Skip to main content
Log in

Image forensics using color illumination, block and key point based approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Every individual is keen to exhibit socialism and connectedness posting their personal photos and videos on several social websites. Thus, it has become literally easy for the onlookers to see and modify their photos and videos. Here the concept enumerates in picture as image forensics, whereby it is possible to examine the authenticity and genuineness of photograph and video into consideration. In addition to this, nowadays photograph and videos are considered as a firm and valid proof in the court room for investigation, validation and judgement. Several experts are continuously working in an image forensic field to discover and develop better techniques for the detection of forgeries in image and videos. Detection of image forgeries is done in two ways. Firstly the forged image we are already familiar with is called active forgery detection technique and secondly, where we don’t know the forgery, then is referred to as the passive forgery detection technique. Passive technique is incorporated to detect forgery in this paper where hybridization is used. We have used DWT, color illumination Algorithm, SLIC Algorithm; SIFT Algorithm, Correlation Coefficient Map generation Algorithm, Block Matching Threshold Algorithm and Feature Extraction Algorithm for the detection and ramifying forgeries. The novelty of the proposed hybrid technique is the use of color illumination which detect image edges and trace them correctly to detect forged region. We have tested 48 images from database and find out image forgery detection at image level with Precision = 97. 25%; Recall = 100% and F1 = 98. 53%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abdul Wahab AW, Aminu Bagiwa M, Idna Idris MY, Khan S, Razak Z (2014) Passive Video Forgery Detection Techniques: A Survey. IEEE International Conference on Information Assurance and Security (lAS) 29–34

  2. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Security 6(3):1099–1110. https://doi.org/10.1109/TIFS.2011.2129512

    Article  Google Scholar 

  3. Ansari MD, Ghrera SP, Tyagi V (2014) Pixel-Based Image Forgery Detection: A Review. IETE Journal of Education 55(1):40–46

    Article  Google Scholar 

  4. Anuja Dixit J, Gupta RK (2016) Copy Move Image Forgery Detection using Frequency based Techniques: A Review. International Journal of Signal Processing, Image Processing and Pattern Recognition 9(3):71–88

    Article  Google Scholar 

  5. Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Transactions on Image Processing. PP(99):1–40. https://doi.org/10.1109/TIP.2010.2046599

  6. Bashar MK, Noda K, Ohnishi N, Mori K (2016) Exploring Duplicated Regions in Natural Images. IEEE Trans Image Process 99:1–40

    Google Scholar 

  7. Bayram S, Sencar HT, Memon N (2009) An Efficient and Robust Method for Detecting Copy Move Forgery. Acoustics, Speech and Signal Processing. https://doi.org/10.1109/ICASSP.2009.4959768

  8. Birajdara GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Elsevier, Digital Investigation 10:226–245

    Article  Google Scholar 

  9. Bo X, Junwen W, Guangjie I, Yuewei D (2010) Image copy move forgery detection based on SURF. In Proc. Int. Conf. Multimedia Inf. Netw. Secur pp. 889–892. https://doi.org/10.1109/MINES.2010.189

  10. Bravo Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In Proc. IEEE Int. Conf. Acoust., Speech, Signal Process pp. 1880–1883. https://doi.org/10.1109/ICASSP.2011.5946873

  11. de Carvalho TJ, Riess C, Pedrini H, de Rezende Rocha A (2013) Exposing Digital Image Forgeries by Illumination Color Classification. IEEE Transactions On Information Forensics And Security 8(7):1182–1194

    Article  Google Scholar 

  12. Carvalho T, Faria FA, Pedrini H (2016) Illuminant-Based Transformed Spaces for Image Forensics. IEEE transactions on information forensics and security 11(4):720–733

    Article  Google Scholar 

  13. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy move forgery detection approaches. IEEE Trans Inf Forensics Security 7(6):1841–1854

    Article  Google Scholar 

  14. Dhania VS, Harish Binu KP (2016) Exposing Digital Image Forgeries Using Feature Extraction and Adaptive Over Segmentation International Journal of Innovative Research in Science. Eng Technol 5(8):14723–14729

    Google Scholar 

  15. Fridrich J, Soukal D, Lukas J (2003) Detection of copy-move forgery in digital images. In Proc. of the Digital Forensic Research Workshop pp. 55–61

  16. Ghorbani M, Firouzmand M, Faraahi A (2011) DWT-DCT (QCD) based copymove image forgery detection. In Proc. of the 18th International Conference on Systems, Signals and Image Processing pp. 1–4

  17. Guohui LI, Qiong WI, Dan TI, SunI S (2007) A Sorted Neighborhood Approach For Detecting Duplicated Regions In Image Forgeries Based On Dwt And Svd. IEEE International Conference on Multimedia and Expo:1750–1753. https://doi.org/10.1109/ICME.2007.4285009

  18. Hassaballah M, Abdelmgeid AA, Alshazly HA (2016) Image Features Detection, Description and Matching. In: Image Feature Detectors and Descriptors. Studies in Computational Intelligence 630:11–45

    Google Scholar 

  19. Luo W, Huang J (2006) Robust Detection of Region Duplication Forgery in Digital Image. 18th International Conference on Pattern Recognition (ICPR'06) 4:746–749. https://doi.org/10.1109/ICPR.2006.1003

    Google Scholar 

  20. Mahdian B, Saic S (2007) Detection of copy move forgery using a method based on blur moment invariants. Elsevier, Forensic Science International 171:180–189

    Article  Google Scholar 

  21. Muhammad G, Hussain M, Khawaji K, Bebis G (2011) Blind copy move image forgery detection using dyadic undecimated wavelet transform. In Proc. of the 17th International Conference on Digital Signal Processing. https://doi.org/10.1109/ICDSP.2011.6004974

  22. Nguyen HC, Katzenbeisser S (2012) Detection of copy-move forgery in digital images using radon transformation and phase correlation. In Proc. of the 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing pp. 134–137. https://doi.org/10.1109/IIH-MSP.2012.38

  23. Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Security 5(4):857–867. https://doi.org/10.1109/TIFS.2010.2078506

    Article  Google Scholar 

  24. Pun CM, Yuan X-C, Bi X-L (2015) Image Forgery Detection Using Adaptive Over segmentation and Feature Point Matching. IEEE Transactions On Information Forensics And Security 10(8):1705–1716

    Article  Google Scholar 

  25. Redi JA, Taktak W, Dugelay J-L (2010) Digital image forensics: a booklet for beginners. Multimed Tools Appl Springer 51:133–162

    Article  Google Scholar 

  26. Sekeh MA, Maarof MA, Rohani MF, Mahdian B (2013) Efficient image duplicated region detection model using sequential block clustering. Digit Investig 10:73–84

    Article  Google Scholar 

  27. Shivkumar BL, Baboo SS (2011) Detection of region duplication forgery in image using SURF. IJCSI Int J Comput Sci 8(4):199–205

    Google Scholar 

  28. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD - New Database for Copy Move Forgery Detection. 55th International Symposium, ELMAR. IEEE, Zadar, pp 49–54

  29. Upase SG, Kuntawar SV (2016) Copy-Move Detection of Image Forgery by using DWT and SIFT Methodologies. Int J Comput Appl 148(7):37–39

    Google Scholar 

  30. Wang J, Liu G, Li H, Dai Y, Wang Z (2009) Detection of image region duplication forgery using model with circle block. In Proc. Int. Conf. Multimedia Inf. Netw. Secur. Pp. 25–29. https://doi.org/10.1109/MINES.2009.142

  31. Wang JW, Liu GJ, Zhang Z, Dai YW, Wang ZQ (2009) Fast and robust forensics for image region duplication forgery. Acta Automat Sin 35(12):1488–1495

    Article  Google Scholar 

  32. Wang Y, Gurule K, Wise J, Zheng J (2012) Wavelet based region duplication forgery detection. In Proc. of the 9th International Conference on Information Technology pp. 30–35, https://doi.org/10.1109/ITNG.2012.13

  33. van de Weijer J, Gevers T, Gijsenij A (2007) Edge based color constancy. IEEE Trans Image Process 16(9):2207–2214. https://doi.org/10.1109/TIP.2007.901808

    Article  MathSciNet  Google Scholar 

  34. XiaoBing KANG, ShengMin WEI (2008) Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics. International Conference on Computer Science and Software Engineering 3:926–930. https://doi.org/10.1109/CSSE.2008.876

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neeru Jindal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakur, A., Jindal, N. Image forensics using color illumination, block and key point based approach. Multimed Tools Appl 77, 26033–26053 (2018). https://doi.org/10.1007/s11042-018-5836-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5836-5

Keywords

Navigation