CFP last date
20 June 2024
Reseach Article

Robust Copy Move Image Forgery Detection using Scale Invariant Features Transform

by Himanshu Goyal, Tarun Gulati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 10
Year of Publication: 2014
Authors: Himanshu Goyal, Tarun Gulati

Himanshu Goyal, Tarun Gulati . Robust Copy Move Image Forgery Detection using Scale Invariant Features Transform. International Journal of Computer Applications. 97, 10 ( July 2014), 14-19. DOI=10.5120/17042-7352

@article{ 10.5120/17042-7352,
author = { Himanshu Goyal, Tarun Gulati },
title = { Robust Copy Move Image Forgery Detection using Scale Invariant Features Transform },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 10 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { },
doi = { 10.5120/17042-7352 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:23:44.627350+05:30
%A Himanshu Goyal
%A Tarun Gulati
%T Robust Copy Move Image Forgery Detection using Scale Invariant Features Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 10
%P 14-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

Now a day's digital images are widely used as compared to analog images because of several advantages of digital data. Images are used as the information source, evidence in court, diagnosis problem in bio-medical and in various other applications. For the last few years, tampering of images become easier with manipulated software like adobe Photoshop . In this paper the problem of detecting copy-move image forensic is investigated and attention has been paid about which area of an image is copied and pasted onto another zone to create a duplication of an image. To detect this kind of tampering, methodology based on scale invariant features transform (SIFT) is used. Such a method allows both to understand if a copy-move attack has occurred but some time when two similar objects are present during the photography SIFT can't distinguish between them because SIFT are robust to illumination. But in this paper pixel intensity values are also used in forgery detection

  1. X. Shuai, C. Zhang and P. Hao, "Fingerprint indexing based on composite set of reduced SIFT features," in ICPR, Tampa,Florida, USA. , 2008
  2. H. Su, A. Bouridance and M. Gueham, "Local image features for shoeprint image retrieval," in BMVC, Warwick, UK, 2007.
  3. S. Lyu and X. Pan, "Detecting image region duplication using SIFT features," IEEE ICASSP, Dallas, USA, 2010.
  4. S. Bayram, H. T. Sencar and N. Memon, "A Survey of Copy-Move Forgery Detection Techniques," in IEEE Western New York Image Processing Workshop, New York, September 2008.
  5. J. Fridrich, D. Soukal and J. Lukas, "Detection of copy-move forgery in digital images," in DFRWS, Cleveland, OH.
  6. I. Amerini, L. Ballan, R. Caldelli and A. D. Bimbo, "A SIFT-based forensic method for copy-move attack detection and transformation recovery. ," IEEE transactions on information forensics and security, vol. 6, no. 1, Sep. 2011.
  7. D. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 60, no. 2, p. 91–110, 2004.
  8. K. Mikolajczyk and C. Schmid, "A performance evaluation of local descriptors," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 10, p. 1615–1630, 2005.
  9. S. Bayram , I. Avcibas , B. Sankur and N. Memon, Image manipulation detection with binary similarity measures, Antalya, Turkey: EUSIPCO, 2005.
  10. D. Brugioni, Photo Fakery:The History and Techniques of Photographic Deception and Manipulation. , Brassey's Inc, 1999.
  11. H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," IEEE CVPR Workshop on Statistical Analysis in Computer Vision, USA, 2003.
  12. H. Farid, "Creating and detecting doctored and virtual images," Implications to the child pornography prevention act, Hanover, New Hampshire. , 2004.
  13. K. Mikolajczyk, T. Tuytelaars, C. Schmid, A. Zisserman, J. Matas, F. Schaffalitzky, T. Kadir and L. V. Gool , "A comparison of affine region detectors," International Journal of Computer Vision, vol. 65, no. 1/2, p. 43–72, 2005.
  14. T. Hastie, R. Tibshirani and J. Friedman, The Elements of Statistical Learning. , California: Springer, 2003.
  15. M. Watanabe and S. Nayar, "Telecentric optics for computational vision. ," in Proceedings of the European Conference on Computer Vision, 1995.
Index Terms

Computer Science
Information Sciences


Digital image forensics copy-move attack EXIF SIFT Authenticity Verification.