Skip to main content

An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 625))

Included in the following conference series:

Abstract

Image morphing is a common practice nowadays. To validate a digital image is considered as a perplexing task in the field of image forensic. With numerous kind of tampering been carried out on a digital image, the paper focuses on a detection of common forgery referred to as copy-move forgery or cloning, which is nearly untraceable. The paper contemplates on the color content of the forged image and employs three different methods of feature extraction to aid the detection of forgery. The experimental results show that the feature extraction methods employed detects the forged region accurately and are also effective to rotation and scaling. A performance analysis in detection of forgery for the three methods in terms precision and recall is also presented in the paper, along with a comparison with other state-of-the-art detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Farid, H.: A Survey of Image Forgery Detection. Signal Process. Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  2. Fridrich, J., Soukal, D., Lukáš, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, August 2003

    Google Scholar 

  3. Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Technical report TR2004-515 (2004). www.cs.dartmouth.edu/farid/publications/tr04.html

  4. Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital images. Int. Conf. Pattern Recogn. 4, 746–749 (2006)

    Google Scholar 

  5. Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: IEEE International Conference on Multimedia and Expo, pp. 1750–1753, July 2007

    Google Scholar 

  6. Huang, H., Guo, W., Zhang, Y: Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272–276, December 2008

    Google Scholar 

  7. Myna, A.N., Venkateshmurthy, M.G., Patil, C.G.: Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In: IEEE International Conference on Computational Intelligence and Multimedia Applications, pp. 371–377, December 2007

    Google Scholar 

  8. Tungkasthan, A., Intarasema, S., Premchaiswadi, W.: Spatial color indexing using ACC algorithm. In: Seventh International Conference on ICT and Knowledge Engineering, pp. 113–117 (2009)

    Google Scholar 

  9. Bayram, S., Sencar, H., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1053–1056, April 2009

    Google Scholar 

  10. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  11. Christlein, V., Riess, C., Jordan, J., Riess, C.: Angelopoulou, E: An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf. Forensics Secur. 7(6), 1841–1854 (2012)

    Article  Google Scholar 

  12. Guo, J.M., Liu, Y.-F., Wu, Z.-J.: Duplication forgery detection using improved DAISY descriptor. Expert Syst. Appl. 40, 707–714 (2013). Elsevier International Journal

    Article  Google Scholar 

  13. Li, L., Zhu, S., Xiaoyue, H.W.: Detecting copy-move forgery under affine transforms for image forensics. Comput. Electr. Eng. 40(6), 1951–1962 (2014). Elsevier Ltd.

    Article  Google Scholar 

  14. Hsu, C.-M., Lee, J.-C., Chen, W-K.: An efficient detection algorithm for copy-move forgery. In: 10th Asia Joint Conference on Information Security, pp 33-36, May 2015

    Google Scholar 

  15. Lin, C.-S., Chen, C.-C., Chang, Y.-C.: An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. In: International Conference on Intelligent Networking and Collaborative Systems (INCOS), pp. 228–231, September 2015

    Google Scholar 

  16. Malviya, A.V., Ladhake, S.A.: Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Computer Science 79(2016), 383–390 (2016). In: 7th International Conference on Communication, Computing and Virtualization 2016. Elsevier Ltd.

    Article  Google Scholar 

  17. Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD - new database for copy-move forgery detection. In: Proceedings of 55th International Symposium, ELMAR-2013, pp. 49–54, September 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashwini Malviya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Malviya, A., Ladhake, S. (2016). An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2738-3_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2737-6

  • Online ISBN: 978-981-10-2738-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics