Abstract
Due to the recent evolutions in the technologies various digital devices and image processing tools are available in the market. Consequently, crime rates are also proliferating in the developed and developing regions of the world. One such crime is the manipulation of digital image contents that can be achieved by using commercial and open-source image manipulation tools. The most widespread approach for image contents manipulation is the copy-move forgery. While crafting the copy-move forgeries (CMFs) it is often required to conceal undesired regions or duplicate desired regions in the image. Thus, forensic applications are needed to certify the contents of an image and to expose the manipulated areas. In this study, we are presenting a technique for detecting CMFs in digital images by image feature matching. The technique segments the suspected image into overlapping blocks and Tchebichef moments are computed for every block to characterize the manipulated regions of the image. Tchebichef moments are adopted because of their ability to represent image features more effectively as compared to other moments such as Legendre and Zernike moments. Each block of Tchebichef moments is further segmented into non-overlapping blocks and processed through singular values decomposition (SVD). To obtain a reduced size feature vector largest singular values of each sub-block are used that also enhanced the performance in the feature matching process. In the experiments standard databases namely, the DVMM Columbia University dataset, COVERAGE, and CoMoFoD are utilized to assess the performance of the proposed approach. The results conclusively demonstrate that the presented technique based on Tchebichef moments and SVD transcends the other methods.
Similar content being viewed by others
References
Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput & Applic 30:183–192
Almohammad A, Ghinea G, Hierons RM (2009) JPEG steganography: a performance evaluation of quantization tables, in Advanced Information Networking and Applications, 2009. AINA'09. International Conference on, pp. 471–478.
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. Information Forensics and Security, IEEE Transactions on 6:1099–1110
Amerini I, Uricchio T, Ballan L, Caldelli R (2017) Localization of JPEG Double Compression Through Multi-Domain Convolutional Neural Networks, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 53–59
Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of Keypoints. Information Forensics and Security, IEEE Transactions on 10:2084–2094
Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Australian Journal of Forensic Sciences 49:281–307
Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery," in Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on, pp. 1053–1056
Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91:1759–1770
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. Information Forensics and Security, IEEE Transactions on 7:1841–1854
Columbia DVMM (2004) "Research lab: Columbia image splicing detection evaluation dataset," ed
Cox IJ, Miller ML, Bloom JA, Honsinger C (2002) Digital watermarking vol. 53: Springer
Elhaminia B, Harati A, Taherinia A (2019) A probabilistic framework for copy-move forgery detection based on Markov random field. Multimed Tools Appl:1–19
Fadl SM, Semary NA (2017) Robust copy-move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57–65
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7:868–882
Fridrich AJ, Soukal BD, Lukáš AJ (2003) "Detection of copy-move forgery in digital images," in in Proceedings of Digital Forensic Research Workshop
Gonzalez RC, Woods RE, Eddins SL (2004) Digital image processing using MATLAB: Pearson education India
Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Computers & Electrical Engineering 62:448–458
Hayati P, Potdar V, Chang E (2007) A survey of steganographic and steganalytic tools for the digital forensic investigator, in Workshop of Information Hiding and Digital Watermarking, pp. 1–12
Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66
Islam M, Shah M, Khan Z, Mahmood T, Khan MJ (2015) A New Symmetric Key Encryption Algorithm Using Images as Secret Keys, in Frontiers of Information Technology (FIT), 2015 13th International Conference on, pp. 1–5
Kessler G (2004) An Overview of Steganography for the Computer Forensics Examiner. An edited version, issue of Forensic Science Communications, Technical Report, 6
Khan A, Malik SA, Ali A, Chamlawi R, Hussain M, Mahmood MT, Usman I (2012) Intelligent reversible watermarking and authentication: hiding depth map information for< i> 3D</i> cameras. Inf Sci 216:155–175
Khan Z, Shah M, Naeem M, Mahmood T, Khan SNA, Amin NU et al (2016) Threshold based steganography: a novel technique for improved payload and SNR. International Arab Journal of Information Technology 13:380–386
Khan S, Khan T, Mahmood T, Ahmad N (2016) Analysis of data hiding in R, G and B channels of color image using various number of LSBs, in Innovative Computing Technology (INTECH), 2016 Sixth International Conference on, pp. 270–274
Lai Y, Huang T, Lin J, Lu H (2018) An improved block-based matching algorithm of copy-move forgery detection. Multimed Tools Appl 77:15093–15110
Lee J-C (2015) Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334
Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224:59–67
Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2:142–172
Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4:46–56
Lin C, Lu W, Huang X, Liu K, Sun W, Lin H et al., (2018) Copy-move forgery detection using combined features and transitive matching, Multimed Tools Appl, pp. 1–16
Liu Y, Guan Q, Zhao X, Cao Y (2018) Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks, in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 85–90
Mahmood T, Nawaz T, Irtaza A, Ashraf R, Shah M, Mahmood MT (2016) Copy-move forgery detection technique for forensic analysis in digital images. Math Probl Eng 2016:1–13
Mahmood T, Nawaz T, Mehmood Z, Khan Z, Shah M, Ashraf R (2016) Forensic analysis of copy-move forgery in digital images using the stationary wavelets, in Innovative Computing Technology (INTECH), 2016 Sixth International Conference on, pp. 578–583
Mahmood T, Irtaza A, Mehmood Z, Mahmood MT (2017) Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int 279:8–21
Mahmood T, Mehmood Z, Shah M, Khan Z (2018) An efficient forensic technique for exposing region duplication forgery in digital images. Appl Intell 48:1791–1801
Mahmoud K, Abu-AlRukab A (2016) Copy-move forgery detection using Zernike and Pseudo Zernike moments. International Arab Journal of Information Technology 13:930–937
Mukundan R, Ong S, Lee PA (2001) Image analysis by Tchebichef moments. IEEE Trans Image Process 10:1357–1364
Parveen A, Khan ZH, Ahmad SN (2019) Block-based copy–move image forgery detection using DCT. Iran Journal of Computer Science 2:89–99
Pun C-M, Yuan X-C, Bi X-L (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security 10:1705–1716
Raju PM, Nair MS (2018) Copy-move forgery detection using binary discriminant features. Journal of King Saud University-Computer and Information Sciences
Rao CS, Babu ST (2016) Image Authentication Using Local Binary Pattern on the Low Frequency Components, in Microelectronics, Electromagnetics and Telecommunications, ed: Springer, pp. 529–537
Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images, in Information Forensics and Security (WIFS), 2016 IEEE International Workshop on, pp. 1–6
Rehman A, Saba T, Mahmood T, Mehmood Z, Shah M, Anjum A (2018) Data hiding technique in steganography for information security using number theory, J Inf Sci, pp. 1–12
Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using zernike moments, in 12th International Conference on Information Hiding, pp. 51–65
Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Applic 21:291–306
Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32
Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—New database for copy-move forgery detection, in ELMAR, 2013 55th international symposium, pp. 49–54
Uliyan DM, Jalab HA, Wahab AWA, Shivakumara P, Sadeghi S (2016) A novel forged blurred region detection system for image forensic applications. Expert Syst Appl 64:1–10
Uliyan DM, Jalab HA, Abdul Wahab AW, Sadeghi S (2016) Image region duplication forgery detection based on angular radial partitioning and Harris key-points. Symmetry 8:1–19
Wen B, Zhu Y, Subramanian R, Ng T-T, Shen X, Winkler S (2016) Coverage-a novel database for copy-move forgery detection, in IEEE International Conference on Image processing, pp. 161–165
Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: Detecting copy-move image forgery with source/target localization, in Proceedings of the European Conference on Computer Vision (ECCV), pp. 168–184
Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9543–9552
Yao Y, Shi Y, Weng S, Guan B (2017) Deep learning for detection of object-based forgery in advanced video. Symmetry 10:3
Zhang Z, Wang D, Wang C, Zhou X (2017) Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors, KSII Transactions on Internet & Information Systems, vol. 11
Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158–166
Zhong J, Gan Y, Young J, Huang L, Lin P (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimed Tools Appl 76:14887–14903
Zhou J, Ni J, Rao Y (2017) Block-Based Convolutional Neural Network for Image Forgery Detection, in International Workshop on Digital Watermarking, pp. 65–76
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mahmood, T., Shah, M., Rashid, J. et al. A passive technique for detecting copy-move forgeries by image feature matching. Multimed Tools Appl 79, 31759–31782 (2020). https://doi.org/10.1007/s11042-020-09655-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09655-2