Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A survey on traditional and deep learning copy move forgery detection (CMFD) techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital image forgeries become one of the most challenges faced by technology users today. A copy-move forgery is one of the most common types of these forgeries. This type is not only common, but it is also very simple to execute to create deceptive images. Many algorithms use various technologies to create a high-performance Copy Move Forgery Detection (CMFD) system. There are currently two major CMFD trends: traditional CMFD algorithms and deep-learning-based CMFD algorithms. The main concept behind CMFD algorithms is to extract image features using various techniques and then search for matching features. This main idea can be carried out by using different feature extraction techniques with various matching techniques. For traditional algorithms, there are many types of features extractors used such as invariant image moments, texture and intensity descriptors, Scale-Invariant Feature Transform (SIFT), Speed Up Roust Features (SURF), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD), Principal Component Analysis (PCA), and other extractors. The strength of these extractors varies according to the image properties and the forgery’s performance perfection. Deep learning-based CMFD algorithms operate as a black box, by extracting image features using layers with complex training and validation processes to achieve the best scenario, such as Convolutional Neural Network (CNN), Convolutional Long Short-Term Memory (CovLSTM), Multi-domain CNN, and Buster-Net. This paper discusses different types of digital image forgery with focusing on copy-move forgery. A detailed survey of various types of CMFD algorithms, on the other hand, has been displayed. The paper provides a comprehensive comparison of various algorithms and evaluates them using various types of evaluation parameters. Finally, the paper focuses on the different datasets used by various algorithms to evaluate their performance accuracy and testing time. These datasets are detailed in terms of image numbers, the number of original images, the number of forged images, the resolution variety in each dataset, the size of the tampered region in each dataset, and the strength of each dataset compared with each other.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6:1099–1110

    Article  Google Scholar 

  2. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28:659–669

    Article  Google Scholar 

  3. Amerini I, Uricchio T, Ballan L, Caldelli R (2017) Localization of JPEG double compression through multi-domain convolutional neural networks. In: 2017 IEEE Conf. Comput. Vis. Pattern Recognit. Work., IEEE, pp. 1865–1871

  4. Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110:346–359

    Article  Google Scholar 

  5. Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proc. 4th ACM Work. Inf. Hiding Multimed. Secur., pp. 5–10

  6. Bi X, Wei Y, Xiao B, Li W (2019) Rru-net: The ringed residual u-net for image splicing forgery detection. In: Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Work., p. 0

  7. Bo X, Junwen W, Guangjie L, Yuewei D (2010) Image copy-move forgery detection based on SURF. In: 2010 Int. Conf. Multimed. Inf. Netw. Secur., IEEE, pp. 889–892

  8. Bondi L, Lameri S, Güera D, Bestagini P, Delp EJ, Tubaro S (2017) Tampering detection and localization through clustering of camera-based CNN features. In: 2017 IEEE Conf. Comput. Vis. Pattern Recognit. Work., IEEE, pp. 1855–1864

  9. Chauhan D, Kasat D, Jain S, Thakare V (2016) Survey on keypoint based copy-move forgery detection methods on image. Procedia Comput Sci 85:206–212

    Article  Google Scholar 

  10. Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22:1849–1853

    Article  Google Scholar 

  11. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7:1841–1854

    Article  Google Scholar 

  12. Columbia Image Splicing Detection Evaluation Dataset, (n.d.) DVMM Laboratory of Columbia University, CalPhotos Digital Library, http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm. Accessed May 2020

  13. Cozzolino D, Verdoliva L (2016) Single-image splicing localization through autoencoder-based anomaly detection. In: 2016 IEEE Int. Work. Inf. Forensics Secur., IEEE, pp. 1–6

  14. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., IEEE, pp. 886–893

  15. Dander A, Mueller LA, Gallasch R, Pabinger S, Emmert-Streib F, Graber A, Dehmer M (2013) [COMMODE] a large-scale database of molecular descriptors using compounds from PubChem. Source Code Biol Med 8:22. https://doi.org/10.1186/1751-0473-8-22

    Article  Google Scholar 

  16. Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231:61–72

    Article  Google Scholar 

  17. Diane WNN, Xingming S, Moise FK (2014) A survey of partition-based techniques for copy-move forgery detection. The Scientific World Journal 2014. https://doi.org/10.1155/2014/975456

  18. Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit Int. Conf. Signal Inf. Process., IEEE, pp. 422–426

  19. Elaskily MA, Aslan HK, Abd El-Samie FE, Elshakankiry OA, Faragallah OS, Dessouky MM (2017) Comparative study of copy-move forgery detection techniques, Intl Conf on advanced control circuits systems (ACCS) systems & Intl Conf on new paradigms in Electronics & Information Technology (PEIT), Alexandria, Egypt

  20. Elaskily MA, Elnemr HA, Dessouky MM, Faragallah OS (2018) Two stages object recognition based copy-move forgery detection algorithm. Multimedia Tools and Applications 78:15353–15373. https://doi.org/10.1007/s11042-018-6891-7

    Article  Google Scholar 

  21. Elaskily MA, Aslan HK, Dessouky MM, Abd El-Samie FE, Faragallah OS, Elshakankiry OA (Jan. 2019) Enhanced Filter-based SIFT Approach for Copy-Move Forgery Detection. Menoufia Journal of Electronic Engineering Research (MJEER) 28(1):159–182

    Article  Google Scholar 

  22. Elaskily MA, Elnemr HA, Sedik A, Dessouky MM, El Banby GM, Elshakankiry OA, Khalaf AM, Aslan HK, Faragallah OS, Abd El-Samie FE (2020) A novel deep learning framework for copy-move forgery detection in images. Multimedia Tools and Applications 79:19167–19192. https://doi.org/10.1007/s11042-020-08751-7

    Article  Google Scholar 

  23. Elaskily MA, Alkinani MH, Sedik A, Dessouky MM (2021) Deep learning based algorithm (ConvLSTM) for copy move forgery detection. Journal of Intelligent & Fuzzy Systems 40(3):4385–4405. https://doi.org/10.3233/JIFS-201192

    Article  Google Scholar 

  24. Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection, In: 2014 IEEE vis. Commun. Image Process. Conf., IEEE, pp. 253–257

  25. Hashmi MF, Anand V, Keskar AG (2014) A copy-move image forgery detection based on speeded up robust feature transform and wavelet transforms. In: 2014 Int. Conf. Comput. Commun. Technol., IEEE, pp. 147–152

  26. Hassaballah M, Abdelmgeid AA, Alshazly HA (2016) Image features detection, description and matching, In: Image Featur. Detect. Descriptors, Springer, pp. 11–45

  27. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206:178–184

    Article  Google Scholar 

  28. Jwaid MF, Baraskar TN (2017) Study and analysis of copy-move & splicing image forgery detection techniques, In: 2017 Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud)(I-SMAC), IEEE, pp. 697–702

  29. Kumar S, Desai J, Mukherjee S (2013) A fast DCT based method for copy move forgery detection, In: 2013 IEEE second Int. Conf. Image Inf. Process., IEEE, pp. 649–654

  30. Liu B, Pun C-M (2013) A SIFT and local features based integrated method for copy-move attack detection in digital image, In: 2013 IEEE Int. Conf. Inf. Autom., IEEE, pp. 865–869

  31. Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34:1557–1565

    Article  Google Scholar 

  32. Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60:91–110

    Article  Google Scholar 

  33. Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image, In: 18th Int. Conf. Pattern Recognit., IEEE, pp. 746–749

  34. Maind RA, Khade A, Chitre DK (2014) Image copy move forgery detection using block representing method. Int J Soft Comput Eng 4:49–53

    Google Scholar 

  35. Muhammad G, Hussain M (2013) Passive detection of copy-move image forgery using undecimated wavelets and zernike moments. Inf J 16:2957–2964

    Google Scholar 

  36. Mushtaq S, Mir AH (2014) Digital Image Forgeries and Passive Image Authentication Techniques: A Survey. International Journal of Advanced Science and Technology 73:15–32. https://doi.org/10.14257/ijast.2014.73.02

    Article  Google Scholar 

  37. Pandey RC, Singh SK, Shukla KK, Agrawal R (2014) Fast and robust passive copy-move forgery detection using SURF and SIFT image features. In: 2014 9th Int. Conf. Ind. Inf. Syst., pp. 1–6. https://doi.org/10.1109/ICIINFS.2014.7036519

  38. Prasad S, Ramkumar B (2016) Passive copy-move forgery detection using SIFT, HOG and SURF features. In: 2016 IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Technol., IEEE, pp. 706–710

  39. Qureshi AM, Deriche M (2014) A review on copy-move image forgery detection techniques, multi-conference on systems. Signals & Devices (SSD):11–14

  40. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE Int. Work. Inf. Forensics Secur., IEEE, pp. 1–6

  41. Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51:133–162

    Article  Google Scholar 

  42. Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8:1355–1370

    Article  Google Scholar 

  43. Salloum R, Ren Y, Kuo C-CJ (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J Vis Commun Image Represent 51:201–209

    Article  Google Scholar 

  44. Shivakumar BL, Baboo SS (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues 8:199

    Google Scholar 

  45. Tralic D, Zupancic I, Grgic S, M. Grgic (2013) CoMoFoD — new database for copy-move forgery detection. Proceedings ELMAR-2013, pp. 49–54

  46. Wang X, Wang H, Niu S, Zhang J (2019) Detection and localization of image forgeries using improved mask regional convolutional neural network. Math Biosci Eng MBE 16:4581–4593

    Article  Google Scholar 

  47. Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: Detecting copy-move image forgery with source/target localization. In: Proc. Eur. Conf. Comput. Vis., pp. 168–184

  48. Yang J, Ran P, Xiao D, Tan J (2013) Digital image forgery forensics by using undecimated dyadic wavelet transform and Zernike moments. J Comput Inf Syst 9:6399–6408

    Google Scholar 

  49. Zhang J, Ruan Q, Jin Y (2014) Combined SIFT and bi-coherence features to detect image forgery. In: 2014 12th Int. Conf. Signal Process., IEEE, pp. 1859–1863

  50. Zhang W, Yang Z, Niu S, Wang J (2016) Detection of copy-move forgery in flat region based on feature enhancement. In: Int. Work. Digit. Watermarking, Springer, pp. 159–171

  51. Zhang Y, Goh J, Win LL, Thing VLL (2016) Image Region Forgery Detection: A Deep Learning Approach., SG-CRC. 2016, 1–11

  52. Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158–166

    Article  Google Scholar 

  53. Zheng Y, Cao Y, Chang C-H (2019) A PUF-based data-device hash for tampered image detection and source camera identification. IEEE Trans. Inf. Forensics Secur. 15:620–634

    Article  Google Scholar 

Download references

Funding

This study was funded by the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/08), Taif University, Taif, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed A. Elaskily.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

  • All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version.

  • This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue.

  • The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elaskily, M.A., Dessouky, M.M., Faragallah, O.S. et al. A survey on traditional and deep learning copy move forgery detection (CMFD) techniques. Multimed Tools Appl 82, 34409–34435 (2023). https://doi.org/10.1007/s11042-023-14424-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14424-y

Keywords