Skip to main content
Log in

A passive technique for detecting copy-move forgeries by image feature matching

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the recent evolutions in the technologies various digital devices and image processing tools are available in the market. Consequently, crime rates are also proliferating in the developed and developing regions of the world. One such crime is the manipulation of digital image contents that can be achieved by using commercial and open-source image manipulation tools. The most widespread approach for image contents manipulation is the copy-move forgery. While crafting the copy-move forgeries (CMFs) it is often required to conceal undesired regions or duplicate desired regions in the image. Thus, forensic applications are needed to certify the contents of an image and to expose the manipulated areas. In this study, we are presenting a technique for detecting CMFs in digital images by image feature matching. The technique segments the suspected image into overlapping blocks and Tchebichef moments are computed for every block to characterize the manipulated regions of the image. Tchebichef moments are adopted because of their ability to represent image features more effectively as compared to other moments such as Legendre and Zernike moments. Each block of Tchebichef moments is further segmented into non-overlapping blocks and processed through singular values decomposition (SVD). To obtain a reduced size feature vector largest singular values of each sub-block are used that also enhanced the performance in the feature matching process. In the experiments standard databases namely, the DVMM Columbia University dataset, COVERAGE, and CoMoFoD are utilized to assess the performance of the proposed approach. The results conclusively demonstrate that the presented technique based on Tchebichef moments and SVD transcends the other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput & Applic 30:183–192

    Article  Google Scholar 

  2. Almohammad A, Ghinea G, Hierons RM (2009) JPEG steganography: a performance evaluation of quantization tables, in Advanced Information Networking and Applications, 2009. AINA'09. International Conference on, pp. 471–478.

  3. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. Information Forensics and Security, IEEE Transactions on 6:1099–1110

    Article  Google Scholar 

  4. Amerini I, Uricchio T, Ballan L, Caldelli R (2017) Localization of JPEG Double Compression Through Multi-Domain Convolutional Neural Networks, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 53–59

  5. Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of Keypoints. Information Forensics and Security, IEEE Transactions on 10:2084–2094

    Article  Google Scholar 

  6. Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Australian Journal of Forensic Sciences 49:281–307

    Article  Google Scholar 

  7. Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery," in Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on, pp. 1053–1056

  8. Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91:1759–1770

    Article  Google Scholar 

  9. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. Information Forensics and Security, IEEE Transactions on 7:1841–1854

    Article  Google Scholar 

  10. Columbia DVMM (2004) "Research lab: Columbia image splicing detection evaluation dataset," ed

  11. Cox IJ, Miller ML, Bloom JA, Honsinger C (2002) Digital watermarking vol. 53: Springer

  12. Elhaminia B, Harati A, Taherinia A (2019) A probabilistic framework for copy-move forgery detection based on Markov random field. Multimed Tools Appl:1–19

  13. Fadl SM, Semary NA (2017) Robust copy-move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57–65

    Article  Google Scholar 

  14. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7:868–882

    Article  Google Scholar 

  15. Fridrich AJ, Soukal BD, Lukáš AJ (2003) "Detection of copy-move forgery in digital images," in in Proceedings of Digital Forensic Research Workshop

  16. Gonzalez RC, Woods RE, Eddins SL (2004) Digital image processing using MATLAB: Pearson education India

  17. Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Computers & Electrical Engineering 62:448–458

    Article  Google Scholar 

  18. Hayati P, Potdar V, Chang E (2007) A survey of steganographic and steganalytic tools for the digital forensic investigator, in Workshop of Information Hiding and Digital Watermarking, pp. 1–12

  19. Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66

    Article  Google Scholar 

  20. Islam M, Shah M, Khan Z, Mahmood T, Khan MJ (2015) A New Symmetric Key Encryption Algorithm Using Images as Secret Keys, in Frontiers of Information Technology (FIT), 2015 13th International Conference on, pp. 1–5

  21. Kessler G (2004) An Overview of Steganography for the Computer Forensics Examiner. An edited version, issue of Forensic Science Communications, Technical Report, 6

  22. Khan A, Malik SA, Ali A, Chamlawi R, Hussain M, Mahmood MT, Usman I (2012) Intelligent reversible watermarking and authentication: hiding depth map information for< i> 3D</i> cameras. Inf Sci 216:155–175

    Article  Google Scholar 

  23. Khan Z, Shah M, Naeem M, Mahmood T, Khan SNA, Amin NU et al (2016) Threshold based steganography: a novel technique for improved payload and SNR. International Arab Journal of Information Technology 13:380–386

    Google Scholar 

  24. Khan S, Khan T, Mahmood T, Ahmad N (2016) Analysis of data hiding in R, G and B channels of color image using various number of LSBs, in Innovative Computing Technology (INTECH), 2016 Sixth International Conference on, pp. 270–274

  25. Lai Y, Huang T, Lin J, Lu H (2018) An improved block-based matching algorithm of copy-move forgery detection. Multimed Tools Appl 77:15093–15110

    Article  Google Scholar 

  26. Lee J-C (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334

    Article  Google Scholar 

  27. Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224:59–67

    Article  Google Scholar 

  28. Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2:142–172

    Google Scholar 

  29. Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4:46–56

    Google Scholar 

  30. Lin C, Lu W, Huang X, Liu K, Sun W, Lin H et al., (2018) Copy-move forgery detection using combined features and transitive matching, Multimed Tools Appl, pp. 1–16

  31. Liu Y, Guan Q, Zhao X, Cao Y (2018) Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks, in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 85–90

  32. Mahmood T, Nawaz T, Irtaza A, Ashraf R, Shah M, Mahmood MT (2016) Copy-move forgery detection technique for forensic analysis in digital images. Math Probl Eng 2016:1–13

    Article  Google Scholar 

  33. Mahmood T, Nawaz T, Mehmood Z, Khan Z, Shah M, Ashraf R (2016) Forensic analysis of copy-move forgery in digital images using the stationary wavelets, in Innovative Computing Technology (INTECH), 2016 Sixth International Conference on, pp. 578–583

  34. Mahmood T, Irtaza A, Mehmood Z, Mahmood MT (2017) Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int 279:8–21

    Article  Google Scholar 

  35. Mahmood T, Mehmood Z, Shah M, Khan Z (2018) An efficient forensic technique for exposing region duplication forgery in digital images. Appl Intell 48:1791–1801

    Article  Google Scholar 

  36. Mahmoud K, Abu-AlRukab A (2016) Copy-move forgery detection using Zernike and Pseudo Zernike moments. International Arab Journal of Information Technology 13:930–937

    Google Scholar 

  37. Mukundan R, Ong S, Lee PA (2001) Image analysis by Tchebichef moments. IEEE Trans Image Process 10:1357–1364

    Article  MathSciNet  Google Scholar 

  38. Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy–move image forgery detection using DCT. Iran Journal of Computer Science 2:89–99

    Article  Google Scholar 

  39. Pun C-M, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security 10:1705–1716

    Article  Google Scholar 

  40. Raju PM, Nair MS (2018) Copy-move forgery detection using binary discriminant features. Journal of King Saud University-Computer and Information Sciences

  41. Rao CS, Babu ST (2016) Image Authentication Using Local Binary Pattern on the Low Frequency Components, in Microelectronics, Electromagnetics and Telecommunications, ed: Springer, pp. 529–537

  42. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images, in Information Forensics and Security (WIFS), 2016 IEEE International Workshop on, pp. 1–6

  43. Rehman A, Saba T, Mahmood T, Mehmood Z, Shah M, Anjum A (2018) Data hiding technique in steganography for information security using number theory, J Inf Sci, pp. 1–12

  44. Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using zernike moments, in 12th International Conference on Information Hiding, pp. 51–65

  45. Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Applic 21:291–306

    Article  MathSciNet  Google Scholar 

  46. Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32

    Article  Google Scholar 

  47. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—New database for copy-move forgery detection, in ELMAR, 2013 55th international symposium, pp. 49–54

  48. Uliyan DM, Jalab HA, Wahab AWA, Shivakumara P, Sadeghi S (2016) A novel forged blurred region detection system for image forensic applications. Expert Syst Appl 64:1–10

    Article  Google Scholar 

  49. Uliyan DM, Jalab HA, Abdul Wahab AW, Sadeghi S (2016) Image region duplication forgery detection based on angular radial partitioning and Harris key-points. Symmetry 8:1–19

    Article  MathSciNet  Google Scholar 

  50. Wen B, Zhu Y, Subramanian R, Ng T-T, Shen X, Winkler S (2016) Coverage-a novel database for copy-move forgery detection, in IEEE International Conference on Image processing, pp. 161–165

  51. Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: Detecting copy-move image forgery with source/target localization, in Proceedings of the European Conference on Computer Vision (ECCV), pp. 168–184

  52. Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9543–9552

  53. Yao Y, Shi Y, Weng S, Guan B (2017) Deep learning for detection of object-based forgery in advanced video. Symmetry 10:3

    Article  Google Scholar 

  54. Zhang Z, Wang D, Wang C, Zhou X (2017) Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors, KSII Transactions on Internet & Information Systems, vol. 11

  55. Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158–166

    Article  Google Scholar 

  56. Zhong J, Gan Y, Young J, Huang L, Lin P (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimed Tools Appl 76:14887–14903

    Article  Google Scholar 

  57. Zhou J, Ni J, Rao Y (2017) Block-Based Convolutional Neural Network for Image Forgery Detection, in International Workshop on Digital Watermarking, pp. 65–76

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toqeer Mahmood.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mahmood, T., Shah, M., Rashid, J. et al. A passive technique for detecting copy-move forgeries by image feature matching. Multimed Tools Appl 79, 31759–31782 (2020). https://doi.org/10.1007/s11042-020-09655-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09655-2

Keywords

Navigation