Digital image forgery detection using SIFT feature

There has been an extensive growth in the area of digital image processing. One of the main issues in the real world is to judge the authenticity of a given image. Nowadays it is very easy to tamper and forge digital image with the advancement of the powerful digital image processing software and easy availability of the tools. The most common form of image manipulation techniques is the region duplication also called as copymove forgery where a portion of the image is copied and paste to another portion in the same digital image. To investigate such forensic analysis, various techniques and method have been developed in the past literature. There has been an immense research of finding such tampered pixel blocks. This method cannot handle cases when the copied region is scaled or rotated to a new region. This paper proposes an efficient algorithm based on scale invariant feature transform (SIFT) with feature extraction which is invariant to translation, scale, noise and rotation. It comprises transformation of the input image to produce a standard representation and then detection of keypoint and feature descriptor is applied along with a matching over all the keypoints.

[1]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[2]  C.G. Patil,et al.  Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[3]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[4]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[5]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[6]  Farshad Mashhadi,et al.  A new approach for detecting copy-move forgery in digital images , 2017, 2017 IEEE Western New York Image and Signal Processing Workshop (WNYISPW).

[7]  David Letscher,et al.  Detecting filtered cloning in digital images , 2007, MM&Sec.

[8]  H. Farid Image Forgery Detection -- A survey , 2009 .

[9]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[10]  Jing Zhang,et al.  A new approach for detecting Copy-Move forgery in digital images , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[11]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Hongyuan Li,et al.  Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[13]  Jan Flusser,et al.  Image features invariant with respect to blur , 1995, Pattern Recognit..

[14]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[15]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[16]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[17]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[18]  Asoke K. Nandi,et al.  Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling , 2009, 2009 17th European Signal Processing Conference.

[19]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[20]  A. Balakrishnan Learning Student Models through an Ontology of Learning Strategies , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[21]  Zhengding Qiu,et al.  Multipurpose Watermarking Based on Multiscale Curvelet Transform , 2008, IEEE Transactions on Information Forensics and Security.

[22]  C. Hsieh,et al.  Geometric invariant semi-fragile image watermarking using real symmetric matrix , 2006 .

[23]  Minglun Gong,et al.  An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).

[24]  Alan C. Bovik,et al.  DCT-domain blind measurement of blocking artifacts in DCT-coded images , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[25]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[26]  Muhammad Ghulam,et al.  Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.