Comparative study of copy-move forgery detection techniques

Digital images and their applications gained a huge interest around the world in several fields like newspapers, social media, defaming persons, and courts. There are two types of digital image authentication. The first type is active authentication, which uses digital signature and image watermarks. These techniques have certain constraints such as knowing the content of the digital image. They need special equipment like cameras and development software. The second type is passive authentication, which is used to detect digital image forgeries represented in image cloning, image splicing, image resampling, image retouching, and image morphing. Passive authentication has an advantage of not needing any previous knowledge of the image content to detect the forgery. Copy-move forgery is the most famous type, and it is widespread in all image forgeries. Copy-move forgery is easy to perform and the forged part has the same properties of the whole image that makes it difficult to detect. There are many algorithms used to detect copy-move forgery attacks depending on different techniques. This paper covers the directions of copy-move forgery detection and gives a wide coverage of earlier copy-move forgery detection algorithms and techniques.

[1]  Sanjay Kumar Singh,et al.  Fast and robust passive copy-move forgery detection using SURF and SIFT image features , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).

[2]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[3]  S. Mozaffari,et al.  Copy-move forgery detection using multiresolution local binary patterns. , 2013, Forensic science international.

[4]  Thuong Le-Tien,et al.  A survey on Image Forgery Detection techniques , 2015, The 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF).

[5]  Ghazali Sulong,et al.  A SURVEY OF COPY-MOVE FORGERY DETECTION TECHNIQUES , 2014 .

[6]  Jichang Guo,et al.  Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.

[7]  Mohammadali Khosravifard,et al.  Mutual Information-Based Image Template Matching with Small Template Size , 2011, 2011 7th Iranian Conference on Machine Vision and Image Processing.

[8]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[9]  A. Piva An Overview on Image Forensics , 2013 .

[10]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Sami Bourouis,et al.  Copy-move image forgery detection based on SIFT descriptors and SVD-matching , 2014, 2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[12]  Chi-Man Pun,et al.  A SIFT and local features based integrated method for copy-move attack detection in digital image , 2013, 2013 IEEE International Conference on Information and Automation (ICIA).

[13]  Sunil Kumar,et al.  A fast DCT based method for copy move forgery detection , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[14]  Roberto Caldelli,et al.  Exploiting perceptual quality issues in countering SIFT-based Forensic methods , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Li Kang,et al.  Copy-move forgery detection in digital image , 2010, 2010 3rd International Congress on Image and Signal Processing.

[16]  James F. O'Brien,et al.  Exposing Photo Manipulation from Shading and Shadows , 2014, ACM Trans. Graph..

[17]  Hany Farid,et al.  Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[18]  Mauro Barni,et al.  Forensic Analysis of SIFT Keypoint Removal and Injection , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Noura A. Semary,et al.  A proposed accelerated image copy-move forgery detection , 2014, 2014 IEEE Visual Communications and Image Processing Conference.

[20]  Osamah M. Al-Qershi,et al.  Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.

[21]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[22]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[23]  Muhammad Ghulam,et al.  Comparison between WLD and LBP descriptors for non-intrusive image forgery detection , 2014, 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings.

[24]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[25]  A. Laub,et al.  The singular value decomposition: Its computation and some applications , 1980 .

[26]  R. Borse,et al.  Employing SVD and Wavelets for Digital Image Forensics and Tampering Detection , 2012, 2012 International Conference on Advances in Mobile Network, Communication and Its Applications.

[27]  Ajaz Hussain Mir,et al.  Forgery detection using statistical features , 2014, 2014 Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH).

[28]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[29]  Q. Ruan,et al.  Combined SIFT and bi-coherence features to detect image forgery , 2014, 2014 12th International Conference on Signal Processing (ICSP).

[30]  Mustafa Ulutas,et al.  Image forgery detection using Color Coherence Vector , 2013, 2013 International Conference on Electronics, Computer and Computation (ICECCO).

[31]  Umesh Ghanekar,et al.  A Rotationally Invariant Texture Descriptor to Detect Copy Move Forgery in Medical Images , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.