Comparative Study of Copy Move Forgery Techniques

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2019 by IJETT Journal
Volume-67 Issue-3
Year of Publication : 2019
Authors : Ms. Gurpreet Kaur, Dr. RajanManro
DOI :  10.14445/22315381/IJETT-V67I3P228

Citation 

MLA Style: Ms. Gurpreet Kaur, Dr. RajanManro "Comparative Study of Copy Move Forgery Techniques" International Journal of Engineering Trends and Technology 67.3 (2019): 146-151.

APA Style:Ms. Gurpreet Kaur, Dr. RajanManro (2019). Comparative Study of Copy Move Forgery Techniques. International Journal of Engineering Trends and Technology, 67(3), 146-151.

Abstract
Digital images are broadlyused in today’sworld because they are the main base of information. However,due to image changing tools it is easy to forge the contents of a digital image; The particular image is reliable or not is the main problem in image processing. When these particular images are used in a court of law,to influence judgment it creates lot of problem.Copy-move tampering is a basic typeof image synthesizing, where some part of an image is copied and pasted to another place. Many techniques can be used to forge the digital images. Here,we attempted to review some feature extraction methods for copy move forgery detection techniques.In other words,weexplore the problem of identifying the copy-move forgery and describe an efficient and reliable detection method. The method,we described may successfully discover the forged part even when the copied area is enhanced/retouched to merge it with the background and even when the forged image is saved in a lossy format, such as JPEG. The results of the proposed method is applied on several forged images and it indicates that theproposed method is valid in detecting the image region duplication and quite strong to additive noise and blurring.

Reference
[1] R.Singh, A. Oberoi, and N. Goel, “Copy move forgery detection on digital images,” International Journal of Computer Applications, vol. 98, no. 9, pp. 17–22, 2014.
[2] E. Ardizzone, A. Bruno, and G. Mazzola, “Copy-move forgery detection via texture description,” in Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp. 59–64, ACM, 2010.
[3] J. Fridrich, D. Soukal, and J. Lukáš, “Detection of copy-move forgery in digital images,” in Proceedings of Digital Forensic Research Workshop, Cleveland, Ohio, USA, August 2003.
[4] Ardizzone E, Bruno A, Mazzola G. Detecting multiple copies in tampered images. In: Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE; 2010. p. 2117–20.
[5] David G. Lowe., “Distinctive Image Features from Scale-Invariant Key-Points”, International Journal of Computer Vision ,2004,60(2), pp.91-1
[6] Xu Bo, Wang Junwen, Liu Guangie and Dai Yuewei., “Image Copy-Move forgery Detection Based on Surf”, International Conference on Multi-media Information Networking and Security, 2010 , pp.889-892
[7] Mohammad FarukhHashmi, AadityaHambarde., “Copy move forgery detection using DWT and SIFT”, International Conference on Intelligent System Design and applications, 2013, pp.188-193.
[8] J. Fridrich, D. Soukal, and J. Lukas, “Detection of Copy-Move Forgery in Digital Images”, in Proceedings of Digital Forensic Research Workshop, August 2003
[9] NehaJadhav, SuvarnaKharat, PunamNangare,“Copy-Move Forgery Detection using DCT”, International Journal for emerging Technologies and Engineering, Vol 2 Isuue 3 March 2015, ISSN 2348-8050.
[10] Wang Y, Gurule K, Wise J, Zheng J. “Wavelet based region duplication forgery detection.” ,Proceedings of the 9th International Conference on Information Technology: New Generatio (ITNG `12); April 2012; IEEE; pp. 30–35.
[11] A.C.Popescu and H.Farid, “Exposing Digital Forgeries by Detecting Duplicated Image ,Regions,”Technical Report,TR2004- 515,Depart Department of computer Science, Darmouth College, pp.758-767, 2006
[12] B L Shivakumar and Lt.Dr.SSanthoshBaboo, “Detection Of Region Duplication Forgery in DigitalImages using SURF, International Journal Of Computer Science Issues, Vol 8, Issue 4, No 1, July 2011.
[13] SwapnilH.Kudke, A.D.Gawande, “Copy-Move Attack Forgery Detection by Using SIFT,” International Journal of Innovative Technology and Engineering (IJITEE), Vol.(5), ISSN 2278-3075, 2013
[14] I.Amerini,L.Ballan,R.Caldelli,A.D.Bimbo,andG.Serra, “A SIFT-based Forensics Method for Copy-Move Attack Detection and Transformation Recovery,” IEEE Transaction on Information Forensics and Security, Vol.6, no.3, pp.1099-1110, 2011.
[15] V.Christlein,C.Riess, J.Jordan, C.Riess, and E.Angelopoulou, “An Evaluation of popular Copy-Move Forgery Detection Approaches,” IEEE Transactions on Information Forensicsand Security, Vol.7, pp.1841-1854, 2012
[16] David G. Lowe., ?Distinctive Image Features from Scale-Invariant Key-Points?, International Journal of Computer Vision ,2004,60(2), pp.91-1
[17] Xu Bo, Wang Junwen, Liu Guangie and Dai Yuewei., ?Image Copy-Move forgery Detection Based on Surf?, International Conference on Multi-media Information Networking and Security, 2010 , pp.889-892
[18] Mohammad FarukhHashmi, AadityaHambarde., ?Copy move forgery detection using DWT and SIFT?, International Conference on Intelligent System Design and applications, 2013, pp.188-193.
[19] J.Fridrich, D. Soukal, and J. Lukas, ?Detection of Copy-Move Forgery in Digital Images?, in Proceedings of Digital Forensic Research Workshop, August 2003.
[20] Tao Jing Xinghua li, Feifei Zhang, Image Tamper Detection Algorithm Based on Radon and fourier-Mellin Transform”,pp 212-215 IEEE2010
[21] Sarah A. Summers, Sarah C. Wahl“Multimedia Security and Forensic Authentication of Digital images, “http://cs.uccs.edu/~cs525/studentproj/poj52006/sasummer/doc/cs525projsumm ersWahl.doc”.
[22] J. Fridrich, D. Soukal, and J. Lukas, “Detection of Copy-Move Forgery in Digital Images”, in Proceedings of Digital Forensic Research Workshop, August 2003.
[23] A.C.Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Duplicated Image Regions,” Technical Report, TR2004-515, Department of Computer Science, Dartmouth College, pp. 758-767, 2006.
[24] X.Kang and S. Wei, “Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics,” International Conference on Computer Science and Software Engineering, pp. 926-930,2008
[25] B.Mahdian and S. Saic, “Detection of copy-move forgery using a method based on blur moment invariants.,” Elsevier Forensic Science International, vol. 171, no. 2-3, pp. 180-189 Sep. 2007.
[26] S.-jinRyu, M.-jeong Lee, and H.-kyu Lee, “Detection of Copy-Rotate- Move Forgery Using Zernike Moments,” IH , LNCS 6387, vol. 1, pp. 51-65, 2010.

Keywords
Passive, Copy move, Forensics, Forgery, Genuineness, Digital image