Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images

被引:58
作者
Mahmood, Toqeer [1 ]
Nawaz, Tabassam [2 ]
Irtaza, Aun [3 ]
Ashraf, Rehan [1 ]
Shah, Mohsin [4 ]
Mahmood, Muhammad Tariq [5 ]
机构
[1] Univ Engn & Technol, Dept Comp Engn, Taxila 47050, Pakistan
[2] Univ Engn & Technol, Dept Software Engn, Taxila 47050, Pakistan
[3] Univ Engn & Technol, Dept Comp Sci, Taxila 47050, Pakistan
[4] Hazara Univ, Dept Informat Technol, Mansehra 21140, Pakistan
[5] Korea Univ Technol & Educ, Sch Comp Sci & Engn, Cheonan 330708, South Korea
基金
新加坡国家研究基金会;
关键词
EFFICIENT; TRANSFORM;
D O I
10.1155/2016/8713202
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliableway of copy-move forgery detection that increases the credibility of images in evidence centered applications.
引用
收藏
页数:13
相关论文
共 30 条
[21]   An efficient expanding block algorithm for image copy-move forgery detection [J].
Lynch, Gavin ;
Shih, Frank Y. ;
Liao, Hong-Yuan Mark .
INFORMATION SCIENCES, 2013, 239 :253-265
[22]   Detection of copy-move forgery using a method based on blur moment invariants [J].
Mahdian, Babak ;
Saic, Stanislav .
FORENSIC SCIENCE INTERNATIONAL, 2007, 171 (2-3) :180-189
[23]  
Mahmood T, 2015, 2015 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET)
[24]   Image forgery detection using steerable pyramid transform and local binary pattern [J].
Muhammad, Ghulam ;
Al-Hammadi, Munner H. ;
Hussain, Muhammad ;
Bebis, George .
MACHINE VISION AND APPLICATIONS, 2014, 25 (04) :985-995
[25]  
Popescu A.C., 2004, Exposing digital forgeries by detecting duplicated image regions
[26]   Survey on blind image forgery detection [J].
Qazi, Tanzeela ;
Hayat, Khizar ;
Khan, Samee U. ;
Madani, Sajjad A. ;
Khan, Imran A. ;
Kolodziej, Joanna ;
Li, Hongxiang ;
Lin, Weiyao ;
Yow, Kin Choong ;
Xu, Cheng-Zhong .
IET IMAGE PROCESSING, 2013, 7 (07) :660-670
[27]   A bibliography of pixel-based blind image forgery detection techniques [J].
Qureshi, Muhammad Ali ;
Deriche, Mohamed .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2015, 39 :46-74
[28]  
Zandi M, 2014, IEEE INT WORKS INFOR, P119, DOI 10.1109/WIFS.2014.7084314
[29]   Passive forensics for copy-move image forgery using a method based on DCT and SVD [J].
Zhao, Jie ;
Guo, Jichang .
FORENSIC SCIENCE INTERNATIONAL, 2013, 233 (1-3) :158-166
[30]   When seeing isn't believing [J].
Zhu, BB ;
Swanson, MD ;
Tewfik, AH .
IEEE SIGNAL PROCESSING MAGAZINE, 2004, 21 (02) :40-49