Advertisement

S-Transform-Based Efficient Copy-Move Forgery Detection Technique in Digital Images

  • Rajeev Rajkumar
  • Sudipta Roy
  • Kh. Manglem Singh
Conference paper
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)

Abstract

Copy-move forgery (CMF), which copies a part of a picture and pastes it into another location, is one of the common strategies for digital image tampering. With the advent of high-performance hardware and the compact use of image processing software, it empowers creating image forgeries very easy which are undetectable by the naked eye. For CMF detection, we suggest an efficient and vigorous method that could take care of numerous geometric ameliorations including rotation, scaling, and blurring. In the projected CMF detection system, we use Stockwell transform (S-transform) which hybrids the advantages of both scale invariant feature transform (SIFT) and wavelet transform (WT) to extract the key points and their descriptors from the overlapped image blocks. Furthermore, Euclidean distance (ED) between the overlapped blocks is measured to detect the similarities and to identify the tampered or forged region in the image. Besides, a novel fuzzy min-max neural network-based decision tree (FMMNN-DT) classifier is used to recognize the duplicated regions in the forgery image. The proposed system is tested and validated using MICC-F220 dataset and we present comparison among the proposed outcomes with some existing ones which ensures the significance of the proposed.

Keywords

Copy-move forgery Digital images S-Transform Feature extraction Fuzzy min-max classifier Decision Tree classifier 

References

  1. 1.
    B. Mahdian, S. Saic, Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2), 180–189 (2007)CrossRefGoogle Scholar
  2. 2.
    Y. Cao et al., A robust detection algorithm for copy-move forgery in digital images. Forensic Sci. Int. 214(1), 33–43 (2012)CrossRefGoogle Scholar
  3. 3.
    A.J. Fridrich, B.D. Soukal, A.J. Lukáš, Detection of copy-move forgery in digital images, in Proceedings of Digital Forensic Research Workshop, 2003Google Scholar
  4. 4.
    P. Mukherjee, S. Mitra, A review on copy-move forgery detection techniques based on DCT and DWT. Int. J. Comput. Sci. Mob. Comput. 4(3), 702–708 (2015)Google Scholar
  5. 5.
    G. Muhammad, M. Hussain, G. Bebis, Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1), 49–57 (2012)CrossRefGoogle Scholar
  6. 6.
    I. Amerini et al., Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process. Image Commun. 28(6), 659–669 (2013)CrossRefGoogle Scholar
  7. 7.
    L. Li et al., An efficient scheme for detecting copy-move forged images by local binary patterns. J. Inf. Hiding Multimed. Signal Process. 4(1), 46–56 (2013) Google Scholar
  8. 8.
    T. Mahmood, A. Irtaza, Z. Mehmood, M. Tariq Mahmood, Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci. Int. 279, 8–21 (2017)CrossRefGoogle Scholar
  9. 9.
    S. Li et al., Detecting copy-move forgery under affine transforms for image forensics. Comput. Electr. Eng. 40(6), 1951–1962 (2014)CrossRefGoogle Scholar
  10. 10.
    C.-C. Chen, H. Wang, C.-S. Lin, An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. Multimed. Tools Appl. 76(24), 26503–26522 (2017)CrossRefGoogle Scholar
  11. 11.
    H. Gou, A. Swaminathan, M. Wu, Noise features for image tampering detection and steganalysis, in Proceedings of the IEEE International Conference on Image Processing, San Antonio, TX, vol. 6, 2007, pp. 97–100Google Scholar
  12. 12.
    J.-C. Lee, C.-P. Chang, W.-K. Chen, Detection of copy–move image forgery using histogram of orientated gradients. Inf. Sci. 321, 250–262 (2015)CrossRefGoogle Scholar
  13. 13.
    I. Amerini et al., A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Security 6(3), 1099–1110 (2011)CrossRefGoogle Scholar
  14. 14.
    Q.-C. Yang, C.-L. Huang, Copy-move forgery detection in digital image, in Pacific-Rim Conference on Multimedia, (Springer, Berlin, 2009)Google Scholar
  15. 15.
    T. Mahmood, Z. Mehmood, M. Shah, T. Saba, A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J. Vis. Commun. Image Represent. 53, 202–214 (2018)CrossRefGoogle Scholar
  16. 16.
    D.-Y. Huang, C.-N. Huang, W.-C. Hu, C.-H. Chou, Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed. Tools Appl. 76(1), 1509–1530 (2017)CrossRefGoogle Scholar
  17. 17.
    J. Li et al., Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Security 10(3), 507–518 (2015)CrossRefGoogle Scholar
  18. 18.
    R. Davarzani, K. Yaghmaie, S. Mozaffari, M. Tapak, Copy-move forgery detection using multi resolution local binary patterns. Forensic Sci. Int. 231(1), 61–72 (2013)CrossRefGoogle Scholar
  19. 19.
    M.V. Chilukuri, P.K. Dash, Multi-resolution S-transform-based fuzzy recognition system for power quality events. IEEE Trans. Power Deliv. 19(1), 323–330 (2004)CrossRefGoogle Scholar
  20. 20.
    M. Seera, K. Randhawa, C.P. Lim, Improving the Fuzzy Min–Max neural network performance with an ensemble of clustering trees. Neurocomputing 275, 1744–1751 (2018)CrossRefGoogle Scholar
  21. 21.
    A. Quteishat, C.P. Lim, K.S. Tan, A modified fuzzy min–max neural network with a genetic-algorithm-based rule extractor for pattern classification. IEEE Trans. Syst. Man Cybern. A Syst. Hum. 40(3), 641–650 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Rajeev Rajkumar
    • 1
  • Sudipta Roy
    • 1
  • Kh. Manglem Singh
    • 2
  1. 1.Department of Computer Science and EngineeringAssam UniversitySilcharIndia
  2. 2.Department of Computer Science and EngineeringNational Institute of Technology, ManipurImphalIndia

Personalised recommendations