Detection of Digital Forgery Image using Different Techniques

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-46 Number-8
Year of Publication : 2017
Authors : Mehak, Tarun Gulati
DOI :  10.14445/22315381/IJETT-V46P280

Citation 

Mehak, Tarun Gulati "Detection of Digital Forgery Image using Different Techniques", International Journal of Engineering Trends and Technology (IJETT), V46(8),457-461 April 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
In present world, digital uprising made it very dominant technology to approach, share and store any pictorial information and evidences. Though digital technology has many rewards as it play a significant role in various fields like forensic investigation, medical imaging, courtrooms and journalism where digital image used as authenticated proofs, it can be used as misleading tool also. These misleading or say editing tools modify the images to make a forged image and there can be a many reasons behind this occurrence of forgery as to conceal something in an image in order to produce false proof referred as copy move forgery effect , to enhance image or to emphasize particular objects etc. So, there is a strong demand for robust and valid secured method to find out whether picture is forged or not. In this paper, review of various techniques related to block based and key-point based methods to find out the copy move forgery effect is presented.

 References

[1] Y. D Shin, “Fast Exploration of Copy-Move Forgery Image,” Advanced Science and Technology Letters, vol. 123, pp.1-5, 2016.
[2] H. Goyal and T. Gulati, “A Review on Forensic analysis of digital image tampering,” IJRIT International Journal of Research in Information Technology, vol. 2, pp. 364-367, May 2014.
[3] M. D. Ansari, S. P. Ghrera and V. Tyagi, “Pixel-Based Image Forgery Detection: A Review,” IETE Journal of Education, vol. 55:1, pp. 40-46.
[4] S. Sharmila, S. Prajakta and S. Hiral, “Image Forgery Detection Techniques for Forensic Sciences,” International journals, ISSN-No: 2347-4890, vol. 2, Aug. 2014.
[5] M. Puri and V. Chopra, “A survey: Copy-Move forgery detection methods,” International journal of computer systems, vol. 3, Sept. 2016.
[6] V. Christlein and J. Jordan, “An Evaluation of Popular Copy-Move Forgery Detection Approaches,” IEEE Transactions on information forensics and security, pp. 1- 26, 2012.
[7] Kusam, P. Abrol and Devanand, “Digital Tampering Detection Techniques: A Review,” BVICAM’s International Journal of Information Technology, vol. 1, pp. 125-132, 2009.
[8] H. Kaur, J. Saxena, and S. Singh, “Simulative Comparison of Copy –Move Forgery Detection Methods for Digital Images,” International Conference on Journal of Electronics, Electrical & Computational, vol.4, pp. 62-66, 2015.
[9] J. Fridrich, D. Soukal and J. Lukas, “Detection of copy– move forgery in digital images,” Proceedings of Digital Forensic Research Workshop, IEEE Computer Society, pp. 55– 61, Aug. 2003.
[10] N. D Wandji, S. Xingming and M. FahKue, “Detection of Copy-Move forgery in digital images based on DCT,” International Journal of Computer Science Issues, vol. 10(2).
[11] A. Gupta, N. Saxena and S.K Vasistha, “Detecting a Copy move Forgery using DCT,” International Journal of Scientific and Research Publications, vol. 3(5), pp. 1-4, 2013.
[12] B. Ustubioglu, G. Ulutas, M. Ulutas and V. V. Nabiyev, “A new copy move forgery detection technique with automatic threshold determination,” Elsevier - International Journal of Electronics and Communications vol. 70, pp. 1076–1087, Aug. 2016.
[13] A. C Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515, 2004, pp. 1-11.
[14] B. Mahdian and S. Saic, “Detection of copy–move forgery using a method based on blur moment invariants”, Forensic Science International, an international journal dedicated to the applications of medicine and science in the administration of justice, vol. 171, pp. 181-189, Sept. 2007.
[15] X. Kang and S. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” in Proc. Int. Conf. Computer Science and Software Engineering, 2008, vol. 3, pp. 926–930.
[16] S. Khan and A. Kulkarni, “An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform,” International Journal on Computer Science and Engineering, vol. 2, pp.1801-1806, 2010.
[17] S. J Ryu, M. J Lee and H. K Lee, “Detection of Copy- Rotate-Move Forgery Using Zernike Moments,” Springer Proc. Int. Workshop Information Hiding, 2010, pp. 51–65.
[18] S. Bayram, H. T Sencar and N. Memon, “An Efficient and robust method for detecting copy move forgery,” IEEE Trans. Image Processing, 2009.
[19] L. Li1, S. Li and H. Zhu, “An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, pp. 46-56, 2013.
[20] G. Ulutas and M. Ulutas, “Image forgery detection using Color Coherence Vector,” Electronics, Computer and Computation (ICECCO), pp. 107 – 110, Nov. 2013.
[21] Huang H, Guo W and Zhang Y, “Detection of copy-move forgery in digital images using SIFT algorithm,’’ In: Computational Intelligence and Industrial Application, 2008 PACIIA’08 Pacific-Asia Workshop on IEEE, pp. 272–6, 2008.
[22] H. Goyal and T. Gulati, “Robust Copy-move Image Forgery Detection using SIFT,” International Journal of Computer Science and Application, vol. 97, pp. 14-19, July 2014.
[23] Amerini I, Ballan L, Caldelli R, Del Bimbo A and Serra G, “A sift-based forensic method for copy–move attack detection and transformation recovery,” Inf Forensics Secure IEEE Trans On. 2011; 6(3):1099–110.
[24] G. Zhang and H.Wang, “SURF based Detection of Copy- Move Forgery in Flat Region,” International Journal of Advancements in Computing Technology (IJACT), vol. 4, September. 2012 doi:10.4156/ijact.vol4.issue17.61S.

Keywords
Image retouching. Image splicing, Copy-move forgery, Block Based, Key-point Based.