Analysis of Intentional Noise Insertion Approach on the Copy-Move Forgery Detection in Digital Image

Analysis of Intentional Noise Insertion Approach on the Copy-Move Forgery Detection in Digital Image

In this digital age, there has been ever-increasing trend on the amount of digital image data. On the other side, in parallel with this situation, image tampering and manipulation attacks have become widespread by the use of various image editing software packages. It means that digital image data have become more vulnerable to tampering or manipulation through forgeries. Copy-move duplication is a type of image forgery involving the process of copying and then pasting an image part from one region to another location within the same image. This paper proposes a novel enhancement on the copy-move forgery detection algorithms. The proposed strategy is based on adding specific noise on the image in order to reach more robust detection. It is observed from the experimental results that, with the specific noise insertion, the copy-move forgery detection algorithms can obtain better performances in comparison to conventional methods. It is found at image level that, by the proposed strategy, with 25×25 blocks, 94.16% accuracy rate is reached. The proposed approach also provides to have reasonable precision and recall values, 92.51% and 96.11%, respectively when compared to existing algorithms.

___

  • 1] O. M. Al-Qershi and B. E. Khoo, “Passive detection of copy-move forgery in digital images: State-of-the-art”, Forensic Science International, vol. 231, pp. 284–295, 2013.
  • [2] V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches”, IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841–1854, 2012.
  • [3] H. Farid, “Image forgery detection A survey”, IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16–25, March 2009.
  • [4] N. B. A. Warif, A. W. A. Wahab, M. Y. I. Idris et al., “Copy-move forgery detection: Survey, challenges and future directions”, Journal of Net ork and Computer Applications, vol. 75, pp. 259– 278, 2016.
  • [5] J. Zhao and J. Guo, “Passive forensics for copy-move image forgery using a method based on DCT and SVD”, Forensic Science International, vol. 233, pp. 158–166, 2013.
  • [6] G. Lynch, F. Y. Shih, and H.-Y.M. Liao, “An efficient expanding block algorithm for image copy-move forgery detection”, Information Sciences, vol. 239, pp. 253–265, 2013.
  • [7] A. Kuznetsova and V. Myasnikov, “A new copy-move forgery detection algorithm using image preprocessing procedure”, Procedia Engineering, vol. 201 pp. 436–444, 2017.
  • [8] M. D. Ansari, S. P. Ghrera, and V. Tyagi, “Pixel-based image forgery detection: A review”, IETE Journal of Education, vol. 55, no.1, pp. 40–46, 2014.
  • [9] J. Fridrich, D. Soukal, and J. Lukas, “Detection of copy-move forgery in digital images,” in Proceedings of the Digital Forensic Research Workshop, pp. 5–8, August 2003.
  • [10] Y. Huang, W. Lu, W. Sun, and D. Long, “Improved DCT-based detection of copy-move forgery in images”, Forensic Science International, vol. 206, pp. 178–184, 2011.
  • [11] J. Zhang, Z. Feng, and Y. Su, “A new approach for detecting copymove forgery in digital images”, in 11th IEEE Singapore International Conference on Communication Systems, pp.362–366, 2008.
  • [12] X. Wang, X. Zhang, Z. Li, and S. Wang, “A DWT-DCT based passive forensics method for copy-move attacks”, in 3rd International Conference on Multimedia Information Networking and Security, pp. 304–308, 2011.
  • [13] R. Davarzani, K. Yaghmaie, S. Mozaffari, and M. Tapak, ”Copymove forgery detection using multiresolution local binary patterns”, Forensic Science International, vol. 231, pp. 61–72, 2013.
  • [14] G. Ulutaş, M. Ulutaş, and V. V. Nabiyev, “Copy move forgery detection based on LBP”, in 21st Signal Processing and Communications Applications Conference, April 2013.
  • [15] A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Department of Computer Science, Dartmouth College, Technical Report, TR2004–515, 2004.
  • [16] Z. Ting and W. Rang-ding, “Copy-move forgery detection based on SVD in digital image”, in 2nd International Congress on Image and Signal Processing, October 2009
  • [17] I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, “A SIFT-based forensic method for copy–move attack detection and transformation recovery”, IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099–1110, 2011.
  • [18] X. Pan and S. Lyu, “Region duplication detection using image feature matching”, IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 857–867, 2010.
  • [19] B. L. Shivakumar and S. S. Baboo, “Detection of region duplication forgery in digital images using SURF”, International Journal of Computer Science Issues, vol. 8, no. 1, pp. 199–205, 2011.
  • [20] P. Mishra, N. Mishra, S. Sharma, and R. Patel, “Region duplication forgery detection technique based on SURF and HAC”, The Scientific World Journal, pp. 1–8, 2013.
  • [21] E. Ardizzone, A. Bruno, and G. Mazzola, “Copy-move forgery detection by matching triangles of keypoints”, IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084– 2094, 2015.
  • [22] Y. Gan and J. Zhong, “Image copy-move tamper blind detection algorithm based on integrated feature vectors”, Journal of Chemical and Pharmaceutical Research, vol. 6, no. 6, pp. 1584– 1590, 2014.
  • [23] L. Li, S. Li, H. Zhu, and X. Wu, “Detecting copy-move forgery under affine transforms for image forensics”, Computers and Electrical Engineering, vol. 40, pp. 1951–1962, 2014.
  • [24] F. Peng, Y.Y. Nie, and M. Long, “A complete passive blind image copy-move forensics scheme based on compound statistics features”, Forensic Science International, vol. 212, pp. e21–e25, 2011.
  • [25] H. Shao, T. Yu, M. Xu, and W. Cui, “Image region duplication detection based on circular window expansion and phase correlation”, Forensic Science International, vol. 222, pp. 71–82, 2012.
  • [26] G. Muhammad, M. Hussain, and G. Bebis, “Passive copy move image forgery detection using undecimated dyadic wavelet transform”, Digital Investigation, vol. 9, pp. 49–57, 2012.
  • [27] L. Zhong and W. Xu, “A robust image copy-move forgery detection based on mixed moments”, in IEEE 4th International Conference on Software Engineering and Service Science, pp. 381–384, May 2013.
  • [28] E. Ardizzone, A. Bruno, G. Mazzola, “Detecting multiple copies in tampered images”, in Proceedings of the IEEE 17th International Conference on Image Processing, pp. 2117–2120, September 2010.
  • [29] D. Tralic, I. Zupancic, S. Grgic, M. Grgic, “CoMoFoD-New database for copy- move forgery detection”, in Proceedings of 55th International Symposium ELMAR-2013, pp. 49–54, September 2013.
  • [30] I. Amerini, L. Ballan, R. Caldelli et al., “Copy-move forgery detection and localization by means of robust clustering with Jlinkage”, Signal Processing: Image Communication, vol. 28, no. 6, pp. 659–669, 2013.
  • [31] E. Silva, T. Carvalho, A. Ferreira, A. Rocha, “Going deeper into copy- move forgery detection: exploring image telltales via multiscale analysis and voting processes”, Journal of Visual Communication and Image Representation, vol. 29, pp. 16–32, 2015.
  • [32] C.M. Pun, X.C. Yuan, X.L. Bi, “Image forgery detection using adaptive oversegmentation and feature points matching”, IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705–1716, 2015.
  • [33] J. Li, X. Li, B. Yang, X. Sun, “Segmentation-based image copymove forgery detection scheme”, IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507–518, 2015.
  • [34] H. Huang, A. Ciou, “Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation”, Journal on Image and Video Processing, vol. 68, 2019.