DFE Approach for CMFD on Digital Images - A Review and Performance Evaluation  
  Authors : Arun Anoop M; Poonkuntran S

 

In today's advanced age the reliable towards picture is twisting a direct result of malicious forgery images. The issues identified with the security have prompted the examination center towards tampering detection. As the source image also, the objective locales are from a similar picture so that copy move forgery is very effective in image manipulation due to its same properties such as temperature, color, noise and illumination conditions. In this article, we added preliminary research methods (existing algorithms). We used hybrid approaches of existing algorithms. The performance is evaluated in terms of normally used parameters precision and recall with improved results. Thus, the proposed CMFD can manage all the image processing operations. Finally made a comparative analysis based on some parameters.

 

Published In : IJCAT Journal Volume 5, Issue 11

Date of Publication : November 2018

Pages : 148-159

Figures :15

Tables :07

Publication Link :DFE Approach for CMFD on Digital Images - A Review and Performance Evaluation

 

 

 

Arun Anoop M : obtained his BTech in Computer Science and Engineering from cochin university( College of Engineering, Thalassery, Kannur, Kerala(Under CAPE)). He completed his PG diploma in information security and system administration from DOEACC center, NIT , Calicut,Kerala and obtained his MTech in Information Technology from kalasalingam university, TamilNadu. Presently he is a PhD scholar under the supervision of Dr.S.Poonkuntran (Anna University, Chennai). His research center is Velammal College of Engineering & Technology, Viraganoor, Madurai, TamilNadu, India. He worked as an Assistant Professor in Computer Science and Engineering, MES College of Engineering, kuttippuram, kerala. Now he is on study leave for doing his FullTime PhD. Before joining MESCE he worked as teaching assistant in Information Technology, Kalasalingam university, krishnankoil, Tamilnadu. He is having 4 years of teaching experience at MESCE and 6months teaching experience at Kalasalingam University. He has attended 9 workshops, 4 FDPs. He served as a business development coordinator, Innoworld solutions, Pondicherry. His areas of interest are network security, Wireless Sensor Networks, digital forensics, Image Forensics, Multimedia security, Ethical Hacking. He has 12 International Journals. He has presented 12 International Conferences. He has presented 5 National conferences. He has written 3 books in Computer Science. He is a EC-Council certified Ethical Hacker v9 and Computer Hacking Forensics Investigator. He is a reviewer of IJCTT. He is hailing from Mattanur , Kannur (Dt.),Kerala.

Poonkuntran S. : received B.E inInformation Technology from Bharathidasan University, Tiruchirapalli, India in 2003, M.Tech and Ph.D in Computer and Information Technology from Manonmaniam Sundaranar University, Tirunelveli, India in 2005 and 2011 respectively. He is presently working as a Professor and Head in Velammal College of Engineering and Technology, Madurai, Tamilnadu, India and executing three funded research grants from ISRO, India, DRDO, New Delhi and MNRE, New Delhi. He is having 12+ years of experience in teaching and research. He is a life time member of IACSIT, Singapore, CSI, India and ISTE, India. He has published papers in 4 national conferences, 38 international conferences, 1 national journal and 18 international journals on image processing, information security and soft computing. He has written 7 books in Computer Science. He was the State Level Student Coordinator Position for Region VII, CSI, India in 2016-17. Presently he is working on Computer Vision for under water autonomous vehicles and Information Security for Healthcare Information Systems. His areas of research interest include digital image processing, soft computing, energy aware computing and computer vision.

 

 

 

 

 

 

 

Copy move forgery detection(CMFD), Zernike Moments(ZM), Weber Local Descriptors(WLD), copy move forgery, blockbased, feature extraction, matching, tampering

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Thus, the paper solved the problem of image authenticity using the combination of Zernike Moments and Weber local descriptors. DFE approach will work only if we have 2images (original and forged). Two feature extraction combination is our preliminary approach. In the future, we will apply clue removal attacks also before post processing stage. In our next work, we will deal with the same to test for robustness, accuracy tests against attacks like AWGN, Gaussian Blur, Gaussian Noise, rotation (Clues removal attack once normal image processing attacks finished). And we will deal with medical images like mammograms and radiographic images like x-ray images and assure authenticity of images.

 

 

 

 

 

 

 

 

 

[1] Arun Anoop M, "Image forgery and its detection: A survey", 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS),IEEE, March 2015. [2] Vincent Christlein, Christian Riess, ,Johannes Jordan, Corinna Riess, and Elli Angelopoulou," An Evaluation of Popular Copy-Move Forgery Detection Approaches",IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,26 Nov 2012. [3] V.Suresh, T.Primya, G. Kanagaraj," Efficient Detection Technique for Image Forgery", International Journal of Imaging Science and Pattern Recognition Volume 1 Issue 1,2017. [4] Meenal Shandilya, Ruchira Naskar, " Detection of Geometric Transformations in Copy-Move Forgery of Digital Images", Master Thesis, NIT,Rourkela,June 2015. [5] Anushree U. Tembe, Supriya S. Thombre," Copy-Paste Forgery Detection in Digital Image Forensic", IJSRSET | Volume 3 | Issue 2,2017 [6] Rani Susan Oommen and Dr. Jayamohan M," A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES", International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 4, August 2015 [7] R.C. Pandey, S. K. Singh, and K. K. Shukla," A FULLY AUTOMATED BLIND AND PASSIVE FORENSIC METHOD FOR IMAGE SPLICING DETECTION", I J C T A, 9(41) 2016, pp. 899-908 [8] Anil Dada Warbhe, R. V. Dharaskar, V. M. Thakare," A Survey on Keypoint Based Copy-Paste Forgery Detection Techniques", International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA(ScienceDirect, Procedia Computer Science 78 ( 2016 ) 61 - 67). [9] Yongzhen Ke, Weidong Min, Fan Qin, Junjun Shang," Image Forgery Detection Based on Semantics", International Journal of Hybrid Information tehcnology,vol.7, No.1 (2014),pp. 109-124 [10] Xunyu Pan. Xing Zhang, Siwei Lyu, " Exposing Image Forgery with Blind Noise Estimation", MM&Sec'11, ACM, September 29-30, 2011, Buffalo, New York, USA. [11] P M Panchal, S R Panchal, S K Shah," A Comparison of SIFT and SURF", International Journal of Innovative Research in Computer and Communication Engineering,Vol. 1, Issue 2, April 2013 [12] SITI FADZLUN MD SALLEH, MOHD FOAD ROHANI, MOHD AIZAINI MAAROF,"COPY-MOVE FORGERY DETECTION: A SURVEY ON TIME COMPLEXITY ISSUES AND SOLUTIONS", Journal of Theoretical and Applied Information Technology 15th June 2017. Vol.95. No 11. [13] Geethu N Nadh, Sreelatha S.H," Contrast Enhancement Detection on Digital Images - A Survey", International Journal Of Engineering And Computer Science ISSN:2319-7242 , Volume 4 Issue 7 July 2015, Page No. 13465-13467. [14] Nishmitha M.R and Aravind Naik,"COMPARISON OF THREE TECHNIQUES OF IMAGE FORGERY DETECTION", International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE),ISSN: 0976-1353 Volume 14 Issue 2 -APRIL 2015. [15] Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee," Detection of Copy-Rotate-Move Forgery Using Zernike Moments", LNCS 6387, pp. 51-65, 2010 [16] Keerthi Priya, Vishnukanth Karwa P," A Novel Image Localization Method for Image Forgery",IJIRCCE, Vol. 5, Issue 5, May 2017 [17] Hansoo Kim and Joong Lee," An Implementation and Pragmatic Analysis of the Digital Image Forgery Detection Schemes", International Journal of Future Computer and Communication, Vol. 4, No. 5, October 2015 [18] Musaed Alhussein," Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine", 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation. [19] Ng TT, Chang SF, Hsu J, Pepeljugoski M. "Columbia photographic images and photorealistic computer graphics dataset." ADVENT, Columbia University, Technical Report. 2005. [20] Michael V. Boland,2Mia K. Markey,1and Robert F. Murphy1*, ``Automated Recognition of Patterns Characteristic of Subcellular Structures in Fluorescence Microscopy Images,`` 1998 Wiley-Liss, Inc., RECOGNITION OF CELLULAR LOCALIZATION PATTERNS, pp366-375. [21] Arun Anoop M, Poonkuntran S, ``Certain investigation on Biomedical impression and Image Forgery Detection,`` International Journal of Biomedical Engineering and Technology (Inderscience.) [22] Arun Anoop M, Poonkuntran S, ``A Brief study on "Multimedia Security" In Research``, ISBN-13:978-93- 86258-63-2, FIRST EDITION,JULY 2017,VSRD Academic Publishing. [23] Michael Vorobyov,``Shape Classification Using Zernike Moments, ``Available: https://www.slideserve.com/rivka/shape-classificationusing- zernike-moments. [24] Jie Chen,Shiguang Shan, Chu He, Guoying Zhao,Matti Pietikainen, Xilin Chen, Wen Gao,``WLD: A Robust Local Image Descriptor,``IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 9, SEPTEMBER 2010, pp 1705-1720. [25] Chen-Ming Hsu, Jen-Chun Lee, Wei-Kuei Chen," An Efficient detection algorithm for Copy-Move Forgery",IEEE, 2015 10th Asia Joint Conference on Information Security, DOI: 10.1109/AsiaJCIS.2015.16 [26] Luo Juan, Oubong Gwun," A Comparison of SIFT, PCASIFT and SURF", International Journal of Image Processing (IJIP) Volume(3), Issue(4). [27] Anuja Dixit , Rahul Dixit and R. K. Gupta," DCT and DWT Based Methods for Detecting Copy-Move Image Forgery: A Review", International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.9, No.10, (2016), pp.249-258. [28] Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad," IMAGE COMPOSITE DETECTION USING CUSTOMIZED", International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.3, October 2011 [29] Jen-Chun Lee, Chien-Ping Chang, Wei-Kuei Chen," Detection of copy-move image forgery using histogram of orientated gradients," 2015, DOI: 10.1016/j.ins.2015.03.009 [30] Kavya Sharma," Computationally Efficient Copy-Move Image Forgery Detection Based on DCT and SVD," Advanced Research in Electrical and Electronic Engineering ,Volume 1, Number 3 (2014) pp. 76-81 [31] Kavya Sharma, Shweta Meena, UmeshGhanekar3," Hybrid Technique for Copy-Move Forgery Detection TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,26 Nov 2012. [3] V.Suresh, T.Primya, G. Kanagaraj," Efficient Detection Technique for Image Forgery", International Journal of Imaging Science and Pattern Recognition Volume 1 Issue 1,2017. [4] Meenal Shandilya, Ruchira Naskar, " Detection of Geometric Transformations in Copy-Move Forgery of Digital Images", Master Thesis, NIT,Rourkela,June 2015. [5] Anushree U. Tembe, Supriya S. Thombre," Copy-Paste Forgery Detection in Digital Image Forensic", IJSRSET | Volume 3 | Issue 2,2017 [6] Rani Susan Oommen and Dr. Jayamohan M," A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES", International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 4, August 2015 [7] R.C. Pandey, S. K. Singh, and K. K. Shukla," A FULLY AUTOMATED BLIND AND PASSIVE FORENSIC METHOD FOR IMAGE SPLICING DETECTION", I J C T A, 9(41) 2016, pp. 899-908 [8] Anil Dada Warbhe, R. V. Dharaskar, V. M. Thakare," A Survey on Keypoint Based Copy-Paste Forgery Detection Techniques", International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA(ScienceDirect, Procedia Computer Science 78 ( 2016 ) 61 - 67). [9] Yongzhen Ke, Weidong Min, Fan Qin, Junjun Shang," Image Forgery Detection Based on Semantics", International Journal of Hybrid Information tehcnology,vol.7, No.1 (2014),pp. 109-124 [10] Xunyu Pan. Xing Zhang, Siwei Lyu, " Exposing Image Forgery with Blind Noise Estimation", MM&Sec'11, ACM, September 29-30, 2011, Buffalo, New York, USA. [11] P M Panchal, S R Panchal, S K Shah," A Comparison of SIFT and SURF", International Journal of Innovative Research in Computer and Communication Engineering,Vol. 1, Issue 2, April 2013 [12] SITI FADZLUN MD SALLEH, MOHD FOAD ROHANI, MOHD AIZAINI MAAROF,"COPY-MOVE FORGERY DETECTION: A SURVEY ON TIME COMPLEXITY ISSUES AND SOLUTIONS", Journal of Theoretical and Applied Information Technology 15th June 2017. Vol.95. No 11. [13] Geethu N Nadh, Sreelatha S.H," Contrast Enhancement Detection on Digital Images - A Survey", International Journal Of Engineering And Computer Science ISSN:2319-7242 , Volume 4 Issue 7 July 2015, Page No. 13465-13467. [14] Nishmitha M.R and Aravind Naik,"COMPARISON OF THREE TECHNIQUES OF IMAGE FORGERY DETECTION", International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE),ISSN: 0976-1353 Volume 14 Issue 2 -APRIL 2015. [15] Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee," Detection of Copy-Rotate-Move Forgery Using Zernike Moments", LNCS 6387, pp. 51-65, 2010 [16] Keerthi Priya, Vishnukanth Karwa P," A Novel Image Localization Method for Image Forgery",IJIRCCE, Vol. 5, Issue 5, May 2017 [17] Hansoo Kim and Joong Lee," An Implementation and Pragmatic Analysis of the Digital Image Forgery Detection Schemes", International Journal of Future Computer and Communication, Vol. 4, No. 5, October 2015 [18] Musaed Alhussein," Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine", 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation. [19] Ng TT, Chang SF, Hsu J, Pepeljugoski M. "Columbia photographic images and photorealistic computer graphics dataset." ADVENT, Columbia University, Technical Report. 2005. [20] Michael V. Boland,2Mia K. Markey,1and Robert F. Murphy1*, ``Automated Recognition of Patterns Characteristic of Subcellular Structures in Fluorescence Microscopy Images,`` 1998 Wiley-Liss, Inc., RECOGNITION OF CELLULAR LOCALIZATION PATTERNS, pp366-375. [21] Arun Anoop M, Poonkuntran S, ``Certain investigation on Biomedical impression and Image Forgery Detection,`` International Journal of Biomedical Engineering and Technology (Inderscience.) [22] Arun Anoop M, Poonkuntran S, ``A Brief study on "Multimedia Security" In Research``, ISBN-13:978-93- 86258-63-2, FIRST EDITION,JULY 2017,VSRD Academic Publishing. [23] Michael Vorobyov,``Shape Classification Using Zernike Moments, ``Available: https://www.slideserve.com/rivka/shape-classificationusing- zernike-moments. [24] Jie Chen,Shiguang Shan, Chu He, Guoying Zhao,Matti Pietikainen, Xilin Chen, Wen Gao,``WLD: A Robust Local Image Descriptor,``IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 9, SEPTEMBER 2010, pp 1705-1720. [25] Chen-Ming Hsu, Jen-Chun Lee, Wei-Kuei Chen," An Efficient detection algorithm for Copy-Move Forgery",IEEE, 2015 10th Asia Joint Conference on Information Security, DOI: 10.1109/AsiaJCIS.2015.16 [26] Luo Juan, Oubong Gwun," A Comparison of SIFT, PCASIFT and SURF", International Journal of Image Processing (IJIP) Volume(3), Issue(4). [27] Anuja Dixit , Rahul Dixit and R. K. Gupta," DCT and DWT Based Methods for Detecting Copy-Move Image Forgery: A Review", International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.9, No.10, (2016), pp.249-258. [28] Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad," IMAGE COMPOSITE DETECTION USING CUSTOMIZED", International Journal of Computer Graphics & Animation (IJCGA) Vol.1, No.3, October 2011 [29] Jen-Chun Lee, Chien-Ping Chang, Wei-Kuei Chen," Detection of copy-move image forgery using histogram of orientated gradients," 2015, DOI: 10.1016/j.ins.2015.03.009 [30] Kavya Sharma," Computationally Efficient Copy-Move Image Forgery Detection Based on DCT and SVD," Advanced Research in Electrical and Electronic Engineering ,Volume 1, Number 3 (2014) pp. 76-81 [31] Kavya Sharma, Shweta Meena, UmeshGhanekar3," Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space," Int. Journal of Electrical & Electronics Engg.,Vol. 2, Spl. Issue 1 (2015) . [32] Toqeer Mahmood, Tabassam Nawaz, Zahid Mehmood , Zakir Khan, Mohsin Shah, Rehan Ashraf," Forensic Analysis of Copy-Move Forgery in Digital Images Using the Stationary Wavelets," IEEE, pp576-583,2016. [33] Jie Zhao, Jichang Guo," Passive forensics for copymove image forgery using a method based on DCT and SVD," Forensic Science International 233 (2013) 158-166, DOI: 10.1016/j.forsciint.2013.09.013 [34] Singh, Vivek Kumar, and R. C. Tripathi. "Fast and efficient region duplication detection in digital images using sub-blocking method." international journal of advanced science and technology, Vol. 35, No. 1, pp. 93- 102, 2011. [35] Kodak dataset, Available: http://r0k.us/graphics/kodak/ [36] CoMoFoD dataset, Available: http://www.vcl.fer.hr/comofod/ [37] Columbia University dataset, Available: http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSpl icedDataSet/AuthSplicedData Set.htm [38] CASIA dataset. Available: forensics.idealtest.org [39] USC-SIPI dataset, Available: sipi.usc.edu/database [40] HOG, Available: https://www.learnopencv.com/histogramof- oriented-gradients/ [41] Nishmitha M.R and Aravind Naik," COMPARISON OF THREE TECHNIQUES OF IMAGE FORGERY DETECTION," International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) , Volume 14 Issue 2 -APRIL 2015 [42] Meera Mary Isaac, Dr. M. Wilscy," A Key point based Copy-Move Forgery Detection using HOG features,"IEEE,2016. [43] GLCM,Available: https://www.ucalgary.ca/mhallbey/glcm1 [44] EXIFTool,Available: https://www.sno.phy.queensu.ca/~phil/exiftool/ [45] Jeffrey's Image metadata viewer, Available: http://exif.regex.info/exif.cgi [46] EXIF-removal,Available: https://www.makeuseof.com/tag/3-ways-to-remove-exifmetadata- from-photos-and-why-you-might-want-to/ [47] Hex-editor,Available: https://en.wikipedia.org/wiki/Hex_editor [48] Qazi, Tanzeela. "Survey on blind image forgery detection." IET , 2013. [49] Ali Qureshi, M., and M. Deriche. "A review on copy move image forgery detection techniques." IEEE, 2014 [50] Huang, Hailing, Weiqiang Guo, and Yu Zhang. "Detection of copy-move forgery in digital images using SIFT algorithm." IEEE, 2008. [51] Meera Mary Isaac, Dr. M. Wilscy," A Key point based Copy-Move Forgery Detection using HOG features," 2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT],IEEE, 2016.