Image Forensic Investigation Using Discrete Cosine Transform-Based Approach

Digital image tempering is widespread because software and devices that manipulate image information are easily available for high-performance image editing. Now everything is online and digital images are presented as evidence of any event, documentation where forgery hides its traces. Existing techniques for forgery detection are based on the higher complexity of computational costs. The technique proposed is robust even with pre-and post-processing operations for automatic detection and localization of specific artifacts. A proposed methodology using the Discrete Cosine Transform technique was used to obtain features from each block of images that reduce the block dimension. Tampered blocks of images are compared with predefined threshold values based on robust parameters to detect similar blocks in reduced time. Experimental results show multiple forgery detection with low computational complexity and retained significance of image information. On several images that are affected by different forgery types, the proposed method acts robustly.

[1]  J. Daugman Two-dimensional spectral analysis of cortical receptive field profiles , 1980, Vision Research.

[2]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[3]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[4]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[5]  Xinpeng Zhang,et al.  Detection of Image Region-Duplication with Rotation and Scaling Tolerance , 2010, ICCCI.

[6]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[7]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[9]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[10]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[11]  M. Ulutas,et al.  A new copy move forgery detection technique with automatic threshold determination , 2016 .

[12]  Xiaochun Cao,et al.  Duplication Localization and Segmentation , 2010, PCM.

[13]  Wei Lu,et al.  Region duplication detection based on Harris corner points and step sector statistics , 2013, J. Vis. Commun. Image Represent..

[14]  Jen-Chun Lee,et al.  Copy-move image forgery detection based on Gabor magnitude , 2015, J. Vis. Commun. Image Represent..

[15]  Jichang Guo,et al.  Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.

[16]  I-Cheng Chang,et al.  A forgery detection algorithm for exemplar-based inpainting images using multi-region relation , 2013, Image Vis. Comput..

[17]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[18]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[20]  Jiwu Huang,et al.  A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[22]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[23]  Shinfeng D. Lin,et al.  An integrated technique for splicing and copy-move forgery image detection , 2011, 2011 4th International Congress on Image and Signal Processing.

[24]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[25]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[26]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[27]  Lihi Zelnik-Manor,et al.  SIFTpack: A Compact Representation for Efficient SIFT Matching , 2013, 2013 IEEE International Conference on Computer Vision.

[28]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[29]  Jiwu Huang,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[30]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[31]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[32]  C.G. Patil,et al.  Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[33]  Yang Wang,et al.  Wavelet Based Region Duplication Forgery Detection , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[34]  Nenghai Yu,et al.  Doctored JPEG image detection , 2008, 2008 IEEE International Conference on Multimedia and Expo.