Login



Other Articles by Author(s)

Eva Tuba
Raka Jovanovic
Milan Tuba



Author(s) and WSEAS

Eva Tuba
Raka Jovanovic
Milan Tuba


WSEAS Transactions on Signal Processing


Print ISSN: 1790-5052
E-ISSN: 2224-3488

Volume 13, 2017

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



Copy-Move Forgery Detection in Digital Images by Reduced Features Ovelapping Block-Based Algorithm

AUTHORS: Eva Tuba, Raka Jovanovic, Milan Tuba

Download as PDF

ABSTRACT: Digital image forgery is one of the problems that, besides many benefits, appears with widespread use of digital images in all areas of life. Unfortunately, with rapidly developing and increasingly more powerful hardware and software, not only is digital photography manipulation for legitimate goals easier, but also for the forgery. One well-known forgery of digital images is the so-called copy-move forgery where one part of the image is copied to another location in the same image. In this paper we proposed an ovarlaping block-based method for detection of copy-move forgery. It uses overlaping blocks of the size 16*16 and only three features extracted from such blocks. Huge amount of computation is reduced by using bin-sort algorithm. The proposed method was tested on standard benchmark images and in spite of its simplicity it proved to be very successful.

KEYWORDS: Digital image forensics, image forgery detection, copy-move forgery detection, block-based forgery detection algorithm

REFERENCES:

[1] L. Li, S. Li, H. Zhu, and X. Wu, “Detecting copy-move forgery under affine transforms for image forensics,” Computers & Electrical Engineering, vol. 40, no. 6, pp. 1951–1962, 2014.

[2] V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches,” IEEE Transactions on information forensics and security, vol. 7, no. 6, pp. 1841–1854, 2012.

[3] O. M. Al-Qershi and B. E. Khoo, “Passive detection of copy-move forgery in digital images: State-of-the-art,” Forensic science international, vol. 231, no. 1, pp. 284–295, 2013.

[4] Z. Haddad, Y. Chen, and J. L. Krahe, Image Processing and Pattern Recognition Tools for the Automatic Image Transcription, pp. 197– 203. Cham: Springer International Publishing, 2016.

[5] E. Tuba and N. Bacanin, “An algorithm for handwritten digit recognition using projection histograms and SVM classifier,” in 23rd Telecommunications Forum Telfor (TELFOR), pp. 464–467, Nov 2015.

[6] M. Jordanski, A. Arsic, and M. Tuba, “Dynamic recursive subimage histogram equalization algorithm for image contrast enhancement,” in 23rd Telecommunications Forum Telfor (TELFOR), pp. 819–822, Nov 2015.

[7] M. Tuba, “Multilevel image thresholding by nature-inspired algorithms-a short review,” The Computer Science Journal of Moldova, vol. 22, no. 3, pp. 318–338, 2014.

[8] I. Brajevic and M. Tuba, Cuckoo Search and Firefly Algorithm Applied to Multilevel Image Thresholding, pp. 115–139. Cham: Springer International Publishing, 2014.

[9] M. Tuba, N. Bacanin, and A. Alihodzic, “Multilevel image thresholding by fireworks algorithm,” in 25th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 326–330, April 2015.

[10] A. Alihodzic and M. Tuba, “Improved bat algorithm applied to multilevel image thresholding,” The Scientific World Journal, vol. 2014, p. 16, 2014.

[11] X.-S. Yang, “A new metaheuristic batinspired algorithm,” Studies in Computational Intelligence, vol. 284, pp. 65–74, November 2010.

[12] D. Karaboga, “An idea based on honey bee swarm for numerical optimization,” Technical Report - TR06, pp. 1–10, 2005.

[13] M. Subotic, M. Tuba, and N. Stanarevic, “Parallelization of the artificial bee colony (ABC) algorithm,” in Proceedings of the 11th WSEAS International Conference on Nural Networks and 11th WSEAS International Conference on Evolutionary Computing and 11th WSEAS International Conference on Fuzzy Systems, pp. 191–196, 2010.

[14] M. Tuba, N. Bacanin, and N. Stanarevic, “Guided artificial bee colony algorithm,” in Proceedings of the 5th European Conference on European Computing Conference, pp. 398–403, 2011.

[15] X.-S. Yang, “Firefly algorithms for multimodal optimization,” Stochastic Algorithms: Foundations and Applications, LNCS, vol. 5792, pp. 169–178, 2009.

[16] E. Tuba, L. Mrkela, and M. Tuba, “Support vector machine parameter tuning using firefly algorithm,” in 26th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 413–418, April 2016.

[17] N. Bacanin and M. Tuba, “Firefly algorithm for cardinality constrained mean-variance portfolio optimization problem with entropy diversity constraint,” The Scientific World Journal, vol. 2014, 2014.

[18] M. Dorigo, M. Birattari, and T. Stutzle, “Ant colony optimization,” IEEE Computational Intelligence Magazine, vol. 1, pp. 28–39, Nov 2006.

[19] R. Jovanovic, M. Tuba, and D. Simian, “An object-oriented framework with corresponding graphical user interface for developing ant colony optimization based algorithms,” WSEAS Transactions on Computers, vol. 7, no. 12, pp. 1948–1957, 2008.

[20] X.-S. Yang and S. Deb, “Cuckoo search via Levy flights,” in World Congress on Nature Biologically Inspired Computing, 2009. NaBIC 2009., pp. 210–214, Dec 2009.

[21] M. Tuba and N. Bacanin, “Jpeg quantization tables selection by the firefly algorithm,” in Multimedia Computing and Systems (ICMCS), 2014 International Conference on, pp. 153–158, April 2014.

[22] R. Singh, A. Oberoi, and N. Goel, “Copy move forgery detection on digital images,” International Journal of Computer Applications, vol. 98, no. 9, pp. 17–22, 2014.

[23] Y. Cao, T. Gao, L. Fan, and Q. Yang, “A robust detection algorithm for copy-move forgery in digital images,” Forensic science international, vol. 214, no. 1, pp. 33–43, 2012.

[24] E. Ardizzone, A. Bruno, and G. Mazzola, “Copy-move forgery detection via texture description,” in Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp. 59–64, ACM, 2010.

[25] E. S. Khan and E. A. Kulkarni, “An efficient method for detection of copy-move forgery using discrete wavelet transform,” International Journal on Computer Science and Engineering, vol. 2, no. 5, pp. 1801–1806, 2010.

[26] D. Cozzolino, G. Poggi, and L. Verdoliva, “Efficient dense field copy-move forgery detection,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2284–2297, 2015.

[27] J. Zhao and J. Guo, “Passive forensics for copymove image forgery using a method based on DCT and SVD,” Forensic science international, vol. 233, no. 1, pp. 158–166, 2013.

[28] D. Tralic, P. L. Rosin, X. Sun, and S. Grgic, “Copy-move forgery detection using cellular automata,” in Cellular Automata in Image Processing and Geometry, pp. 105–125, Springer, 2014.

[29] D. Tralic, S. Grgic, X. Sun, and P. L. Rosin, “Combining cellular automata and local binary patterns for copy-move forgery detection,” Multimedia Tools and Applications, pp. 1–23, 2015.

[30] S. Kumar, J. Desai, and S. Mukherjee, “Copy move forgery detection in contrast variant environment using binary DCT vectors,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 6, pp. 38–44, 2015.

[31] M. Kirchner, P. Schottle, and C. Riess, ¨ “Thinking beyond the block: block matching for copy-move forgery detection revisited,” in SPIE/IS&T Electronic Imaging, pp. 940903– 940903, International Society for Optics and Photonics, 2015.

[32] M. Rubinstein, A. Shamir, and S. Avidan, “Improved seam carving for video retargeting,” ACM Transactions on Graphics (TOG), vol. 27, pp. 16:1–16:9, Aug. 2008.

[33] S. Avidan and A. Shamir, “Seam carving for content-aware image resizing,” in ACM Transactions on graphics (TOG), vol. 26, p. 10, ACM, 2007.

[34] W. Zhang, X. Cao, J. Zhang, J. Zhu, and P. Wang, “Detecting photographic composites using shadows,” in 2009 IEEE International Conference on Multimedia and Expo, pp. 1042– 1045, IEEE, 2009.

[35] Q. Liu, X. Cao, C. Deng, and X. Guo, “Identifying image composites through shadow matte consistency,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1111–1122, 2011.

[36] E. Kee, J. F. O’Brien, and H. Farid, “Exposing photo manipulation with inconsistent shadows,” ACM Transactions on Graphics (ToG), vol. 32, no. 3, p. 28, 2013.

[37] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, “Copy-move forgery detection and localization by means of robust clustering with j-linkage,” Signal Processing: Image Communication, vol. 28, no. 6, pp. 659– 669, 2013.

[38] V. Anand, M. F. Hashmi, and A. G. Keskar, “A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and sift methods,” in Asian Conference on Intelligent Information and Database Systems, pp. 530–542, Springer, 2014.

[39] E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, “Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes,” Journal of Visual Communication and Image Representation, vol. 29, pp. 16–32, 2015.

[40] M. F. Hashmi, A. R. Hambarde, and A. G. Keskar, “Copy move forgery detection using DWT and SIFT features,” in 13th International Conference on Intellient Systems Design and Applications, pp. 188–193, IEEE, 2013.

[41] H.-J. Lin, C.-W. Wang, Y.-T. Kao, et al., “Fast copy-move forgery detection,” WSEAS Transactions on Signal Processing, vol. 5, no. 5, pp. 188–197, 2009.

[42] D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, “CoMoFoD - new database for copy-move forgery detection,” in 55th International Symposium ELMAR, pp. 49–54, Sept 2013.

WSEAS Transactions on Signal Processing, ISSN / E-ISSN: 1790-5052 / 2224-3488, Volume 13, 2017, Art. #1, pp. 1-12


Copyright © 2017 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site