AUTHORS: Eva Tuba, Raka Jovanovic, Milan Tuba
Download as PDF
ABSTRACT: Digital image forgery is one of the problems that, besides many benefits, appears with widespread use of digital images in all areas of life. Unfortunately, with rapidly developing and increasingly more powerful hardware and software, not only is digital photography manipulation for legitimate goals easier, but also for the forgery. One well-known forgery of digital images is the so-called copy-move forgery where one part of the image is copied to another location in the same image. In this paper we proposed an ovarlaping block-based method for detection of copy-move forgery. It uses overlaping blocks of the size 16*16 and only three features extracted from such blocks. Huge amount of computation is reduced by using bin-sort algorithm. The proposed method was tested on standard benchmark images and in spite of its simplicity it proved to be very successful.
KEYWORDS: Digital image forensics, image forgery detection, copy-move forgery detection, block-based forgery detection algorithm
REFERENCES:
[1] L. Li, S. Li, H. Zhu, and X. Wu, “Detecting copy-move forgery under affine transforms for image forensics,” Computers & Electrical Engineering, vol. 40, no. 6, pp. 1951–1962, 2014.
[2] V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches,” IEEE Transactions on information forensics and security, vol. 7, no. 6, pp. 1841–1854, 2012.
[3] O. M. Al-Qershi and B. E. Khoo, “Passive detection of copy-move forgery in digital images: State-of-the-art,” Forensic science international, vol. 231, no. 1, pp. 284–295, 2013.
[4] Z. Haddad, Y. Chen, and J. L. Krahe, Image Processing and Pattern Recognition Tools for the Automatic Image Transcription, pp. 197– 203. Cham: Springer International Publishing, 2016.
[5] E. Tuba and N. Bacanin, “An algorithm for handwritten digit recognition using projection histograms and SVM classifier,” in 23rd Telecommunications Forum Telfor (TELFOR), pp. 464–467, Nov 2015.
[6] M. Jordanski, A. Arsic, and M. Tuba, “Dynamic recursive subimage histogram equalization algorithm for image contrast enhancement,” in 23rd Telecommunications Forum Telfor (TELFOR), pp. 819–822, Nov 2015.
[7] M. Tuba, “Multilevel image thresholding by nature-inspired algorithms-a short review,” The Computer Science Journal of Moldova, vol. 22, no. 3, pp. 318–338, 2014.
[8] I. Brajevic and M. Tuba, Cuckoo Search and Firefly Algorithm Applied to Multilevel Image Thresholding, pp. 115–139. Cham: Springer International Publishing, 2014.
[9] M. Tuba, N. Bacanin, and A. Alihodzic, “Multilevel image thresholding by fireworks algorithm,” in 25th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 326–330, April 2015.
[10] A. Alihodzic and M. Tuba, “Improved bat algorithm applied to multilevel image thresholding,” The Scientific World Journal, vol. 2014, p. 16, 2014.
[11] X.-S. Yang, “A new metaheuristic batinspired algorithm,” Studies in Computational Intelligence, vol. 284, pp. 65–74, November 2010.
[12] D. Karaboga, “An idea based on honey bee swarm for numerical optimization,” Technical Report - TR06, pp. 1–10, 2005.
[13] M. Subotic, M. Tuba, and N. Stanarevic, “Parallelization of the artificial bee colony (ABC) algorithm,” in Proceedings of the 11th WSEAS International Conference on Nural Networks and 11th WSEAS International Conference on Evolutionary Computing and 11th WSEAS International Conference on Fuzzy Systems, pp. 191–196, 2010.
[14] M. Tuba, N. Bacanin, and N. Stanarevic, “Guided artificial bee colony algorithm,” in Proceedings of the 5th European Conference on European Computing Conference, pp. 398–403, 2011.
[15] X.-S. Yang, “Firefly algorithms for multimodal optimization,” Stochastic Algorithms: Foundations and Applications, LNCS, vol. 5792, pp. 169–178, 2009.
[16] E. Tuba, L. Mrkela, and M. Tuba, “Support vector machine parameter tuning using firefly algorithm,” in 26th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 413–418, April 2016.
[17] N. Bacanin and M. Tuba, “Firefly algorithm for cardinality constrained mean-variance portfolio optimization problem with entropy diversity constraint,” The Scientific World Journal, vol. 2014, 2014.
[18] M. Dorigo, M. Birattari, and T. Stutzle, “Ant colony optimization,” IEEE Computational Intelligence Magazine, vol. 1, pp. 28–39, Nov 2006.
[19] R. Jovanovic, M. Tuba, and D. Simian, “An object-oriented framework with corresponding graphical user interface for developing ant colony optimization based algorithms,” WSEAS Transactions on Computers, vol. 7, no. 12, pp. 1948–1957, 2008.
[20] X.-S. Yang and S. Deb, “Cuckoo search via Levy flights,” in World Congress on Nature Biologically Inspired Computing, 2009. NaBIC 2009., pp. 210–214, Dec 2009.
[21] M. Tuba and N. Bacanin, “Jpeg quantization tables selection by the firefly algorithm,” in Multimedia Computing and Systems (ICMCS), 2014 International Conference on, pp. 153–158, April 2014.
[22] R. Singh, A. Oberoi, and N. Goel, “Copy move forgery detection on digital images,” International Journal of Computer Applications, vol. 98, no. 9, pp. 17–22, 2014.
[23] Y. Cao, T. Gao, L. Fan, and Q. Yang, “A robust detection algorithm for copy-move forgery in digital images,” Forensic science international, vol. 214, no. 1, pp. 33–43, 2012.
[24] E. Ardizzone, A. Bruno, and G. Mazzola, “Copy-move forgery detection via texture description,” in Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp. 59–64, ACM, 2010.
[25] E. S. Khan and E. A. Kulkarni, “An efficient method for detection of copy-move forgery using discrete wavelet transform,” International Journal on Computer Science and Engineering, vol. 2, no. 5, pp. 1801–1806, 2010.
[26] D. Cozzolino, G. Poggi, and L. Verdoliva, “Efficient dense field copy-move forgery detection,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2284–2297, 2015.
[27] J. Zhao and J. Guo, “Passive forensics for copymove image forgery using a method based on DCT and SVD,” Forensic science international, vol. 233, no. 1, pp. 158–166, 2013.
[28] D. Tralic, P. L. Rosin, X. Sun, and S. Grgic, “Copy-move forgery detection using cellular automata,” in Cellular Automata in Image Processing and Geometry, pp. 105–125, Springer, 2014.
[29] D. Tralic, S. Grgic, X. Sun, and P. L. Rosin, “Combining cellular automata and local binary patterns for copy-move forgery detection,” Multimedia Tools and Applications, pp. 1–23, 2015.
[30] S. Kumar, J. Desai, and S. Mukherjee, “Copy move forgery detection in contrast variant environment using binary DCT vectors,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 6, pp. 38–44, 2015.
[31] M. Kirchner, P. Schottle, and C. Riess, ¨ “Thinking beyond the block: block matching for copy-move forgery detection revisited,” in SPIE/IS&T Electronic Imaging, pp. 940903– 940903, International Society for Optics and Photonics, 2015.
[32] M. Rubinstein, A. Shamir, and S. Avidan, “Improved seam carving for video retargeting,” ACM Transactions on Graphics (TOG), vol. 27, pp. 16:1–16:9, Aug. 2008.
[33] S. Avidan and A. Shamir, “Seam carving for content-aware image resizing,” in ACM Transactions on graphics (TOG), vol. 26, p. 10, ACM, 2007.
[34] W. Zhang, X. Cao, J. Zhang, J. Zhu, and P. Wang, “Detecting photographic composites using shadows,” in 2009 IEEE International Conference on Multimedia and Expo, pp. 1042– 1045, IEEE, 2009.
[35] Q. Liu, X. Cao, C. Deng, and X. Guo, “Identifying image composites through shadow matte consistency,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1111–1122, 2011.
[36] E. Kee, J. F. O’Brien, and H. Farid, “Exposing photo manipulation with inconsistent shadows,” ACM Transactions on Graphics (ToG), vol. 32, no. 3, p. 28, 2013.
[37] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, “Copy-move forgery detection and localization by means of robust clustering with j-linkage,” Signal Processing: Image Communication, vol. 28, no. 6, pp. 659– 669, 2013.
[38] V. Anand, M. F. Hashmi, and A. G. Keskar, “A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and sift methods,” in Asian Conference on Intelligent Information and Database Systems, pp. 530–542, Springer, 2014.
[39] E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, “Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes,” Journal of Visual Communication and Image Representation, vol. 29, pp. 16–32, 2015.
[40] M. F. Hashmi, A. R. Hambarde, and A. G. Keskar, “Copy move forgery detection using DWT and SIFT features,” in 13th International Conference on Intellient Systems Design and Applications, pp. 188–193, IEEE, 2013.
[41] H.-J. Lin, C.-W. Wang, Y.-T. Kao, et al., “Fast copy-move forgery detection,” WSEAS Transactions on Signal Processing, vol. 5, no. 5, pp. 188–197, 2009.
[42] D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, “CoMoFoD - new database for copy-move forgery detection,” in 55th International Symposium ELMAR, pp. 49–54, Sept 2013.