CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Copy Move Forgery Detection on Digital Images

by Ruchita Singh, Ashish Oberoi, Nishi Goel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 9
Year of Publication: 2014
Authors: Ruchita Singh, Ashish Oberoi, Nishi Goel
10.5120/17211-7437

Ruchita Singh, Ashish Oberoi, Nishi Goel . Copy Move Forgery Detection on Digital Images. International Journal of Computer Applications. 98, 9 ( July 2014), 17-22. DOI=10.5120/17211-7437

@article{ 10.5120/17211-7437,
author = { Ruchita Singh, Ashish Oberoi, Nishi Goel },
title = { Copy Move Forgery Detection on Digital Images },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 9 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number9/17211-7437/ },
doi = { 10.5120/17211-7437 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:25:45.759641+05:30
%A Ruchita Singh
%A Ashish Oberoi
%A Nishi Goel
%T Copy Move Forgery Detection on Digital Images
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 9
%P 17-22
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's scenario forging of the Digital images has become a common phenomena. The availability of low cost manipulation software also boost to this practice. The foremost practice of manipulating the digital images employed by the most forgerer is the copy move forgery. Copy move forgery is basically concerned with concealing or duplicating one region in an image by pasting certain portions of the same image on it. Numerous Algorithms are proposed to detect copy move forgery in digital images. In this paper an enhanced way to detect copy move forgery is proposed. It is analyzed that block based methods are secured against noise and JPEG compression where as feature based methods are robust to the rotation and scaling operations . The proposed approach use both block based method and feature based method to increase the accuracy rate of forgery detection. The Proposed method employed DCT and SIFT to extract features from image and matching those collected features to detect forgery on image and also perform the localization of the Forged Regions in the Digital Image.

References
  1. S. Ly u and H. Farid, "How realistic is p hotorealistic?", IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 845–850, 2005.
  2. I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking. San Francisco, CA: Morgan Kaufmann, 2002.
  3. Ashima Gupta, Nisheeth Saxena and S. K. Vasistha, "Detecting Copy move Forgery using DCT," International Journal of Scientific and Research Publications, Vol 3(5), ISSN 2250-3251, 2013.
  4. Hieu Cuong Nguyen and Stefan Katzenbeisser, "Detection of copy move forgery in Digital images using Radon transformation and phase correlation," Eighth InternationalConference on Intelligent information hiding and Multimedia Signal Processing, IEEE, pp. 134-137, 2012
  5. A. C. Popescu and H. Farid, "Exposing Digital Forgeries by Detecting Duplicated Image Regions," Technical Report, TR2004-515, Department of computer Science, Darmouth College, pp. 758-767, 2006
  6. Swapnil H. Kudke, A. D. Gawande, "Copy-Move Attack Forgery Detection by Using SIFT," International Journal of Innovative Technology and Engineering (IJITEE), Vol. (5), ISSN 2278-3075, 2013
  7. B. L. Shivakumar and Lt. Dr. S. Santhosh Baboo, "Detection of Region Duplication Forgery in Digital Images Using SURF," International Journal of computer science Issues, Vol. 8(4), ISSN 1694-0814, 2011
  8. I. Amerini,L. Ballan,R. Caldelli,A. D. Bimbo,and G. Serra, "A SIFT-based Forensics Method for Copy-Move Attack Detection and Transformation Recovery," IEEE Transaction on Information Forensics and Security, Vol. 6, no. 3, pp. 1099-1110, 2011.
  9. V. Christlein,C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An Evaluation of popular Copy-Move Forgery Detection Approaches," IEEE Transactions on Information Forensicsand Security, Vol. 7, pp. 1841-1854, 2012
  10. Preeti Yadav, Yogesh Rathore and Aarti Yadu, "DWT Based Copy-Move Image Forgery Detection," International Journal of Advanced Research in Computer Science and Electronics Engineering, Vol. 1(5), ISSN 2277-9043, 2012.
  11. B. L. Shivakumar and Dr. S. Santhosh Baboo, "Automated Forensics Method for Copy- MoveForgery Detection based on Harris Interest Points and Sift Descriptors," International Journal of Computer Applications, Vol. 27(3), pp. 0975-8887, 2011.
  12. Nattapol Chaitawittanun, "Detection of Copy-Move Forgery by Clustering Technique," International Conference on Image, Vision and Computing, Vol. 50(10), pp-3948-3959, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Forgery DCT SIFT Copy-Move Block-Based Method Feature-Based Method.