Detection of Digital Forgery Image using Different Techniques
Citation
Mehak, Tarun Gulati "Detection of Digital Forgery Image using Different Techniques", International Journal of Engineering Trends and Technology (IJETT), V46(8),457-461 April 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
In present world, digital uprising made it
very dominant technology to approach, share and
store any pictorial information and evidences.
Though digital technology has many rewards as it
play a significant role in various fields like forensic
investigation, medical imaging, courtrooms and
journalism where digital image used as
authenticated proofs, it can be used as misleading
tool also. These misleading or say editing tools
modify the images to make a forged image and there
can be a many reasons behind this occurrence of
forgery as to conceal something in an image in
order to produce false proof referred as copy move
forgery effect , to enhance image or to emphasize
particular objects etc. So, there is a strong demand
for robust and valid secured method to find out
whether picture is forged or not. In this paper,
review of various techniques related to block based
and key-point based methods to find out the copy
move forgery effect is presented.
References
[1] Y. D Shin, “Fast Exploration of Copy-Move Forgery
Image,” Advanced Science and Technology Letters, vol.
123, pp.1-5, 2016.
[2] H. Goyal and T. Gulati, “A Review on Forensic analysis of
digital image tampering,” IJRIT International Journal of Research in Information Technology, vol. 2, pp. 364-367,
May 2014.
[3] M. D. Ansari, S. P. Ghrera and V. Tyagi, “Pixel-Based
Image Forgery Detection: A Review,” IETE Journal of
Education, vol. 55:1, pp. 40-46.
[4] S. Sharmila, S. Prajakta and S. Hiral, “Image Forgery
Detection Techniques for Forensic Sciences,” International
journals, ISSN-No: 2347-4890, vol. 2, Aug. 2014.
[5] M. Puri and V. Chopra, “A survey: Copy-Move forgery
detection methods,” International journal of computer
systems, vol. 3, Sept. 2016.
[6] V. Christlein and J. Jordan, “An Evaluation of Popular
Copy-Move Forgery Detection Approaches,” IEEE
Transactions on information forensics and security, pp. 1-
26, 2012.
[7] Kusam, P. Abrol and Devanand, “Digital Tampering
Detection Techniques: A Review,” BVICAM’s
International Journal of Information Technology, vol. 1, pp.
125-132, 2009.
[8] H. Kaur, J. Saxena, and S. Singh, “Simulative Comparison
of Copy –Move Forgery Detection Methods for Digital
Images,” International Conference on Journal of
Electronics, Electrical & Computational, vol.4, pp. 62-66,
2015.
[9] J. Fridrich, D. Soukal and J. Lukas, “Detection of copy–
move forgery in digital images,” Proceedings of Digital
Forensic Research Workshop, IEEE Computer Society,
pp. 55– 61, Aug. 2003.
[10] N. D Wandji, S. Xingming and M. FahKue, “Detection of
Copy-Move forgery in digital images based on DCT,”
International Journal of Computer Science Issues, vol.
10(2).
[11] A. Gupta, N. Saxena and S.K Vasistha, “Detecting a Copy
move Forgery using DCT,” International Journal of
Scientific and Research Publications, vol. 3(5), pp. 1-4,
2013.
[12] B. Ustubioglu, G. Ulutas, M. Ulutas and V. V. Nabiyev,
“A new copy move forgery detection technique with
automatic threshold determination,” Elsevier - International
Journal of Electronics and Communications vol. 70, pp.
1076–1087, Aug. 2016.
[13] A. C Popescu and H. Farid, “Exposing digital forgeries by
detecting duplicated image regions,” Department of
Computer Science, Dartmouth College, Tech. Rep.
TR2004-515, 2004, pp. 1-11.
[14] B. Mahdian and S. Saic, “Detection of copy–move forgery
using a method based on blur moment invariants”, Forensic
Science International, an international journal dedicated to
the applications of medicine and science in the
administration of justice, vol. 171, pp. 181-189, Sept. 2007.
[15] X. Kang and S. Wei, “Identifying tampered regions using
singular value decomposition in digital image forensics,” in
Proc. Int. Conf. Computer Science and Software
Engineering, 2008, vol. 3, pp. 926–930.
[16] S. Khan and A. Kulkarni, “An Efficient Method for
Detection of Copy-Move Forgery Using Discrete Wavelet
Transform,” International Journal on Computer Science
and Engineering, vol. 2, pp.1801-1806, 2010.
[17] S. J Ryu, M. J Lee and H. K Lee, “Detection of Copy-
Rotate-Move Forgery Using Zernike Moments,” Springer
Proc. Int. Workshop Information Hiding, 2010, pp. 51–65.
[18] S. Bayram, H. T Sencar and N. Memon, “An Efficient and
robust method for detecting copy move forgery,” IEEE
Trans. Image Processing, 2009.
[19] L. Li1, S. Li and H. Zhu, “An Efficient Scheme for
Detecting Copy-move Forged Images by Local Binary
Patterns,” Journal of Information Hiding and Multimedia
Signal Processing, vol. 4, pp. 46-56, 2013.
[20] G. Ulutas and M. Ulutas, “Image forgery detection using
Color Coherence Vector,” Electronics, Computer and
Computation (ICECCO), pp. 107 – 110, Nov. 2013.
[21] Huang H, Guo W and Zhang Y, “Detection of copy-move
forgery in digital images using SIFT algorithm,’’ In:
Computational Intelligence and Industrial Application,
2008 PACIIA’08 Pacific-Asia Workshop on IEEE, pp.
272–6, 2008.
[22] H. Goyal and T. Gulati, “Robust Copy-move Image
Forgery Detection using SIFT,” International Journal of
Computer Science and Application, vol. 97, pp. 14-19, July
2014.
[23] Amerini I, Ballan L, Caldelli R, Del Bimbo A and Serra G,
“A sift-based forensic method for copy–move attack
detection and transformation recovery,” Inf Forensics
Secure IEEE Trans On. 2011; 6(3):1099–110.
[24] G. Zhang and H.Wang, “SURF based Detection of Copy-
Move Forgery in Flat Region,” International Journal of
Advancements in Computing Technology (IJACT), vol. 4,
September. 2012 doi:10.4156/ijact.vol4.issue17.61S.
Keywords
Image retouching. Image splicing,
Copy-move forgery, Block Based, Key-point Based.