Detection of copy-move image forgery based on discrete cosine transform

Since powerful editing software is easily accessible, manipulation on images is expedient and easy without leaving any noticeable evidences. Hence, it turns out to be a challenging chore to authenticate the genuineness of images as it is impossible for human’s naked eye to distinguish between the tampered image and actual image. Among the most common methods extensively used to copy and paste regions within the same image in tampering image is the copy-move method. Discrete Cosine Transform (DCT) has the ability to detect tampered regions accurately. Nevertheless, in terms of precision (FP) and recall (FN), the block size of overlapping block influenced the performance. In this paper, the researchers implemented the copy-move image forgery detection using DCT coefficient. Firstly, by using the standard image conversion technique, RGB image is transformed into grayscale image. Consequently, grayscale image is segregated into overlying blocks of m × m pixels, m = 4.8. 2D DCT coefficients are calculated and reposition into a feature vector using zig-zag scanning in every block. Eventually, lexicographic sort is used to sort the feature vectors. Finally, the duplicated block is located by the Euclidean Distance. In order to gauge the performance of the copy-move detection techniques with various block sizes with respect to accuracy and storage, threshold D_similar = 0.1 and distance threshold (N)_d = 100 are used to implement the 10 input images in order. Consequently, 4 × 4 overlying block size had high false positive thus decreased the accuracy of forged detection in terms of accuracy. However, 8 × 8 overlying block accomplished more accurately for forged detection in terms of precision and recall as compared to 4 × 4 overlying block. In a nutshell, the result of the accuracy performance of different overlying block size are influenced by the diverse size of forged area, distance between two forged areas and threshold value used for the research.

[1]  Ghazali Sulong,et al.  Cursive script segmentation with neural confidence , 2011 .

[2]  Osamah M. Al-Qershi,et al.  Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.

[3]  Mohammad Farukh Hashmi,et al.  A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods , 2014, ACIIDS.

[4]  Nickson M. Karie,et al.  Toward a General Ontology for Digital Forensic Disciplines , 2014, Journal of forensic sciences.

[5]  J Granty Regina Elwin,et al.  Survey on passive methods of image tampering detection , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).

[6]  Amjad Rehman,et al.  Annotated comparisons of proposed preprocessing techniques for script recognition , 2014, Neural Computing and Applications.

[7]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[8]  Amjad Rehman,et al.  An Intelligent Fused Approach for Face Recognition , 2013, J. Intell. Syst..

[9]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[10]  Linda E. Pinsky,et al.  A picture is worth a thousand words , 2000, Journal of General Internal Medicine.

[11]  Mznah Al-Rodhaan,et al.  Intelligent fuzzy approach for fast fractal image compression , 2014, EURASIP J. Adv. Signal Process..

[12]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[13]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[14]  Ghazali Sulong,et al.  Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding , 2014, J. Intell. Syst..

[15]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Amjad Rehman,et al.  Writers Identification Based on Multiple Windows Features Mining , 2016 .

[17]  Garima Mishra,et al.  Robust Method for Detection of Copy-Move Forgery in Digital Images , 2017 .

[18]  Mznah Al-Rodhaan,et al.  Evaluation of Current Documents Image Denoising Techniques: A Comparative Study , 2014, Appl. Artif. Intell..

[19]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[20]  Rubiyah Yusof,et al.  Image Segmentation Methods and Applications in MRI Brain Images , 2015 .

[21]  Rajib Kumar Jha,et al.  An Overview of Robust Digital Image Watermarking , 2015 .

[22]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[23]  Saiqa Khan,et al.  Robust method for detection of copy-move forgery in digital images , 2010, 2010 International Conference on Signal and Image Processing.

[24]  Yiannis Kompatsiaris,et al.  Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[25]  Christian Riess,et al.  A Study on Features for the Detection of Copy-Move Forgeries , 2010, Sicherheit.

[26]  Amjad Rehman,et al.  Improved quadtree image segmentation approach to region information , 2014 .

[27]  Yan Zhao,et al.  Digital Image Manipulation Forensics , 2015 .

[28]  Mznah Al-Rodhaan,et al.  Vision-Based Sign Language Classification: A Directional Review , 2014 .

[29]  Amjad Rehman,et al.  Medical Image Segmentation Methods, Algorithms, and Applications , 2014 .

[30]  Yan Zhao,et al.  Forensic Methods for Detecting Image Manipulation-Copy Move , 2015 .

[31]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[32]  H. Bauchner,et al.  A picture is worth a thousand words , 2002, BMJ : British Medical Journal.

[33]  Amjad Rehman,et al.  Digital Watermarking for Images Security using Discrete Slantlet Transform , 2014 .

[34]  Amjad Rehman,et al.  Evaluation of artificial intelligent techniques to secure information in enterprises , 2012, Artificial Intelligence Review.

[35]  Abdullah Bal,et al.  An effective detection algorithm for region duplication forgery in digital images , 2016, SPIE Defense + Security.

[36]  Chi-Man Pun,et al.  Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..

[37]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[38]  Rehan Ashraf,et al.  Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images , 2016 .

[39]  C. Mala,et al.  Comparative Study of Image Forgery and Copy-Move Techniques , 2012 .

[40]  S. B. Dhok,et al.  Digital Forensic of JPEG Images , 2014, 2014 Fifth International Conference on Signal and Image Processing.

[41]  Amjad Rehman,et al.  An overview of interactive wet cloth simulation in virtual reality and serious games , 2018, Comput. methods Biomech. Biomed. Eng. Imaging Vis..

[42]  Mznah Al-Rodhaan,et al.  An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization , 2015, EURASIP J. Adv. Signal Process..

[43]  Kumar Sunil,et al.  DCT-PCA Based Method for Copy-Move Forgery Detection , 2014 .

[44]  Min Wu,et al.  Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.

[45]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[46]  R. Belk Extended Self in a Digital World , 2013 .

[47]  T. Saba,et al.  Off-line cursive script recognition: current advances, comparisons and remaining problems , 2012, Artificial Intelligence Review.

[48]  Amjad Rehman,et al.  Features extraction for soccer video semantic analysis: current achievements and remaining issues , 2012, Artificial Intelligence Review.