Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A fast copy-move image forgery detection approach on a reduced search space

Published: 04 January 2023 Publication History

Abstract

This paper proposes an overlapping block-based passive forensic scheme for copy–move forgery detection in digital images that works on a reduced search space. It uses a Gaussian image pyramid to generate and analyze input images at different resolutions. The conventional overlapping block-based procedures produce satisfactory results but are highly compute-intensive for large and medium-sized images. An increase in image size leads to a rapid rise in the number of overlapping blocks in the image, making processes like feature extraction, matching, and shift-vector calculations very expensive. The proposed approach initially performs relative forgery detection through block-wise processing of lower resolution components of the original image. In this process, discrete cosine transform is used to extract significant coefficients from each block and further analyzed to identify forgeries relatively in the selected lower resolution components. This process aids in selecting a smaller search space for potentially forged areas in the original image. Finally, the actual forgery detection is performed on this reduced search space, decreasing the computational overhead while maintaining accuracy in the results. The proposed procedure also shows robustness against various attacks and post-processing operations.

References

[1]
Abd Warif NB, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, and Choo KKR Copy-move forgery detection: survey, challenges and future directions J Netw Comput Appl 2016 75 259-278
[2]
Alberry HA, Hegazy AA, and Salama GI A fast sift based method for copy move forgery detection Future Comput Inform J 2018 3 2 159-165
[3]
Ardizzone E, Bruno A, and Mazzola G Copy–move forgery detection by matching triangles of keypoints IEEE Trans Inf Forensics Secur 2015 10 10 2084-2094
[4]
Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Transactions on Image Processing.
[5]
Bay H, Ess A, Tuytelaars T, and Van Gool L Speeded-up robust features (surf) Comput Vis Image Underst 2008 110 3 346-359
[6]
Bo X, Junwen W, Guangjie L, Yuewei D (2010) .. In: 2010 International Conference on Multimedia Information Networking and Security, IEEE, pp 889–892.
[7]
Bovik A (2010) Handbook of Image and Video Processing. Communications, Networking and Multimedia, Elsevier Science. https://books.google.co.in/books?id=UM_GCfJe88sC
[8]
Cao Y, Gao T, Fan L, and Yang Q A robust detection algorithm for copy-move forgery in digital images Forensic Sci Int 2012 214 1-3 33-43
[9]
Christlein V, Riess C, Jordan J, Riess C, and Angelopoulou E An evaluation of popular copy-move forgery detection approaches IEEE Trans Inf Forensics Secur 2012 7 6 1841-1854
[10]
Cozzolino D, Poggi G, and Verdoliva L Efficient dense-field copy–move forgery detection IEEE Trans Inf Forensics Secur 2015 10 11 2284-2297
[11]
Dixit A and Bag S A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks Expert Syst Appl 2021 182 115 282
[12]
Florindo JB, Casanova D, and Bruno OM A gaussian pyramid approach to bouligand–minkowski fractal descriptors Inf Sci 2018 459 36-52
[13]
Fridrich AJ, Soukal BD, Lukáš AJ (2003) .. In: Inproceedings of digital forensic research workshop, Citeseer
[14]
Gonzalez R, Woods R (2017) Digital Image Processing, Global Edition, Pearson. https://books.google.co.in/books?id=XmZvtAEACAAJ
[15]
Hayat K and Qazi T Forgery detection in digital images via discrete wavelet and discrete cosine transforms Comput Electr Eng 2017 62 448-458
[16]
Huang Y, Lu W, Sun W, and Long D Improved dct-based detection of copy-move forgery in images Forensic Sci Int 2011 206 1-3 178-184
[17]
Kaur J, Khan AI, Abushark YB, Alam MM, Khan SA, Agrawal A, Kumar R, and Khan RA Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective Risk Manag Healthc Policy 2020 13 355
[18]
Kumar R, Khan AI, Abushark YB, Alam MM, Agrawal A, and Khan RA A knowledge-based integrated system of hesitant fuzzy set, ahp and topsis for evaluating security-durability of web applications IEEE Access 2020 8 48,870-48,885
[19]
Kumar R, Khan AI, Abushark YB, Alam MM, Agrawal A, and Khan RA An integrated approach of fuzzy logic, ahp and topsis for estimating usable-security of web applications IEEE Access 2020 8 50,944-50,957
[20]
Lin X, Li JH, Wang SL, Cheng F, Huang XS, et al. Recent advances in passive digital image security forensics: a brief review Engineering 2018 4 1 29-39
[21]
Lowe DG Distinctive image features from scale-invariant keypoints Int J Comput Vis 2004 60 2 91-110
[22]
Mahmood T, Mehmood Z, Shah M, and Saba T A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform J Vis Commun Image Represent 2018 53 202-214
[23]
Meena KB, Tyagi V (2019) .. In: Data, engineering and applications, Springer., pp 163–194
[24]
Niu Pp, Wang C, Chen W, Yang H, and Wang X Fast and effective keypoint-based image copy-move forgery detection using complex-valued moment invariants J Vis Commun Image Represent 2021 77 103 068
[25]
Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy–move image forgery detection using dct. Iran J Comput Sci, 1–11.
[27]
Prasad S, Pal AK, Paul S (2022) A block-level image tamper detection scheme using modulus function based fragile watermarking. Wirel Pers Commun, 1–39.
[28]
Rao KR, Yip P (2014) Discrete cosine transform: algorithms, advantages applications. Academic Press
[29]
Sarker IH, Abushark YB, Alsolami F, and Khan AI Intrudtree: a machine learning based cyber security intrusion detection model Symmetry 2020 12 5 754
[30]
Schetinger V, Iuliani M, Piva A, and Oliveira MM Image forgery detection confronts image composition Comput Graph 2017 68 152-163
[31]
Sencar HT, Memon N (2014) Digital image forensics: there is more to a picture than meets the eye. Springer Publishing Company, Incorporated
[32]
Shelke NA and Kasana SS A comprehensive survey on passive techniques for digital video forgery detection Multimed Tools Appl 2021 80 4 6247-6310
[33]
Shelke NA and Kasana SS Multiple forgery detection and localization technique for digital video using pct and nbap Multimed Tools Appl 2022 81 16 22,731-22,759
[34]
Shivakumar B and Baboo SS Automated forensic method for copy-move forgery detection based on harris interest points and sift descriptors Int J Comput Appl 2011 27 3 9-17
[35]
Soni B, Das PK, and Thounaojam DM Cmfd: a detailed review of block based and key feature based techniques in image copy-move forgery detection IET Image Process 2018 12 2 167-178
[36]
Sunil K, Jagan D, Shaktidev M (2014) .. In: ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II, Springerpp 577–583.
[37]
Tharwat A (2018) Classification assessment methods. Applied Computing and Informatics.
[38]
Walia S and Kumar K Digital image forgery detection: a systematic scrutiny Aust J Forensic Sci 2019 51 5 488-526
[39]
Yadav AR, Anand R, Dewal M, and Gupta S Gaussian image pyramid based texture features for classification of microscopic images of hardwood species Optik 2015 126 24 5570-5578
[40]
Zhao J and Guo J Passive forensics for copy-move image forgery using a method based on dct and svd Forensic Sci Int 2013 233 1-3 158-166

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 82, Issue 17
Jul 2023
1554 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 04 January 2023
Accepted: 04 November 2022
Revision received: 01 September 2022
Received: 17 June 2022

Author Tags

  1. Digital image forensics
  2. Copy–move forgery detection
  3. Discrete cosine transform
  4. Gaussian image pyramid

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media