Advertisement

A Robust Method for Image Copy-Move Passive Forgery Detection with Enhanced Speed

  • Asif HassanEmail author
  • V. K. Sharma
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)

Abstract

Forgery detection of images is presently one of the fascinated research fields. Copy-move forgery is the most commonly used methods for image forgery. A novel method is proposed in this paper, which is an effective and advanced method for detecting copy-move forgery. The proposed method is a block matching technique with reduced computational speed and less computational complexities. The efficiency of outcome is also improved. The image is segmented into fixed dimensions of overlying blocks and then discrete cosine transform (DCT) is applied to each block to extract its features. Then, the mean of each block is obtained. The mean of each block is compared with other blocks to find the similarity between the blocks. The computational outcomes are shown that indicates the proposed method is robust to detect copy-move forgery efficiently with enhanced speed.

Keywords

Image forgery Copy-move forgery Discrete cosine transform Digital images 

References

  1. 1.
    Fadl SM, Semary NA (2014) A proposed accelerated image copy-move forgery detection. In: Visual communications and image processing conference, IEEEGoogle Scholar
  2. 2.
    Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRefGoogle Scholar
  3. 3.
    Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184CrossRefGoogle Scholar
  4. 4.
    Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Sig Process (World Sci Eng Acad Soc) 5(5):188–197Google Scholar
  5. 5.
    Bhargava N, Sharma MM, Garhwal AS (2012) An improved image authentication technique using random-sequence based secret-sharing scheme. In: 2012 International conference on radar, communication and computing (ICRCC), 21–22 Dec. 2012. IEEE 07 Feb 2013 Google Scholar
  6. 6.
    Katzenbeisser S, Petitcols FAP (2000) Information techniques for stenography and digital watermarking. Norwood, A, Artec HouseGoogle Scholar
  7. 7.
    Alam S, Jamil A, Saldhi A (2015) Digital image authentication and encryption using digital signature. In: 2015 international conference on advances in computer engineering and applications (ICACEA), 19–20 Mar 2015. IEEE 23 July 2015Google Scholar
  8. 8.
    Singh VK, Tripathi RC (2011) Fast and efficient region duplication detection in digital images using sub-blocking method. Int J Adv Sci Technol 35:93–102Google Scholar
  9. 9.
    Liu G, Wang J, Lian S, Wang Z (2010) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565CrossRefGoogle Scholar
  10. 10.
    Sebe N, Liu Y, Zhuang Y, Huang T, Chang S-F (2007) Blind passive media forensics: motivation and opportunity. In: Multimedia content analysis and mining. Springer, Berlin, pp 57–59Google Scholar
  11. 11.
    Chen C-H, Tang Y-L, Hsieh W-S (2014) Color image authentication and recovery via adaptive encoding. In: 2014 international symposium on computer, consumer and control (IS3C), 10–12 June 2014. IEEE 30 June 2014Google Scholar
  12. 12.
    Zhang Z, Ren Y, Ping XJ, He ZY, Zhang SZ (2008) A survey on passive-blind image forgery by doctor method detection. In: Proceedings of seventh international conference on machine learning and cybernetics, pp 3463–3467Google Scholar
  13. 13.
    Kou G, Ma Y (2015) Color image authentication method based on triple-channel spiking cortical model. In: 2015 10th international conference on broadband and wireless computing, communication and applications (BWCCA), 4–6 Nov 201. IEEE 03 Mar 2016Google Scholar
  14. 14.
    Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking San Francisco. Morgan Kaufmann, BurlingtonGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Bhagwant UniversityAjmerIndia

Personalised recommendations