Sunteți pe pagina 1din 3

ISSN: 2277 – 9043

International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
Volume 2, Issue 8, August 2013

Analysis of Copy-Move Image Forgery


Detection
Prof. Unmukh Datta, Chetna Sharma

Abstract— Image forgery detection systems have been II. COPY-MOVE IMAGE FORGERY
developed according to the conditions imposed by many
applications. Detecting forgery is related to the technique
Copy-Move Image forgery is mostly used to disappear some
used in forgery through the help of image processing tools. objects from the image by copying some part of the image
For this purpose the tampered images are followed by many and pasting that part on the other part of the same image.
steps in respect of forgery detection. Different types of image By doing so, it become hard to detect forgery with human
forgeries are seen nowadays. Therefore many forgery eyes because copied parts come from the same image. After
detection systems have exhibited in advancement of theses modification if retouching tool is also applied then it
image forgery fields. In this survey paper we have described becomes even hard to detect through technology. Therefore
recent development in the field of Copy-Move image forgery the detection systems are needed to be more efficient.
detection.
Index Terms— Image forgeries, Digital forensics, Copy-
Move forgery detection.

I. INTRODUCTION
Highlight a section that Digital Image Forgery is a very
important field in image processing. It is important because
digital images are used in many social areas like in courts
when they are used as evidence, medical imaging and
journalism. The availability of powerful software tools such
as Photoshop makes easy to manipulate the digital images.
Over the past ten years, the field of digital forensics has
proceeded in helping return some trust to digital images.
Different techniques for maintaining the integrity of digital
images have been developed. These techniques can be
divided into two groups: intrusive and non-intrusive. In
intrusive (active) techniques, some sort of signature
(watermark, extrinsic fingerprint) is embedded into a Fig1. An example of copy-image forgery [12]: a) Original
digital image, and authentication is done by verifying if the image b) Forged image
true signature matches the retrieved signature from the test An example of Copy-Move image forgery is given below
image. Non-intrusive techniques exploit different kinds of (Fig 1). In the figure, copy-move forgery is done on the
intrinsic fingerprints such as sensor noise of the capturing tower. If we see only Fig1 (b) image then the forgery cannot
device or image specific detectable changes for detecting be identified with human eyes. The main reason is that the
forgery. There are three types of image forgery; Copy- copied part belongs to the same image therefore mostly
Move, Image splicing and Image retouching. 1) In Copy- important properties are congruous with the rest of the
Move Forgery, one part of the image is copied and that part image. In copy-move image forgery the correlation between
is pasted on other part of the same image to cover an the copied and moved segment is to be detected.
important scene of the image. 2) In Image-Splicing, two
images are combined to create one tampered image. 3) In III. DETECTION TECHNIQUES OF COPY-MOVE IMAGE
Image Retouching the image is less modified. It just FORGERY
enhances some features of the image. Ethically it’s also So many techniques have been developed for the Copy-
wrong. move image forgery. These techniques employ different
algorithms. To detect forgery the techniques are divided in
two groups based on the algorithm used by them. One
algorithm is based on exact matching and other algorithm
 is based on approx matching. The first one is called
Manuscript received on 13 August, 2012.
Prof. Unmukh Datta, Computer Science and Engineering, M.P.C.T. exhaustive algorithm and the second one is called
Gwalior, India autocorrelation algorithm.
Chetna Sharma, Computer Science and Engineering, M.P.C.T.
Gwalior, India.
607
All Rights Reserved © 2013 IJARCSEE
ISSN: 2277 – 9043
International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
Volume 2, Issue 8, August 2013
IV. EXHAUSTIVE APPROACH and does not have a large computational complexity, it
Exhaustive approach is simplest approach of detection. In often fails to detect the forgery. The computational time
this approach the image and its circularly shifted depends upon factor such as number of blocks, sorting
translation are completely covered to find closely matching techniques and the number of feature. Different approaches
image segments. Assuming an gray image of scale M×N are applied for sorting and extracting features from blocks.
which has pixel value xij at position (i,j). Then according to Even different techniques for comparisons among these
exhaustive approach following differences are considered pairs of blocks is applied which can increase efficiency of
| xij – xi+k mod(M) j+l mod(N) |, k = 0, 1, …, M–1, l = 0, detection system.
1, …, N–1 for all i and j. Over last 10 years several approaches have been developed
For each circular shift [k,l], the differences Δxij = | xij – for detection systems of copy-move forgery. Success of
xi+k mod(M) j+lmod(N) |, are calculated. This method is these detection systems depends on many factors such as
computationally expensive and impractical for medium complexity, cost, accuracy and sensitivity. These Factors
sized images. The comparison and image processing affect performance of system. For these purposes following
require the order of MN operations for one quantities are calculated for each technique.
shift. Thus, the total computational requirements are TP (true positive): forged blocks declared forged
proportional to (MN)2. FP (false positive): genuine blocks declared forged
TN (true negative): genuine blocks declared genuine
V. AUTOCORRELATION APPROACH FN (false positive): forged blocks declared genuine
These quantities describe the effectiveness of copy-move
In autocorrelation approach the image is divided in forgery detection techniques.
overlapping blocks. The idea is to correlate copy and moved Results are then given in terms of sensitivity, specificity
image segment. For this purpose different techniques are and accuracy, computed as
applied. The distance between duplicated pair blocks would Sensitivity = TP / (TP + FN)
be same. From these blocks some features are extracted for Specificity = TN / (TN + FP)
the comparisons. Researchers use different features to Accuracy = (TN + TP ) / (TN + FP + TP + FN)
represent image blocks. These blocks are then sorted which measure, respectively, the ability to detect the
lexicographically manner for further detection. presence of forgery, the ability to confirm the absence of
forgery, and the overall classification accuracy, independent
of the nature of the blocks. On the basis of above features
the analysis of detection techniques is done.

VI. COPY-MOVE IMAGE FORGERY DETECTION WORK


First method for Copy-move forgery detection was
suggested by Fridrich et al. [1]. In this method firstly the
image was divided into overlapping segments and then
feature extraction of these blocks was done by applying
DCT. These blocks were then sorted lexicographically to
find the similarity.
After then A.C.Popescu et. al. [2] applied a principle
component analysis (PCA) on small fixed-size image to
yield a reduced dimension discrete cosine transform(DCT)
block representation. Each block was vectorized and matrix
was constructed. By finding the eigenvectors of the
covariance matrix, a new linear basis was obtained. Then
sorting the blocks lexicographically, duplicate regions are
detected. This method was robust to compression up to
JPEG quality level 50 and the time complexity of sorting
was O(32x k lg k) time.
Jing Zhang et al. [3] proposed an approach based on the
idea of pixel-matching to locate copy-move regions. In this
approach, DWT (Discrete Wavelet Transform) was applied
to the input image to yield a reduced dimension
representation. Then the phase correlation is computed to
estimate the spatial offset between the copied and the pasted
region. Pixel matching is done to locate copy-move region,
Fig. 2. Copy-Move image forgery detection system which is shifting the input image according to the spatial
configuration offset and calculating the difference between the image and
its shifted version. At the end, Mathematical Morphological
In figure 2 the autocorrelation approach is defined through Operations are used to remove isolated points so as to
its steps in a flow diagram. Although, this method is simple improve the location. The proposed technique has lower

608
All Rights Reserved © 2013 IJARCSEE
ISSN: 2277 – 9043
International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
Volume 2, Issue 8, August 2013

computational complexity and it is reasonably robust to 2. A. C. Popescu and H. Farid, “Exposing Digital
various types of Copy-Move post processing. Forgeries by Detecting Duplicated Image Regions,”
G. Li et. al. [4] proposed a method which reduced the time Technical Report, TR2004-515, Department of
complexity for sorting to O(8k lg k) time. The image was Computer Science, Dartmouth
decomposed into four sub-bands by applying discrete 3. Jing Zhang, Zhanlei Feng and Yuting Su, “A New
wavelet transform (DWT). The singular value Approach for Detecting Copy-Move Forgery in Digital
decomposition (SVD) was then applied on these blocks of Images”, in: IEEE Singapore International Conference
low-frequency component in wavelet sub-band to yield a on Communication Systems, Guangzhou, China, pp.
reduced dimension representation. Then matrix of SV 362-366, 2008
vectors is sorted lexicographically to detect duplicate 4. G. Li, Q. Wu, D. Tu, and S. Sun, “A Sorted
region. Neighborhood Approach for Detecting Duplicated
W. Luo et al. [5] suggested a method based on the pixel Regions in Image Forgeries based on DWT and SVD,”
block characteristics. The image was first divided into in Proceedings of IEEE International Conference on
small overlapped blocks and measured block characteristics Multimedia and Expo, Beijing China, July 2-5, 2007,
vector form each block. Then the possible duplicate region pp. 1750-1753.
was detected by comparing the similarity of the block. 5. W .Luo, J. Huang, and G. Qiu, “Robust Detection of
H. Huang et al. [6] presented a method to detect region Region Duplication Forgery in Digital Image,” in
duplication based on local image statistical features known Proceedings of the 18th International Conference on
as scale invariant features transform (SIFT). SIFT Pattern Recognition, Vol. 4, 2006, pp. 746-749.
descriptors of an image are invariant to changes in 6. H . Huang, W. Guo, and Y. Zhang, “Detection of Copy-
illumination, rotation, scaling etc. First the SIFT Move Forgery in Digital Images Using SIFT
descriptors of the image is extracted, and descriptors are Algorithm,” in Proceedings of IEEE Pacific-Asia
then matched between each other to seek for any possible Workshop on Computational Intelligence and
forgery in images. Even though this method enables to Industrial Application, Vol. 2, pp. 272-276, 2008.
detect duplication, this scheme still have a limitation on 7. B.L.Shivakumar and S.Santhosh Baboo, “Digital Image
detection performance since it is only possible to extract the Forgery Detection”, SAJOSPS, Vol. 10(2), pp. 116-
keypoints from peculiar points of the image 119, 2010
B.L. Shivakumar et al. [7], In this method Harris Interest 8. Ghulam Muhammad, Muhammad Hussain and George
Point detector was used to detect the corners along with Bebis, “ Passive copy-move image forgery detection
SIFT descriptors to detect copy - move forgery and then using dyadic undecimated wavelet transform”, Digital
KD-Tree was used for matching the features. This method Investigation 9 (2012) 49–57.
was not robust to rotation and noise. 9. B.L.Shivakumar, Lt. Dr. S.Santhosh Baboo, “Detecting
G. Muhammad et al. [8], recently presented a method in Copy-Move Forgery in Digital Images: A Survey and
which Dyadic wavelet transform is used. It is also shift Analysis of Current Methods”, Vol. 10 Issue 7 Ver. 1.0
invariant therefore more suitable. For feature extraction September 2010.
DCT is used and then Euclidian distance is calculated for 10. Davide Cozzolino, Giovanni Poggi, Carlo Sansone,
block matching so that copy-move region is located. This and Luisa Verdoliva, “A Comparative Analysis of
method is robust to rotation. Forgery Detection Algorithms”, G.L. Gimel’ farb et al.
(Eds.): SSPR & SPR 2012, LNCS 7626, pp. 693–700,
2012.
VII. CONCLUSION 11. Zhang, C., Zhang, H.: Exposing Digital Image
As copy-move forgeries have become very common Forgeries by Using Canonical Correlation Analysis. In:
nowadays. So the detection of such forgeries has become International Conference on Pattern Recognition
very important. So many techniques have been developed (ICPR), pp. 838–841(2010).
but still more robust forgery detection technique needed to 12. Somayeh Sadeghi, Hamid A. Jalab, and Sajjad
be developed. These techniques faces mainly three major Dadkhah, “Efficient Copy-Move Forgery Detection for
challenges: tampered images with compression, tampered Digital images”, World Academy of Science,
images with noise, and tampered images with rotation. We Engineering and Technology 71 2012.
have reviewed several research papers in this survey paper
to enlighten the development in the field of copy-move
forgery detection. This field is still growing and a lot of
research is needed to make Digital forensic more
promising.

REFERENCES
1. Fridrich, D. Soukal, and J. Lukás, “Detection of copy
move forgery in digital images,” in Proc. Digital
Forensic Research Workshop, Aug. 2003.

609
All Rights Reserved © 2013 IJARCSEE

S-ar putea să vă placă și