Skip to main content

Novel Method to Detect Multiple Cloning in Targeted Image Invariant to Rotation

  • Conference paper
  • First Online:
Book cover Computing in Engineering and Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1025))

  • 1026 Accesses

Abstract

Digital Media plays a vital role in our society. Digital image is one of the most important parts of digital media. There are various cases filed due to an image tampering on social networking websites. To detect tampering in an image, various techniques are available, but still these techniques have drawbacks. These techniques are not able to detect certain type of tampering in an image, like multiple region duplication with rotation. In this paper, the proposed system uses the approach, which is block based. In block based approach an image is divided into overlapping blocks, for the betterment of results the block is then divided diagonally into four subblocks. Feature vectors are then calculated using Zernike Moments as this is invariant to Rotation and it is insensitive to image noise. Thus the proposed approach is going to be crucial in digital image tamper detection in the upcoming era of digital media.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, W., Dong, J., Tan, T.: A Survey of Passive Image Tampering Detection. Springer, Berlin Heidelberg, LNCS 5703, pp. 308–322 (2009)

    Google Scholar 

  2. Sadeghi, S., Jalab, H.A., Dadkhah, S.: Efficient Copy-Move forgery detection for digital images. World Acad. Sci. Eng. Technol. 6, 539–542 (2012)

    Google Scholar 

  3. Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular Copy-Move forgery detection approaches. In: Proceedings of the IEEE Transactions on Information Forensics and Security, pp. 1–26, Nov 2012

    Google Scholar 

  4. Redi, J.A., Taktak, W., Dugelay, J.L.: Digital image forensics: a booklet for beginners. Int. J. Multimed. Tools Appl. 51(1), 133–162 (2011)

    Google Scholar 

  5. Al-Qershi, O.M., Khoo, B.E.: Passive detection of Copy-Move forgery in digital images: state-of-the-art. Forensic Sci. Int. Conf. 231(13), 284–295 (2013)

    Google Scholar 

  6. Muhammad, N., Hussain, M., Muhamad, G., Bebis, G.: A Nonintrusive Method for Copy-Move Forgery Detection. Springer, Berlin Heidelberg, Part II, LNCS 6939, pp. 516–525 (2011)

    Google Scholar 

  7. Amtullah, S. Koul, A.: Passive image forensic method to detect copy move forgery in digital images. IOSR J. Comput. Eng. (IOSR-JCE) 16(2), 96–104, Ver. XII (2014)

    Google Scholar 

  8. Dixit, R., Naskar, R.: Review, analysis and parameterization of techniques for Copy-Move forgery detection in digital images. IET Image Process. J. (2017)

    Google Scholar 

  9. https://www.freelancer.in/u/foriduzzaman1/portfolio/adobe-photoshop-editing-and-retouching-in-24-hours-4151191

  10. Cao, Y., Gao, T., Fan, L., Yang, Q.: A robust detection algorithm for copy move forgery in digital images. Forensic Sci. Int. Conf. 214, 33–43 (2012)

    Google Scholar 

  11. Li, H., Luo, W., Qiu, X., Huang, J.: Image forgery localization via integrating tampering possibility maps. IEEE Trans. Inf. Forensics Secur. 12(5) (2017)

    Google Scholar 

  12. Yan, C.P., Pun, C.M.: Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans. Inf. Forensics Secur. 12(9) (2017)

    Google Scholar 

  13. Singh, C., Walia, E., Mittal, N.: Fusion of Zernike moments and SIFT features for improved face recognition. In: International Conference on Recent Advances and Future Trends in Information Technology, pp. 26–31 (2012)

    Google Scholar 

  14. Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 91–110 (2004)

    Google Scholar 

  15. Ancuti, CO., Ancuti, C., De Vleeschouwer, C., Bekaert, P.: Color balance and fusion for underwater image enhancement. IEEE Trans. Image Process. 27(1) (2018)

    Google Scholar 

  16. Ryu, S.J., Lee, M.J., Lee, H.K.: Detection of Copy-Rotate-Move Forgery using Zernike Moments. Springer, Berlin Heidelberg, LNCS 637, pp. 51–65 (2010)

    Google Scholar 

  17. Singh, V.K., Tripathi, R.C.: Fast and efficient region duplication detection in digital images using sub-blocking method. Int. J. Adv. Sci. Technol. 35, 93–102 (2011)

    Google Scholar 

  18. Pun, C.M., Yuan, X.C., Bi, X.L.: Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans. Inf. Forensics Secur. 10(8) (2015)

    Google Scholar 

  19. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image Copy-Move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kshipra Ashok Tatkare .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tatkare, K.A., Devare, M. (2020). Novel Method to Detect Multiple Cloning in Targeted Image Invariant to Rotation. In: Iyer, B., Deshpande, P., Sharma, S., Shiurkar, U. (eds) Computing in Engineering and Technology. Advances in Intelligent Systems and Computing, vol 1025. Springer, Singapore. https://doi.org/10.1007/978-981-32-9515-5_7

Download citation

Publish with us

Policies and ethics