Block-based copy–move image forgery detection using DCT

Digital image forensic is a sub-area of multimedia security whose objective is to expose the malicious image manipulations in digital images. Among different types of image forgery, copy–move forgery is the most popular to forge the digital images where a part of the original digital image is copied and pasted at another position in the same image. Different methods have been developed to detect the image forgery in digital images. On the basis of our literature review, we identify that less attention is given to clustering algorithms to speed up the block matching strategy during image forgery detection process. Therefore, to address this issue, we present a pixel-based copy–move image forgery detection method to check the genuineness of digital images. Proposed method includes the following steps: (1) convert the color image into gray-scale image, (2) divide the gray-scale image into overlapping blocks of size 8 × 8, (3) feature extraction using DCT on the basis of different feature sets, (4) block clustering using K-means algorithm, and (5) radix sort for feature matching. Experimental results demonstrate that proposed method can efficiently detect the forged part from digital images.

[1]  Girish Sharma,et al.  UML 2.0 based framework for the development of secure web application , 2017 .

[2]  Moeness G. Amin,et al.  Radar-Based Human-Motion Recognition With Deep Learning: Promising applications for indoor monitoring , 2019, IEEE Signal Processing Magazine.

[3]  Kumar Sunil,et al.  DCT-PCA Based Method for Copy-Move Forgery Detection , 2014 .

[4]  Zahid Mehmood,et al.  A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform , 2018, J. Vis. Commun. Image Represent..

[5]  Mohamed Deriche,et al.  A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..

[6]  Xingming Sun,et al.  Detection of copy-move forgery in digital images based on DCT , 2013, ArXiv.

[7]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[8]  Shruti Jain,et al.  Classification of Protein Kinase B using discrete wavelet transform , 2018 .

[9]  Mohey M. Hadhoud,et al.  Fan Search for Image Copy-Move Forgery Detection , 2014, AMLTA.

[10]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[11]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[12]  Jichang Guo,et al.  Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.

[13]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[14]  Robert H. Yolken,et al.  Anti-Gluten Immune Response following Toxoplasma gondii Infection in Mice , 2012, PloS one.

[15]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[16]  Jie Hu,et al.  An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection , 2011, 2011 Second International Conference on Networking and Distributed Computing.

[17]  Charles Elkan,et al.  Using the Triangle Inequality to Accelerate k-Means , 2003, ICML.

[18]  Garrison W. Cottrell,et al.  Color-to-Grayscale: Does the Method Matter in Image Recognition? , 2012, PloS one.

[19]  Svetha Venkatesh,et al.  Application of the DCT energy histogram for face recognition , 2004 .

[20]  Reema Thareja Data Structures Using C , 2018 .

[21]  C. Saravanan,et al.  Color Image to Grayscale Image Conversion , 2010, 2010 Second International Conference on Computer Engineering and Applications.

[22]  Muhammad Ghulam,et al.  Passive detection of image forgery using DCT and local binary pattern , 2016, Signal, Image and Video Processing.

[23]  Bharat Garg,et al.  Energy Aware Computation Driven Approximate DCT Architecture for Image Processing , 2015, 2015 28th International Conference on VLSI Design.

[24]  Vacius Jusas,et al.  EEG Dataset Reduction and Feature Extraction Using Discrete Cosine Transform , 2012, 2012 Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation.

[25]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[26]  Kaushik Majumdar,et al.  Human scalp EEG processing: Various soft computing approaches , 2011, Appl. Soft Comput..

[27]  Noura A. Semary,et al.  A proposed accelerated image copy-move forgery detection , 2014, 2014 IEEE Visual Communications and Image Processing Conference.

[28]  Ahmad Faraahi,et al.  DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[29]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[30]  N. Ali,et al.  A systematic literature review: Information security culture , 2017, 2017 International Conference on Research and Innovation in Information Systems (ICRIIS).

[31]  Zhi Zhang,et al.  Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors , 2017, KSII Trans. Internet Inf. Syst..

[32]  Akash Tayal,et al.  An algorithm to detect the forged part in an image , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[33]  Dinesh Kumar,et al.  Feature selection for face recognition using DCT-PCA and Bat algorithm , 2017 .

[34]  Sunil Kumar,et al.  A fast DCT based method for copy move forgery detection , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[35]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[36]  Martin Glinz,et al.  On Non-Functional Requirements , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).