CFP last date
20 May 2024
Reseach Article

Copy-Move Forgery Detection using DCT and SIFT

by Amanpreet Kaur, Richa Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 7
Year of Publication: 2013
Authors: Amanpreet Kaur, Richa Sharma
10.5120/11977-7847

Amanpreet Kaur, Richa Sharma . Copy-Move Forgery Detection using DCT and SIFT. International Journal of Computer Applications. 70, 7 ( May 2013), 30-34. DOI=10.5120/11977-7847

@article{ 10.5120/11977-7847,
author = { Amanpreet Kaur, Richa Sharma },
title = { Copy-Move Forgery Detection using DCT and SIFT },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 7 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number7/11977-7847/ },
doi = { 10.5120/11977-7847 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:17.285074+05:30
%A Amanpreet Kaur
%A Richa Sharma
%T Copy-Move Forgery Detection using DCT and SIFT
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 7
%P 30-34
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital images are the most prevalent way to spread a message. So the authenticity of images is very essential. But due to advancement of the technology the editing of images has become very effortless. Copy-move forgery is most basic technique to alter an image. In this one part of image is copied, called as snippet, and pasted within same image and most likely post-processing it. Considerable number of algorithms is proposed to detect different post-processing on snippet of image. In this paper novel approach is proposed to detect combination of different post-processing operations by single method. It is analyzed that block-based features method DCT is robust to Gaussian noise and JPEG compression, secondly the keypoint-based feature method SIFT is robust to rotation and scaling. Thus by combining SIFT and DCT we are able to detect forgery under post-processing operations of rotation, scaling, Gaussian noise, and JPEG compression and thus the efficiency to detect forgery improves.

References
  1. Redi Judith, Taktak Wiem, Dugelay Jean-Luc, "Digital image forensics: a booklet for beginners," Multimedia Tools and Applications, vol. 51, no. 1, pp. 133-162, 2011.
  2. J. Fridrich, D. Soukal, and J. Lukas. "Detection of Copy-Move Forgery in digital Images" Proceedings of Digital Forensic Research Workshop, 2003.
  3. A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Technical Report TR2004-515, Dartmouth College, 2004.
  4. W . Luo, J. Huang, and G. Qiu, "Robust Detection of Region Duplication Forgery in Digital Image," in Proceedings of the 18th International Conference on Pattern Recognition, vol. 4, pp. 746-749, 2006.
  5. G. Li, Q. Wu, D. Tu, and S. J. Sun, "A sorted neighbourhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proceedings of IEEE ICME, Beijing, China, 2007.
  6. D. G. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 2, no. 60, pp. 91-110, 2004.
  7. I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, "A SIFT-based Forensic Method for Copy-Move Attack Detection and Transformation Recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011.
  8. V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An Evaluation of Popular Copy-Move Forgery Detection Approaches," IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1841-1854, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Digital image forensics copy-move forgery keypoint-based and block-based methods SIFT and DCT