Signal Processing, Cisp'09. 2nd International Congress On, 2012
  17. V Christlein, C Riess, J Jordan, C Riess, E Angelopoulou, "An Evaluation of Popular Copy-Move Forgery Detection Approaches," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, Dec. 2012
  18. P. Kakar and N. Sudha, "Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features," in Proceedings of Information Forensics And Security, IEEE Transactions On, Vol. 7, Pp. 1018-1028, 2012
  19. H. Shah, P. Shinde and J. Kukreja, "Retouching Detection and Steganalysis", IJEIR, Vol. 2, pp. 487-490, 2013
  20. L. Zhong and W. Xu, “A Robust Image Copy-Move Forgery Detection Based On Mixed Moments”, in Proceedings of IEEE International Conference on Software Engineering and Service Sciences (ICSESS), May  2013
  21. S. Thajeel and G. Sulong,"A Survey Of copy-Move Forgery Detection Techniques", Journal of Theoretical and Applied Information Technology, Vol.70, 10th December 2014
  22. J. Li, X. Li, B. Yang, and X. Sun, "Segmentation-Based Image Copy-Move Forgery Detection Scheme," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, March 2015.
  23. C. Hsu, J. Lee, and W. Chen, “An efficient detection algorithm  for copy-move forgery,” in Proceedings of Asia Joint Conference on Information Security (AsiaJCIS), pp. 33–36, May 2015
  24. N. Joglekar, and P. Chatur, “A Compressive Survey on Active and Passive Methods for Image Forgery Detection,” in IEEE Transactions on Image Processing, vol. 4, issue 1,2015
  25. H. Kaur and K. Kaur, “Image Forgery Detection using Steerable Pyramid Transform and Lab Color Space”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, August 2015
  26. E. Ardizzone, A. Bruno, and G. Mazzola,”Copy–move Forgery Detection By Matching Triangles Of Key-points,” IEEE Transactions On Information Forensics And Security, Vol. 10, No. 10, Oct. 2015
  27. Chen-Ming Hsu, Chungli, Taiwan, Jen-Chun Lee and Wei-Kuei Chen, “An Efficient Detection Algorithm for Copy-Move Forgery” in Proceedings of  10th Asia Joint Conference on Information Security, pp 33-36, May 2015
  28. N. Nirmalkar and S. Kamble, “Illumination Color Classification Based Image Forgery Detection: A Review” International Journal of Computer Science and Applications, 8(1), 2015
  29. K. Asghar, Z. Habib & M. Hussain
    , "Copy-move and Splicing Image Forgery Detection and Localization Techniques: A Review," in Proc.Australian Journal of Forensic Sciences, Vol. 0(0), pp. 1-27, 2016
  30. A. Ferreira, S.C. Felipussi, C. Alfaro, P. Fonseca, And A. Rocha,” Behavior Knowledge Space-based Fusion For Copy-move Forgery Detection,” IEEE Transactions On Image Processing Vol. 25, No.  10, Oct. 2016

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Anushree U. Tembe, Supriya S. Thombre, " Copy-Paste Forgery Detection in Digital Image Forensic, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.495-500, March-April-2017.