Skip to main content
Log in

An improved reduced feature-based copy-move forgery detection technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 30 June 2022

This article has been updated

Abstract

With Widespread malpractice of copy-move image forgery, enforcing image forensics becomes imperative. In this approach, objects can be added into or removed from the same image to hide the truth with malicious intention. In order to address this issue, passive copy move forgery localization and detection has been playing a crucial rule in image forensics arena. The paper proposed a reduced feature-based algorithm which is robust as well as highly accurate in terms of detecting forged area. In this proposed scheme, stationary wavelet transform is employed on subject image to obtain low approximation band, and then significant features are extracted from it using block-based Discrete Cosine Transformation (DCT) and singular value decomposition (SVD) accordingly. Traditional block-based approach suffers from computational overhead especially for large images. Proposed scheme, extracts only three feature vectors, one DC component applying DCT on LL bands and two singular value components extracted employing SVD from the remaining AC components of each transformed block. These reduced features are further utilized for analysing and matching to detect identical regions in an image. In spite of having a smaller number of features, experimental results exhibit, this proposed scheme detects the forged area precisely as well as exhibits quality robustness against different post- processing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Change history

References

  1. Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput & Applic 30(1):183–192

    Article  Google Scholar 

  2. Al-Qershi OM, Khoo BE (2019) Enhanced block-based copy-move forgery detection using k-means clustering. Multidim Syst Sign Process 30(4):1671–1695

    Article  MATH  Google Scholar 

  3. Bayram S, Sencar HT, Memon TN (2009) An efficient and robust method for detecting copy-move forgery. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp 1053–1056

    Google Scholar 

  4. Bovik AC (2010) ‘Handbook of Image and Video Processing’. Academic Press,.

  5. Cao L (2006) Singular value decomposition applied to digital image processing. Arizona State University polytechnic Campus, Division of Computing Studies, Arizona State University Polytechnic Campus, Mesa pp.1-15

  6. Christlein V et al (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inform Forensics Secur 7(6):1841–1854

    Article  Google Scholar 

  7. Coffman RR, Donoho DL (1995) Translation-invariant de-noising. In Wavelets and statistics, Springer, New York, NY, pp 125–150

    MATH  Google Scholar 

  8. Dixit R, Naskar R (2017) Review, analysis and parameterisation of techniques for copy–move forgery detection in digital images. IET Image Process 11(9):746–759

    Article  Google Scholar 

  9. Farid AP, Popescu AC (2004) Exposing digital forgeries by detecting duplicated image region. Technical Report, Hanover, Department of Computer Science, Dartmouth College, USA

    Google Scholar 

  10. Fridrich AJ, Soukal BD, Luk AJ (2003) ‘Detection of copy-move forgery in digital images’. Proc. of Digital Forensic Research Workshop

  11. Gonzalez RC, Woods RE (2017) Digital image processing. Pearson, Global Edition

    Google Scholar 

  12. Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Compu Electrical Eng 62:448–458

    Article  Google Scholar 

  13. Kang X, Wei S (2009) Identifying tampered regions using singular value decomposition in digital image forensics. Int Conf Comput Sci Software Eng 3:926–930

    Google Scholar 

  14. Lee JC, Chang CP, Chen WK (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262

    Article  Google Scholar 

  15. Lin X et al (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39

    Article  Google Scholar 

  16. Lowe DG (2004) Distinctive image features from scale-invariant key points. Int J Comput Vis 60(2):91–110

    Article  Google Scholar 

  17. Mahmood T, Mehmood Z, Shah M, Saba T (2018) A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Vis Commun Image Represent 53:202–214

    Article  Google Scholar 

  18. Meena KB, Tyagi V (2019) Image forgery detection: survey and future directions. Data Engineering and applications, Springer, Singapore, pp 163–194

    Google Scholar 

  19. Meena KB, Tyagi V (2020) A copy-move image forgery detection technique based on tetrolet transform. J Inform Secur Appl 52:102481

    Google Scholar 

  20. Nason GP, Silverman BW (1995) The stationary wavelet transforms and some statistical applications. Wavelets and statistics. Springer, New York, NY, pp 281–299

    MATH  Google Scholar 

  21. Rao KR, Yip P Discrete cosine transform: algorithms, advantages, applications, 2014, Academic press

  22. Schlesinger V et al (2017) Image forgery detection confronts image composition. Comput Graphics 68:152–163

    Article  Google Scholar 

  23. Singh G, Singh K (2020) An improved block-based copy-move forgery detection technique. Multimedia Tools Appl:1–25

  24. Soni B, Das PK, Thounaojam DM (2019) Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. J Inform Secur Appl 45:44–51

    Google Scholar 

  25. Starck JL, Fadili J, Murtagh F (2007) The undecimated wavelet decomposition and its reconstruction. IEEE Trans Image Process 16(2):297–309

    Article  MathSciNet  Google Scholar 

  26. Tharwat A (2018) ‘Classification assessment methods’. Appl Comput Inform

  27. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD—New database for copy-move forgery detection. IEEE Proceedings ELMAR:49–54

  28. Warif NBA et al (2016) Copy-move forgery detection: survey, challenges and future directions. J Network Comput Appl 75:259–278

    Article  Google Scholar 

  29. Zandi M, Mahmoudi-Aznaveh A, Mansouri A (2014) Adaptive matching for copy-move forgery detection’. In 2014 IEEE international workshop on information forensics and security (WIFS). IEEE:119–124

  30. Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumya Mukherjee.

Ethics declarations

Conflict of interest

The authors declare that there is no actual or potential conflict of interest regarding the publication of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: Figure 4 image was incorrect.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S., Mukherjee, S. & Pal, A.K. An improved reduced feature-based copy-move forgery detection technique. Multimed Tools Appl 82, 1431–1456 (2023). https://doi.org/10.1007/s11042-022-12391-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12391-4

Keywords

Navigation