Detection of copy-move image forgery using normalized cross correlation and fast fourier transform

被引:3
作者
Katyayan, Apoorva [1 ]
Khunteta, Ajay [1 ]
Gupta, Mukesh Kumar [2 ]
Dogiwal, Sanwta Ram [2 ]
机构
[1] Poornima Coll Engn, Dept Comp Sci, Jaipur 302022, Rajasthan, India
[2] Swami Keshvanand Inst Technol, Dept Informat Technol, Jaipur 302017, Rajasthan, India
关键词
Digital Image Forensics; Digital Image Forgery; Normalized Cross Correlation; Copy-Move Forgery;
D O I
10.1080/09720510.2019.1609725
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
Digital images are being used as a rich source of information in the present digital era but the advancement of digital cameras & mobile phones and a rapid growth of image tempering software nowadays made digital images' integrity critical. Hence, to determine the trustworthiness of an image, the need for image forensics has become a necessity now. Digital image forensics is playing a major role in this direction to identify authentic digital images and has classified forgery detection techniques into two type broadly-Active and Passive. The active process needs to authenticate pictures by taking out the watermark or digital signature inserted in it. On the other hand, passive technique either required using special devices not the original content presented to demonstrate forgery of the picture. This paper proposed a search area optimization algorithm in which we used Normalized Cross-Correlation for feature matching or to detect the highly correlated areas of the forged image and Fast Fourier Transform to optimize the search area by converting the image into the frequency domain. The experimental outcomes portray that copy-paste image forgery can be effectively perceived by using the proposed approach and the computed value of precision rate and recall rate is also higher than the earlier methods
引用
收藏
页码:679 / 688
页数:10
相关论文
共 10 条
[1]  
Agarwal S., 2016, 2016 9 INT C CONT CO
[2]  
Al-Sawadi MotasemSamer, 2013, AUTOMATIC DETECTION
[3]  
Ali Qureshi M., 2014, IEEE 11 INT MULT SYS
[4]  
Hashmia Mohammad Farukh, 2014, 2014 AASRI C CIRC SI
[5]  
Kumar S, 2017, J STAT MANAG SYST, V20, P611, DOI 10.1080/09720510.2017.1395181
[6]  
Mangat S. S., 2016, 2 INT C NEXT GEN COM
[7]  
Murali S., 2012, INT J COMPUTATIONAL, V2
[8]   Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching [J].
Pun, Chi-Man ;
Yuan, Xiao-Chen ;
Bi, Xiu-Li .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) :1705-1716
[9]  
Shivakumar B. L., 2010, GLOBAL J COMPUTER SC
[10]  
Yadav Akhilesh Kumar, 2014, INT J COLLABORATIVE