Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3150978.3150987acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicwipConference Proceedingsconference-collections
research-article

Blur Invariant Block based Copy-Move Forgery Detection Technique using FWHT Features

Published: 06 September 2017 Publication History

Abstract

Copy-move forgery detection has become a prominent research area. In this paper, an efficient block based copy-move forgery detection algorithm based on Fast Walsh Hadamard Transform is presented with an objective to reduce processing time in identifying the duplicated regions in an image. Forged regions are detected using lexicographical sorting and efficient shift vector mechanism. Proposed system is tested on different attacked images of the CoMoFoD dataset. Attacks are blur movement, brightness changes, color reduction and contrast adjustment, etc. Performance of proposed system is quite good across all the attacks. Also, it is more robust to blur movement. Experimental results show the ability of the proposed method to accurately detect the tampered regions as well as reducing the time complexity.

References

[1]
Lowe, D. G. 2004. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision 60, 2 (2004), 91--110.
[2]
Bay, H., Ess, A., Tuytelaars, T., and Gool, L. V. 2008. Speeded-Up Robust Features (SURF). Computer Vision and Image Understanding 110, 3 (2008), 346--359.
[3]
J. Fridrich, D. Soukal and J. Lukas. 2003. Detection of copy--move forgery in digital images. In Proceedings of Digital Forensic Research Workshop, IEEE Computer Society, Cleveland, OH, USA, (August 2003), 55--61
[4]
Popescu, A. C. and Farid, H. 2005. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53, 2 (Feb 2005), 758--767.
[5]
Bayram, S., Sencar, H., T. and Memon, N. 2009. An efficient and robust method for detecting copy-move forgery. In IEEE International Conference on Acoustics, Speech and Signal Processing. 1053--1056.
[6]
Muhammad, G., Hussain, M., and Bebis. G. 2012. Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Investigation 9, 1 (2012), 49--57.
[7]
Wang, Y., Gurule, K., Wise, J., and Zheng, J. 2012. Wavelet Based Region Duplication Forgery Detection. In 2012 Ninth International Conference on Information Technology - New Generations. 30--35.
[8]
Fattah, S. A., Ullah, M. M. I., Ahmed, M., Ahmmed, I. and Shahnaz, C. 2014. A scheme for copy-move forgery detection in digital images based on 2D-DWT. In International Midwest Symposium on Circuits and Systems (MWSCAS). 801--804.
[9]
Yang, B., Sun, X., Chen, X., Zhang, J., and Li, X. 2013. An Efficient Forensic Method for Copy-move Forgery Detection based on DWT-FWHT. Radio-engineering 22, 4 (Dec. 2013), 1098--1105.
[10]
Wang, X., Liu, Y., Xu, H., Wang, P., and Yang, H. 2016. Robust copy--move forgery detection using quaternion exponent moments. Pattern Analysis and Applications (2016), 1--17.
[11]
Wo, Y., Yang, K., Han, G., Chen, H., and Wu, W. 2017. Copy-move forgery detection based on multi-radius PCET. IET Image Processing 11, 2 (2017), 99--108.
[12]
Beer, T. 1981. Walsh transforms. American Journal of Physics vol. 49, 5 (1981), 466--472.
[13]
Tralic D., Zupancic I., Grgic S., and Grgic M. 2013. CoMoFoD - New Database for Copy-Move Forgery Detection. In Proceedings of International Symposium, ELMAR. 49--54.
[14]
Kulkarni, A., Khan, S. 2010. An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform. International Journal on Computer Science and Engineering 02 (2010), 1801--1806.
[15]
Huang, Y., Lu, W., Sun, W. and Long, D. 2011. Improved DCT based detection of copy-move forgery in images. International Journal of Forensic Science 206, 1 (2011), 178--184.

Cited By

View all
  • (2024)Detection of Forged Images Using a Combination of Passive Methods Based on Neural NetworksFuture Internet10.3390/fi1603009716:3(97)Online publication date: 14-Mar-2024
  • (2024)A Comprehensive Survey on Methods for Image IntegrityACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363320320:11(1-34)Online publication date: 12-Sep-2024
  • (2024)A review of image features extraction techniques and their applications in image forensicMultimedia Tools and Applications10.1007/s11042-023-17950-x83:40(87801-87902)Online publication date: 20-Mar-2024
  • Show More Cited By
  1. Blur Invariant Block based Copy-Move Forgery Detection Technique using FWHT Features

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICWIP 2017: Proceedings of the International Conference on Watermarking and Image Processing
    September 2017
    70 pages
    ISBN:9781450353076
    DOI:10.1145/3150978
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Leeds

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 September 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Block matching
    2. Copy-move
    3. FWHT
    4. Image forensic

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICWIP 2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Detection of Forged Images Using a Combination of Passive Methods Based on Neural NetworksFuture Internet10.3390/fi1603009716:3(97)Online publication date: 14-Mar-2024
    • (2024)A Comprehensive Survey on Methods for Image IntegrityACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363320320:11(1-34)Online publication date: 12-Sep-2024
    • (2024)A review of image features extraction techniques and their applications in image forensicMultimedia Tools and Applications10.1007/s11042-023-17950-x83:40(87801-87902)Online publication date: 20-Mar-2024
    • (2022)Background Study and AnalysisImage Copy-Move Forgery Detection10.1007/978-981-16-9041-9_2(11-31)Online publication date: 4-Feb-2022
    • (2021)Exploring Color Models for Enhancement of Underwater ImageData Driven Approach Towards Disruptive Technologies10.1007/978-981-15-9873-9_26(325-336)Online publication date: 7-Apr-2021
    • (2020)Utilization of edge operators for localization of copy-move image forgery using WLD-HOG features with connected component labelingMultimedia Tools and Applications10.1007/s11042-020-09230-9Online publication date: 10-Jul-2020
    • (2020)Copy-Move Forgery Detection Methods: A CritiqueAdvances in Information Communication Technology and Computing10.1007/978-981-15-5421-6_49(501-523)Online publication date: 19-Aug-2020
    • (2019)Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local featuresJournal of Information Security and Applications10.1016/j.jisa.2019.01.00745:C(44-51)Online publication date: 1-Apr-2019
    • (2019)Copy–Move Attack Detection from Digital Images: An Image Forensic ApproachSmart Computing Paradigms: New Progresses and Challenges10.1007/978-981-13-9683-0_8(69-76)Online publication date: 1-Dec-2019
    • (2018)multiCMFDProceedings of the 2018 International Conference on Image and Graphics Processing10.1145/3191442.3191465(53-58)Online publication date: 24-Feb-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media