Novel Method to Detect Multiple Cloning in Targeted Image Invariant to Rotation

  • Kshipra Ashok TatkareEmail author
  • Manoj Devare
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1025)


Digital Media plays a vital role in our society. Digital image is one of the most important parts of digital media. There are various cases filed due to an image tampering on social networking websites. To detect tampering in an image, various techniques are available, but still these techniques have drawbacks. These techniques are not able to detect certain type of tampering in an image, like multiple region duplication with rotation. In this paper, the proposed system uses the approach, which is block based. In block based approach an image is divided into overlapping blocks, for the betterment of results the block is then divided diagonally into four subblocks. Feature vectors are then calculated using Zernike Moments as this is invariant to Rotation and it is insensitive to image noise. Thus the proposed approach is going to be crucial in digital image tamper detection in the upcoming era of digital media.


Image forgery detection Cloning detection Zernike moments 


  1. 1.
    Wang, W., Dong, J., Tan, T.: A Survey of Passive Image Tampering Detection. Springer, Berlin Heidelberg, LNCS 5703, pp. 308–322 (2009)Google Scholar
  2. 2.
    Sadeghi, S., Jalab, H.A., Dadkhah, S.: Efficient Copy-Move forgery detection for digital images. World Acad. Sci. Eng. Technol. 6, 539–542 (2012)Google Scholar
  3. 3.
    Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular Copy-Move forgery detection approaches. In: Proceedings of the IEEE Transactions on Information Forensics and Security, pp. 1–26, Nov 2012Google Scholar
  4. 4.
    Redi, J.A., Taktak, W., Dugelay, J.L.: Digital image forensics: a booklet for beginners. Int. J. Multimed. Tools Appl. 51(1), 133–162 (2011)Google Scholar
  5. 5.
    Al-Qershi, O.M., Khoo, B.E.: Passive detection of Copy-Move forgery in digital images: state-of-the-art. Forensic Sci. Int. Conf. 231(13), 284–295 (2013)Google Scholar
  6. 6.
    Muhammad, N., Hussain, M., Muhamad, G., Bebis, G.: A Nonintrusive Method for Copy-Move Forgery Detection. Springer, Berlin Heidelberg, Part II, LNCS 6939, pp. 516–525 (2011)Google Scholar
  7. 7.
    Amtullah, S. Koul, A.: Passive image forensic method to detect copy move forgery in digital images. IOSR J. Comput. Eng. (IOSR-JCE) 16(2), 96–104, Ver. XII (2014)Google Scholar
  8. 8.
    Dixit, R., Naskar, R.: Review, analysis and parameterization of techniques for Copy-Move forgery detection in digital images. IET Image Process. J. (2017)Google Scholar
  9. 9.
  10. 10.
    Cao, Y., Gao, T., Fan, L., Yang, Q.: A robust detection algorithm for copy move forgery in digital images. Forensic Sci. Int. Conf. 214, 33–43 (2012)Google Scholar
  11. 11.
    Li, H., Luo, W., Qiu, X., Huang, J.: Image forgery localization via integrating tampering possibility maps. IEEE Trans. Inf. Forensics Secur. 12(5) (2017)Google Scholar
  12. 12.
    Yan, C.P., Pun, C.M.: Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans. Inf. Forensics Secur. 12(9) (2017)Google Scholar
  13. 13.
    Singh, C., Walia, E., Mittal, N.: Fusion of Zernike moments and SIFT features for improved face recognition. In: International Conference on Recent Advances and Future Trends in Information Technology, pp. 26–31 (2012)Google Scholar
  14. 14.
    Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 91–110 (2004)Google Scholar
  15. 15.
    Ancuti, CO., Ancuti, C., De Vleeschouwer, C., Bekaert, P.: Color balance and fusion for underwater image enhancement. IEEE Trans. Image Process. 27(1) (2018)Google Scholar
  16. 16.
    Ryu, S.J., Lee, M.J., Lee, H.K.: Detection of Copy-Rotate-Move Forgery using Zernike Moments. Springer, Berlin Heidelberg, LNCS 637, pp. 51–65 (2010)Google Scholar
  17. 17.
    Singh, V.K., Tripathi, R.C.: Fast and efficient region duplication detection in digital images using sub-blocking method. Int. J. Adv. Sci. Technol. 35, 93–102 (2011)Google Scholar
  18. 18.
    Pun, C.M., Yuan, X.C., Bi, X.L.: Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans. Inf. Forensics Secur. 10(8) (2015)Google Scholar
  19. 19.
    Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image Copy-Move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3) (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Mumbai University, RAITMumbaiIndia
  2. 2.Amity UniversityMumbaiIndia

Personalised recommendations