CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images

by Resmi Sekhar, Chithra A. S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 8
Year of Publication: 2014
Authors: Resmi Sekhar, Chithra A. S
10.5120/15524-4331

Resmi Sekhar, Chithra A. S . Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images. International Journal of Computer Applications. 89, 8 ( March 2014), 28-33. DOI=10.5120/15524-4331

@article{ 10.5120/15524-4331,
author = { Resmi Sekhar, Chithra A. S },
title = { Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 8 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number8/15524-4331/ },
doi = { 10.5120/15524-4331 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:43.796317+05:30
%A Resmi Sekhar
%A Chithra A. S
%T Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 8
%P 28-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Photographs are taken as valid evidences in various scenarios of our day to day life. Because of the developments in the field of Image Processing, altering images according to ones need is not a difficult task. Techniques of Image Forensics play its crucial role at this juncture. One of the mostly found types of image tampering is Copy-Move forgery. A copy-move forgery is performed by copying a region in an image and pasting it on another region in the same image, mostly after some form of post-processing like rotation, scaling, blurring, noise addition, JPEG compression etc. Two types of copy-move forgery detection techniques exist in literature. They are the Block based methods and Key-point based methods. Both the methods have their own advantages and limitations. This paper presents a survey on the recent developments in block based methods.

References
  1. Judith Redi, Wiem Taktak, Jean-Luc Dugelay: Digital image forensics: a booklet for beginners. Multimedia Tools Appl. 51(1): 133-162 (2011).
  2. Pravin Kakar "Passive Approaches for Digital Image Forgery Detection", Ph. D. Dissertation, School of Computer Engineering, Nanyang Technological University, Singapore, 2012.
  3. I. Amerini et al, "Copy-move forgery detection and localization by means of robust clustering with J-Linkage", Signal Processing: Image Communication 28, 2013.
  4. Christlein V, C Riess , C Riess, E Angelopoulou, J Jordan, "An Evaluation of Popular Copy-Move Forgery Detection Approaches", IEEE Trans on Information Forensica and Security, Vol 7 No 6, Dec 2012.
  5. H . T Sencar, N. D Memon, "Digital Image Forensics: There is More to a Picture Than Meets the Eye", springer , 2013.
  6. J. Fridrich, B. Soukal, and A. Lukáš, "Detection of copy-move forgery in digital images", in Proc. Digital Forensic Res. Workshop, 2003
  7. A. Popescu, H. Farid, "Exposing digital forgeries by detecting duplicated image regions", Dept. Comput. Sci. , Dartmouth College, Tech. Rep. TR2004-515, 2004.
  8. S. Ryu, M. Lee, H. Lee, "Detection of copy-rotate-move forgery using zernike moments," in Proc. Int. Workshop Information Hiding, Springer , pp. 51–65, 2010.
  9. Christlein V, C Riess, E Angelopoulou, "On rotation invariance in copy-move forgery detection ", IEEE International Workshop on Information Forensics and Security (WIFS), 2010.
  10. S. Bravo-Solorio, A. K. Nandi, "Exposing Duplicated Regions Affected by Reflection, Rotation and Scaling," in International Conference on Acoustics, Speech and Signal Processing, May 2011.
  11. Muhammad, G. , Hussain, M. , Bebis, G. , "Passive copy move image forgery detection using undecimated dyadic wavelet transform", Digital Investigation (9), 2012.
  12. Mahdian B, Saic S. , "Detection of copy-move forgery using a method based on blur moment invariants", Forensic Science International 2007.
  13. Li G, Wu Q, Tu D, Sun S. "A sorted neighborhood approach detecting duplicated forgeries based on DWT and SVD", In: Proc. ICME 2007.
  14. Cao Y, Gao T, Fan L, Yang Q. , "A robust detection algorithm for copy-move forgery in digital images", Forensic Sci Int. 2012 Jan.
  15. Huang Y, Lu W, Sun W, Long D, "Improved DCT-based detection of copy-move forgery in images", Forensic Science International 206 (1–3) 2011.
  16. S. Bayram, H. T. Sencar, N. Memon, "An ef?cient and robust method for detecting copy-move forgery", in: IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE Press, New York, 2009.
  17. Zhong L, Xu W, "A robust image copy-move forgery detection based on mixed moments", IEEE International Conference on Software Engineering and Service Sciences (ICSESS), 2013 May.
  18. Li L, Li S, Zhu H, Wu X. "Detecting copy-move forgery under affine transforms for image forensics", Comput Electr Eng (2013), http://dx. doi. org/10. 1016/j. compeleceng. 2013. 11. 034.
  19. I-Cheng Chang, J. Cloud Yu, Chih-Chuan Chang, "A forgery detection algorithm for exemplar-based inpainting images using multi-region relation", Image and Vision Computing 31, 2013.
  20. A. Criminisi, P. Perez, K. Toyama, Region filling and object removal by exemplar-based image inpainting, IEEE Trans. Image Process. 2004.
  21. L Gavin, S Frank, L Hong-Yuan Markl, "An efficient expanding block algorithm for image copy-move forgery detection", Information Sciences 239, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Image Forgery Copy-move forgery detection Block-Based methods