CFP last date
20 May 2024
Reseach Article

DWT and SIFT based Passive Copy-Move Forgery Detection

by Lakhwinder Kaur Bhullar, Sumit Budhiraja, Anaahat Dhindsa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 23
Year of Publication: 2014
Authors: Lakhwinder Kaur Bhullar, Sumit Budhiraja, Anaahat Dhindsa
10.5120/16734-6935

Lakhwinder Kaur Bhullar, Sumit Budhiraja, Anaahat Dhindsa . DWT and SIFT based Passive Copy-Move Forgery Detection. International Journal of Computer Applications. 95, 23 ( June 2014), 14-18. DOI=10.5120/16734-6935

@article{ 10.5120/16734-6935,
author = { Lakhwinder Kaur Bhullar, Sumit Budhiraja, Anaahat Dhindsa },
title = { DWT and SIFT based Passive Copy-Move Forgery Detection },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 23 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number23/16734-6935/ },
doi = { 10.5120/16734-6935 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:20:12.761912+05:30
%A Lakhwinder Kaur Bhullar
%A Sumit Budhiraja
%A Anaahat Dhindsa
%T DWT and SIFT based Passive Copy-Move Forgery Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 23
%P 14-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the use of powerful image modifying softwares, image authenticity is a big question for image forensics. One can no longer believe what they see. When a section of image is copied, geometrically transformed and pasted at different spot onto the same image with the intention of concealing or hiding some important information, it is copy move forgery. In the past few years several techniques for copy-move forgery detection have been proposed. In this paper Discrete Wavelet Transform (DWT) have been used with Scale Invariant Feature transform (SIFT) for copy move image forgery detection. SIFT keypoint descriptors are extracted from the low frequency subband of the discrete wavelet transformed image. The extracted keypoints are grouped into clusters using either of the linkage methods (median, centroid or ward) and are matched to detect the forgery. Different wavelet bases with SIFT have been compared using True Positive Rate (TPR) and False Positive Rate (FPR) as the performance evaluation parameter along with the computation time on a wide range of forged and original image database.

References
  1. Birajdar, Gajanan K. , and Vijay H. Mankar. "Digital image forgery detection using passive techniques: A survey. " Digital Investigation 10. 3 (2013): 226-245.
  2. Al-Qershi, Osamah M. , and Bee Ee Khoo. "Passive detection of copy-move forgery in digital images: State-of-the-art. " Forensic science international 231. 1 (2013): 284-295.
  3. Wang, Xiaofeng, et al. "A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks. " Multimedia Information Networking and Security (MINES), 2011 Third International Conference on. IEEE, 2011.
  4. Huang, Yanping, et al. "Improved DCT-based detection of copy-move forgery in images. " Forensic science international 206. 1 (2011): 178-184.
  5. Ghorbani, Mehdi, Mohammad Firouzmand, and Ahmad Faraahi. "DWT-DCT (QCD) based copy-move image forgery detection. " Systems, Signals and Image Processing (IWSSIP), 2011 18th International Conference on. IEEE, 2011.
  6. , Sunil, Jagannath Desai, and Shaktidev Mukherjee. "A fast DCT based method for copy move forgery detection. " Image Information Processing (ICIIP), 2013 IEEE Second International Conference on. IEEE, 2013.
  7. Li, Leida, Shushang Li, and Jun Wang. "Copy-move forgery detection based on PHT. " Information and Communication Technologies (WICT), 2012 World Congress on. IEEE, 2012.
  8. Ketenci, Seniha, and Guzin Ulutas. "Copy-move forgery detection in images via 2D-Fourier Transform. " Telecommunications and Signal Processing (TSP), 2013 36th International Conference on. IEEE, 2013.
  9. Imamoglu, Mustafa Bilgehan, Guzin Ulutas, and Mustafa Ulutas. "Detection of copy-move forgery using Krawtchouk moment. " Electrical and Electronics Engineering (ELECO), 2013 8th International Conference on. IEEE, 2013.
  10. Detection of copy-move forgery image using Gabor descriptor. " Anti-Counterfeiting, Security and Identification (ASID), 2012 International Conference on. IEEE, 2012.
  11. Huang, Hailing, Weiqiang Guo, and Yu Zhang. "Detection of copy-move forgery in digital images using SIFT algorithm. " Computational Intelligence and Industrial Application, 2008. PACIIA'08. Pacific-Asia Workshop on. Vol. 2. IEEE, 2008.
  12. Ardizzone, Edoardo, Alessandro Bruno, and Giuseppe Mazzola. "Detecting multiple copies in tampered images. " Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE, 2010.
  13. Amerini, Irene, et al. "A SIFT-based forensic method for copy–move attack detection and transformation recovery. " Information Forensics and Security, IEEE Transactions on 6. 3 (2011): 1099-1110.
  14. Shivakumar, B. L. , and S. Santhosh Baboo. "Detection of Region Duplication Forgery in Digital Images Using SURF. " International Journal of Computer Science Issues (IJCSI) 8. 4 (2011).
  15. Christlein, V. , Riess, C. , Jordan, J. , & Angelopoulou, E. (2012). "An evaluation of popular copy-move forgery detection approaches. " Information Forensics and Security, IEEE Transactions on, 7(6), 1841-1854.
  16. Lowe, David G. "Distinctive image features from scale-invariant keypoints. " International journal of computer vision 60. 2 (2004): 91-110
Index Terms

Computer Science
Information Sciences

Keywords

SIFT Copy-move forgery invariant keypoint