Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Non-Overlapping Block-based Parametric Forgery Detection Model

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Kusam Sharma, Pawanesh Abrol
10.5120/ijca2016907773

Kusam Sharma and Pawanesh Abrol. Article: Non-Overlapping Block-based Parametric Forgery Detection Model. International Journal of Computer Applications 133(3):17-24, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Kusam Sharma and Pawanesh Abrol},
	title = {Article: Non-Overlapping Block-based Parametric Forgery Detection Model},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {3},
	pages = {17-24},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Modification of a digital image by adding or removing some of its elements using a wide variety of image processing tools results in image forgery. As a result authentication of originality of a digital image is becoming a challenging task. Copy-paste forgery is one of the forgeries belonging to context based forgery. Copy-Paste Forgery Detection (CPFD) aims at finding regions that have been copied and pasted within the same or different image. A small change in the image may change statistical parameters that can be analysed for initial assessment of the forgery. In the present research study, a parametric forgery detection model using non-overlapping block-based technique is developed to ascertain the copy-paste forgery in a given digital image. Statistical parameters of the input image are computed, analysed and compared with those of the forged image. The results show that the proposed model identifies the forged area of the given image and works well with low to moderate copy-paste forgery. The results obtained can be used as the initial verification of the images for forgery and to enhance the forgery detection process by identifying most likely cases of possible image forgeries. The proposed model is tested with large domain of images having different dimensions and for detecting forgery within an image. However, the model has limitations with certain geometrical transformations.

References

  1. Kusam, P. Abrol and Devanad, “Digital Tampering Detection Techniques: A Review”, BVICAM’s International Journal of Information Technology, vol. 1, no. 2, pp. 125-132, 2009.
  2. A. Sharma and P. Abrol, “Eye Gaze Techniques for Human Computer Interaction: A Research Survey”, International Journal of Computer Applications, vol. 71, no. 9, pp. 18-29, May 2013.
  3. V. Kumar and P. Gupta, “Importance of statistical measures in digital image processing”, International Journal of Emerging Technology and Advanced Engineering, vol. 2, Aug. 2012.
  4. Tajrobekar, M. 2014. Where must we use variance and mean of image? Available online at:. http://www.researchgate.net/post/ Where_must_we_use_variance_and_mean_of_image.
  5. Wegmuller, M., Weid, J.P., Oberson, P. and Gisin, N. 2000. High resolution fiber distributed measurements with coherent OFDR. In Proc. ECOC’00, paper 11.3.4, p. 109.
  6. Statistics: Standard deviation Available online at:. http://www.khanacademy.org/math/probability/descriptive-statistics/ variance_std_deviation/v/statistics-standard-deviation.
  7. Wheeler, D.J. 2011. Problems with Skewness and Kurtosis, Part One. Available online at:. http://www.qualitydigest.com/inside/ quality-insider-article/problems-skewness-and-kurtosis-part-one.html.
  8. Wheeler, D.J. 2011. Problems with Skewness and Kurtosis, Part Two. Available online at:. http://www.qualitydigest.com/inside/ quality-insider-article/problems-skewness-and-kurtosis-part-two.html.
  9. Wu, Q., Wang, S. and Zhang X. 2010. Detection of image region-duplication with rotation and scaling tolerance. Computational Collective Intelligence, Technologies and Applications - Second International Conference, ICCCI, Part I, vol. 6421, pp. 100-108.
  10. Pan, X. and Lyu, S. 2010. Region duplication detection using image feature matching. IEEE Transactions of Information Forensics and Security, vol. 5, no. 4, pp. 857-867.
  11. B. L. Shivakumar and S. S. Baboo, “Detection of region duplication forgery in digital images using SURF”, International Journal of Computer Science Issues, vol. 8, no. 1, pp. 199-205, Jul. 2011.
  12. Kang, L. and Cheng, X. 2010. Copy-move forgery detection in digital image. IEEE 3rd International Congress on Image and Signal Processing, vol.5, pp. 2419-2421.
  13. Li, G., Wu, Q., Tu, D. and Sun, S. 2007. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. IEEE International Conference on Multimedia and Expo, pp. 1750-1753.
  14. D. Sharma and P. Abrol, “Investigating the Extent of Noise in Digital Images using SVD”, International Journal of Software and Web Sciences, vol. 4, no. 1, pp. 6-14, May 2013.
  15. M. Zimba and S. Xingming, “DWT-PCA (EVD) based copy-move image forgery detection”, International Journal of Digital Content Technology and its Applications, vol. 5, no. 1, pp. 251-258, Jan. 2011.
  16. Muhammad, N., Hussain, M., Muhamad, G. and Bebis, G. 2011. A Non-Intrusive Method for Copy-Move Forgery Detection. ISVC, Part II, LNCS, Springer-Verlag, vol. 6939, pp. 516-525.
  17. Bayram, S., Sencar, H. T. and Memon, N. 2009. An efficient and robust method for detecting copy-move forgery. Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1053-1056.
  18. Lin, H. J., Wang, C.W. and Kao, Y.T. 2009. Fast copy–move forgery detection. WSEAS Transactions on Signal Processing, vol. 5, no. 5, pp. 188–197.
  19. Wang, X., Zhang, X., Li, Z. and Wang, S. 2011. A DWT-DCT based passive forensics method for copy-move attacks. IEEE Third International Conference on Multimedia Information Networking and Security, Nov. 2011, pp. 304-308.
  20. Y. Huang, W. Lu and D. Long, “Improved DCT-based detection of copy-move forgery in images”, Elsevier, Forensic Science International, vol. 206, issues 1-3, pp. 178-184, March 2011.
  21. Pan, X., Zhang, X. and Lyu, S. 2011. Exposing image forgery with blind noise estimation. Proceedings of the 13th ACM multimedia workshop on Multimedia and Security, pp. 15-20.
  22. B. Mahdian and S. Saic, “Using noise inconsistencies for blind image forensics”, Elsevier, Image and Vision Computing, vol. 27, issue 10, pp. 1497-1503, Sept. 2009.
  23. Fridrich, J., Soukal, D. and Lukáš, J. 2003. Detection of copy-move forgery in digital images. In Proceedings of Digital Forensic Research Workshop, Cleveland OH, USA.
  24. J. Zhao and J. Guo, “Passive forensics for copy-move image forgery using a method based on DCT and SVD”, Elsevier, Forensic Science International, vol. 233, issues 1-3, pp. 158-166, Dec. 2013.
  25. Luo, W., Huang, J. and Qiu, G. 2006. Robust Detection of Region Duplication Forgery in Digital Images. In Proceedings of the 18th International Conference on Pattern Recognition, vol. 4, pp. 746-749.
  26. Ardizzone, E., Bruno, A. and Mazzola, G. 2010. Copy-move forgery detection via Texture Description. Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp. 59-64.
  27. S. Khan and A. Kulkarni, “An efficient method for detection of copy-move forgery using Discrete Wavelet Transform”, International Journal on Computer Science and Engineering, vol. 2, no. 5, pp. 1801-1806, 2010.
  28. A.M. Sundaram and C. Nandini, “Feature based image authentication using symmetric surround saliency mapping in image forensics”, International Journal of Computer Applications, vol. 104, no. 13, pp. 43-51, October 2014.
  29. Popescu, A. C. and Farid, H. 2004. Exposing digital forgeries by detecting duplicated image regions. Technical Report. Department of Computer Science, Dartmouth College.
  30. Dattatherya, S.V. Chalam and M.K. Singh, “A generalized image authentication based on statistical moments of color histogram”, ACEEE International Journal on Recent Trends in Engineering and Technology, vol. 8, no. 1, Jan 2013.
  31. Zhang, J., Feng, Z. and Su, Y. 2008. A new approach for detecting copy-move forgery in digital images, 11th IEEE International Conference on Communication Systems, pp. 362-366.
  32. Zhang, Z., Yu, Z. and Su, B. 2010. Detection of composite forged image. IEEE International Conference on Computer Application and System Modeling, vol.11, pp. 572-576.

Keywords

Copy-paste forgery, Block-based forgery detection techniques, Non-overlapping block-based techniques.