Skip to main content

Performance Analysis of Wavelet Transform Based Copy Move Forgery Detection

  • Conference paper
  • First Online:
Soft Computing Systems (ICSCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 837))

Included in the following conference series:

  • 1553 Accesses

Abstract

In the modern world, digital images are the sources of information. These sources can be manipulated by image processing and editing software. Image authenticity becomes a socially relevant issue in image forensics. Copy move is a main digital image forgery attack where the region of image is copied and pasted in the same image at different locations for hiding the information. This paper presents an analysis of accuracy in detecting copy move forgery based on different types of wavelet transform. For each wavelet transform, analysis is done at different levels of decomposition. The result indicates that both stationary wavelet transform (SWT) and lifting wavelet transform (LWT) work more effectively as compared to discrete wavelet transform (DWT).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Solorio, B., Nandi, A.K.: Exposing duplicated regions affected by reflection, rotation and scaling. In: Proceedings of International Conference on Acoustics Speech and Signal Processing, pp. 1880–1883 (2011)

    Google Scholar 

  2. Gupta, A., Saxena, N., Vasistha, S.K: Detecting copy move forgery using DCT. Int. J. Sci. Res. Publ. 3, 1–4 (2013)

    Google Scholar 

  3. Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection via texture description. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, pp. 59–64 (2010)

    Google Scholar 

  4. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technology report TR2004-515, Department Computer Science, Dartmouth College (2004)

    Google Scholar 

  5. Mohamadian, Z., Pouyan, A.: Detection of duplication forgery in digital images in uniform and non-uniform regions. In: International Conference on Computer Modelling and Simulation (UKSim), pp. 455–460 (2013)

    Google Scholar 

  6. Thajeel, S.A., Sulong, G.B.: State of the art of copy-move forgery detection techniques: a review. Int. J. Comput. Sci. Issues 10, 174–183 (2013)

    Google Scholar 

  7. Reshma, R., Niya, J.: Keypoint extraction using SURF algorithm for CMFD. In: International Conference on Advances in Computing and Communications, vol. 93, pp. 375–381 (2016)

    Google Scholar 

  8. Hashmi, M.F., Hambarde, A.R., Keskar, A.G.: Copy move forgery detection using DWT and SIFT features. In: International Conference on Intelligent Systems Design and Applications (ISDA), pp. 188–193 (2013)

    Google Scholar 

  9. Mahmooda, T., Irtazab, A., Mehmood, Z., Mahmood, M.T.: Copy move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci. Int. 279, 8–21 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. V. Melvi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Melvi, C.V., Sathish Kumar, C., Saji, A.J., Varghese, J. (2018). Performance Analysis of Wavelet Transform Based Copy Move Forgery Detection. In: Zelinka, I., Senkerik, R., Panda, G., Lekshmi Kanthan, P. (eds) Soft Computing Systems. ICSCS 2018. Communications in Computer and Information Science, vol 837. Springer, Singapore. https://doi.org/10.1007/978-981-13-1936-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1936-5_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1935-8

  • Online ISBN: 978-981-13-1936-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics