In today's advanced age the reliable towards picture is twisting a direct result of malicious forgery images. The issues
identified with the security have prompted the examination center towards tampering detection. As the source image also, the objective
locales are from a similar picture so that copy move forgery is very effective in image manipulation due to its same properties such as
temperature, color, noise and illumination conditions. In this article, we added preliminary research methods (existing algorithms). We
used hybrid approaches of existing algorithms. The performance is evaluated in terms of normally used parameters precision and recall
with improved results. Thus, the proposed CMFD can manage all the image processing operations. Finally made a comparative analysis
based on some parameters.
Arun Anoop M : obtained his BTech in Computer Science and
Engineering from cochin university( College of Engineering,
Thalassery, Kannur, Kerala(Under CAPE)). He completed his PG
diploma in information security and system administration from DOEACC center, NIT , Calicut,Kerala and obtained his MTech in
Information Technology from kalasalingam university, TamilNadu.
Presently he is a PhD scholar under the supervision of
Dr.S.Poonkuntran (Anna University, Chennai). His research center
is Velammal College of Engineering & Technology, Viraganoor,
Madurai, TamilNadu, India. He worked as an Assistant Professor
in Computer Science and Engineering, MES College of
Engineering, kuttippuram, kerala. Now he is on study leave for
doing his FullTime PhD. Before joining MESCE he worked as
teaching assistant in Information Technology, Kalasalingam
university, krishnankoil, Tamilnadu. He is having 4 years of
teaching experience at MESCE and 6months teaching experience
at Kalasalingam University. He has attended 9 workshops, 4
FDPs. He served as a business development coordinator,
Innoworld solutions, Pondicherry. His areas of interest are
network security, Wireless Sensor Networks, digital forensics,
Image Forensics, Multimedia security, Ethical Hacking. He has 12
International Journals. He has presented 12 International
Conferences. He has presented 5 National conferences. He has
written 3 books in Computer Science. He is a EC-Council certified
Ethical Hacker v9 and Computer Hacking Forensics Investigator.
He is a reviewer of IJCTT. He is hailing from Mattanur , Kannur
(Dt.),Kerala.
Poonkuntran S. : received B.E inInformation Technology
from Bharathidasan University, Tiruchirapalli, India in 2003,
M.Tech and Ph.D in Computer and Information Technology from
Manonmaniam Sundaranar University, Tirunelveli, India in 2005
and 2011 respectively. He is presently working as a Professor and
Head in Velammal College of Engineering and Technology,
Madurai, Tamilnadu, India and executing three funded research
grants from ISRO, India, DRDO, New Delhi and MNRE, New
Delhi. He is having 12+ years of experience in teaching and
research. He is a life time member of IACSIT, Singapore, CSI,
India and ISTE, India. He has published papers in 4 national
conferences, 38 international conferences, 1 national journal and
18 international journals on image processing, information security
and soft computing. He has written 7 books in Computer Science.
He was the State Level Student Coordinator Position for Region
VII, CSI, India in 2016-17. Presently he is working on Computer
Vision for under water autonomous vehicles and Information
Security for Healthcare Information Systems. His areas of
research interest include digital image processing, soft computing,
energy aware computing and computer vision.
Thus, the paper solved the problem of image
authenticity using the combination of Zernike
Moments and Weber local descriptors. DFE
approach will work only if we have 2images
(original and forged). Two feature extraction
combination is our preliminary approach. In the
future, we will apply clue removal attacks also
before post processing stage. In our next work, we
will deal with the same to test for robustness,
accuracy tests against attacks like AWGN, Gaussian
Blur, Gaussian Noise, rotation (Clues removal attack once normal image processing attacks finished). And
we will deal with medical images like mammograms
and radiographic images like x-ray images and
assure authenticity of images.
[1] Arun Anoop M, "Image forgery and its detection: A
survey", 2015 International Conference on
Innovations in Information, Embedded and
Communication Systems (ICIIECS),IEEE, March
2015.
[2] Vincent Christlein, Christian Riess, ,Johannes Jordan,
Corinna Riess, and Elli Angelopoulou," An Evaluation of
Popular Copy-Move Forgery Detection Approaches",IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY,26 Nov 2012.
[3] V.Suresh, T.Primya, G. Kanagaraj," Efficient Detection
Technique for Image Forgery", International Journal of
Imaging Science and Pattern Recognition Volume 1 Issue
1,2017.
[4] Meenal Shandilya, Ruchira Naskar, " Detection of
Geometric Transformations in Copy-Move Forgery of
Digital Images", Master Thesis, NIT,Rourkela,June 2015.
[5] Anushree U. Tembe, Supriya S. Thombre," Copy-Paste
Forgery Detection in Digital Image Forensic", IJSRSET |
Volume 3 | Issue 2,2017
[6] Rani Susan Oommen and Dr. Jayamohan M," A HYBRID
COPY-MOVE FORGERY DETECTION TECHNIQUE
USING REGIONAL SIMILARITY INDICES",
International Journal of Computer Science & Information
Technology (IJCSIT) Vol 7, No 4, August 2015
[7] R.C. Pandey, S. K. Singh, and K. K. Shukla," A FULLY
AUTOMATED BLIND AND PASSIVE FORENSIC
METHOD FOR IMAGE SPLICING DETECTION", I J C
T A, 9(41) 2016, pp. 899-908
[8] Anil Dada Warbhe, R. V. Dharaskar, V. M. Thakare," A
Survey on Keypoint Based Copy-Paste Forgery Detection
Techniques", International Conference on Information
Security & Privacy (ICISP2015), 11-12 December 2015,
Nagpur, INDIA(ScienceDirect, Procedia Computer
Science 78 ( 2016 ) 61 - 67).
[9] Yongzhen Ke, Weidong Min, Fan Qin, Junjun Shang,"
Image Forgery Detection Based on Semantics",
International Journal of Hybrid Information
tehcnology,vol.7, No.1 (2014),pp. 109-124
[10] Xunyu Pan. Xing Zhang, Siwei Lyu, " Exposing Image
Forgery with Blind Noise Estimation", MM&Sec'11,
ACM, September 29-30, 2011, Buffalo, New York, USA.
[11] P M Panchal, S R Panchal, S K Shah," A Comparison of
SIFT and SURF", International Journal of Innovative
Research in Computer and Communication
Engineering,Vol. 1, Issue 2, April 2013
[12] SITI FADZLUN MD SALLEH, MOHD FOAD ROHANI,
MOHD AIZAINI MAAROF,"COPY-MOVE FORGERY
DETECTION: A SURVEY ON TIME COMPLEXITY
ISSUES AND SOLUTIONS", Journal of Theoretical and
Applied Information Technology 15th June 2017. Vol.95.
No 11.
[13] Geethu N Nadh, Sreelatha S.H," Contrast Enhancement
Detection on Digital Images - A Survey", International
Journal Of Engineering And Computer Science
ISSN:2319-7242 , Volume 4 Issue 7 July 2015, Page No.
13465-13467.
[14] Nishmitha M.R and Aravind Naik,"COMPARISON OF
THREE TECHNIQUES OF IMAGE FORGERY
DETECTION", International Journal of Emerging
Technology in Computer Science & Electronics
(IJETCSE),ISSN: 0976-1353 Volume 14 Issue 2 -APRIL
2015.
[15] Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee,"
Detection of Copy-Rotate-Move Forgery Using Zernike
Moments", LNCS 6387, pp. 51-65, 2010
[16] Keerthi Priya, Vishnukanth Karwa P," A Novel Image
Localization Method for Image Forgery",IJIRCCE, Vol. 5,
Issue 5, May 2017
[17] Hansoo Kim and Joong Lee," An Implementation and
Pragmatic Analysis of the Digital Image Forgery Detection
Schemes", International Journal of Future Computer and
Communication, Vol. 4, No. 5, October 2015
[18] Musaed Alhussein," Image Tampering Detection Based on
Local Texture Descriptor and Extreme Learning
Machine", 2016 UKSim-AMSS 18th International
Conference on Computer Modelling and Simulation.
[19] Ng TT, Chang SF, Hsu J, Pepeljugoski M. "Columbia
photographic images and photorealistic computer graphics
dataset." ADVENT, Columbia University, Technical
Report. 2005.
[20] Michael V. Boland,2Mia K. Markey,1and Robert F.
Murphy1*, ``Automated Recognition of Patterns
Characteristic of Subcellular Structures in Fluorescence
Microscopy Images,`` 1998 Wiley-Liss, Inc.,
RECOGNITION OF CELLULAR LOCALIZATION
PATTERNS, pp366-375.
[21] Arun Anoop M, Poonkuntran S, ``Certain investigation on
Biomedical impression and Image Forgery Detection,``
International Journal of Biomedical Engineering and
Technology (Inderscience.)
[22] Arun Anoop M, Poonkuntran S, ``A Brief study on
"Multimedia Security" In Research``, ISBN-13:978-93-
86258-63-2, FIRST EDITION,JULY 2017,VSRD
Academic Publishing.
[23] Michael Vorobyov,``Shape Classification Using Zernike
Moments, ``Available:
https://www.slideserve.com/rivka/shape-classificationusing-
zernike-moments.
[24] Jie Chen,Shiguang Shan, Chu He, Guoying Zhao,Matti
Pietikainen, Xilin Chen, Wen Gao,``WLD: A Robust
Local Image Descriptor,``IEEE TRANSACTIONS ON
PATTERN ANALYSIS AND MACHINE
INTELLIGENCE, VOL. 32, NO. 9, SEPTEMBER 2010,
pp 1705-1720.
[25] Chen-Ming Hsu, Jen-Chun Lee, Wei-Kuei Chen," An
Efficient detection algorithm for Copy-Move
Forgery",IEEE, 2015 10th Asia Joint Conference on
Information Security, DOI: 10.1109/AsiaJCIS.2015.16
[26] Luo Juan, Oubong Gwun," A Comparison of SIFT, PCASIFT
and SURF", International Journal of Image
Processing (IJIP) Volume(3), Issue(4).
[27] Anuja Dixit , Rahul Dixit and R. K. Gupta," DCT and
DWT Based Methods for Detecting Copy-Move Image
Forgery: A Review", International Journal of Signal
Processing, Image Processing and Pattern Recognition
Vol.9, No.10, (2016), pp.249-258.
[28] Shrishail Math and R.C.Tripathi Indian Institute of
Information Technology,Allahabad," IMAGE
COMPOSITE DETECTION USING CUSTOMIZED",
International Journal of Computer Graphics & Animation
(IJCGA) Vol.1, No.3, October 2011
[29] Jen-Chun Lee, Chien-Ping Chang, Wei-Kuei Chen,"
Detection of copy-move image forgery using histogram of
orientated gradients," 2015, DOI:
10.1016/j.ins.2015.03.009
[30] Kavya Sharma," Computationally Efficient Copy-Move
Image Forgery Detection Based on DCT and SVD,"
Advanced Research in Electrical and Electronic
Engineering ,Volume 1, Number 3 (2014) pp. 76-81
[31] Kavya Sharma, Shweta Meena, UmeshGhanekar3,"
Hybrid Technique for Copy-Move Forgery Detection TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY,26 Nov 2012.
[3] V.Suresh, T.Primya, G. Kanagaraj," Efficient Detection
Technique for Image Forgery", International Journal of
Imaging Science and Pattern Recognition Volume 1 Issue
1,2017.
[4] Meenal Shandilya, Ruchira Naskar, " Detection of
Geometric Transformations in Copy-Move Forgery of
Digital Images", Master Thesis, NIT,Rourkela,June 2015.
[5] Anushree U. Tembe, Supriya S. Thombre," Copy-Paste
Forgery Detection in Digital Image Forensic", IJSRSET |
Volume 3 | Issue 2,2017
[6] Rani Susan Oommen and Dr. Jayamohan M," A HYBRID
COPY-MOVE FORGERY DETECTION TECHNIQUE
USING REGIONAL SIMILARITY INDICES",
International Journal of Computer Science & Information
Technology (IJCSIT) Vol 7, No 4, August 2015
[7] R.C. Pandey, S. K. Singh, and K. K. Shukla," A FULLY
AUTOMATED BLIND AND PASSIVE FORENSIC
METHOD FOR IMAGE SPLICING DETECTION", I J C
T A, 9(41) 2016, pp. 899-908
[8] Anil Dada Warbhe, R. V. Dharaskar, V. M. Thakare," A
Survey on Keypoint Based Copy-Paste Forgery Detection
Techniques", International Conference on Information
Security & Privacy (ICISP2015), 11-12 December 2015,
Nagpur, INDIA(ScienceDirect, Procedia Computer
Science 78 ( 2016 ) 61 - 67).
[9] Yongzhen Ke, Weidong Min, Fan Qin, Junjun Shang,"
Image Forgery Detection Based on Semantics",
International Journal of Hybrid Information
tehcnology,vol.7, No.1 (2014),pp. 109-124
[10] Xunyu Pan. Xing Zhang, Siwei Lyu, " Exposing Image
Forgery with Blind Noise Estimation", MM&Sec'11,
ACM, September 29-30, 2011, Buffalo, New York, USA.
[11] P M Panchal, S R Panchal, S K Shah," A Comparison of
SIFT and SURF", International Journal of Innovative
Research in Computer and Communication
Engineering,Vol. 1, Issue 2, April 2013
[12] SITI FADZLUN MD SALLEH, MOHD FOAD ROHANI,
MOHD AIZAINI MAAROF,"COPY-MOVE FORGERY
DETECTION: A SURVEY ON TIME COMPLEXITY
ISSUES AND SOLUTIONS", Journal of Theoretical and
Applied Information Technology 15th June 2017. Vol.95.
No 11.
[13] Geethu N Nadh, Sreelatha S.H," Contrast Enhancement
Detection on Digital Images - A Survey", International
Journal Of Engineering And Computer Science
ISSN:2319-7242 , Volume 4 Issue 7 July 2015, Page No.
13465-13467.
[14] Nishmitha M.R and Aravind Naik,"COMPARISON OF
THREE TECHNIQUES OF IMAGE FORGERY
DETECTION", International Journal of Emerging
Technology in Computer Science & Electronics
(IJETCSE),ISSN: 0976-1353 Volume 14 Issue 2 -APRIL
2015.
[15] Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee,"
Detection of Copy-Rotate-Move Forgery Using Zernike
Moments", LNCS 6387, pp. 51-65, 2010
[16] Keerthi Priya, Vishnukanth Karwa P," A Novel Image
Localization Method for Image Forgery",IJIRCCE, Vol. 5,
Issue 5, May 2017
[17] Hansoo Kim and Joong Lee," An Implementation and
Pragmatic Analysis of the Digital Image Forgery Detection
Schemes", International Journal of Future Computer and
Communication, Vol. 4, No. 5, October 2015
[18] Musaed Alhussein," Image Tampering Detection Based on
Local Texture Descriptor and Extreme Learning
Machine", 2016 UKSim-AMSS 18th International
Conference on Computer Modelling and Simulation.
[19] Ng TT, Chang SF, Hsu J, Pepeljugoski M. "Columbia
photographic images and photorealistic computer graphics
dataset." ADVENT, Columbia University, Technical
Report. 2005.
[20] Michael V. Boland,2Mia K. Markey,1and Robert F.
Murphy1*, ``Automated Recognition of Patterns
Characteristic of Subcellular Structures in Fluorescence
Microscopy Images,`` 1998 Wiley-Liss, Inc.,
RECOGNITION OF CELLULAR LOCALIZATION
PATTERNS, pp366-375.
[21] Arun Anoop M, Poonkuntran S, ``Certain investigation on
Biomedical impression and Image Forgery Detection,``
International Journal of Biomedical Engineering and
Technology (Inderscience.)
[22] Arun Anoop M, Poonkuntran S, ``A Brief study on
"Multimedia Security" In Research``, ISBN-13:978-93-
86258-63-2, FIRST EDITION,JULY 2017,VSRD
Academic Publishing.
[23] Michael Vorobyov,``Shape Classification Using Zernike
Moments, ``Available:
https://www.slideserve.com/rivka/shape-classificationusing-
zernike-moments.
[24] Jie Chen,Shiguang Shan, Chu He, Guoying Zhao,Matti
Pietikainen, Xilin Chen, Wen Gao,``WLD: A Robust
Local Image Descriptor,``IEEE TRANSACTIONS ON
PATTERN ANALYSIS AND MACHINE
INTELLIGENCE, VOL. 32, NO. 9, SEPTEMBER 2010,
pp 1705-1720.
[25] Chen-Ming Hsu, Jen-Chun Lee, Wei-Kuei Chen," An
Efficient detection algorithm for Copy-Move
Forgery",IEEE, 2015 10th Asia Joint Conference on
Information Security, DOI: 10.1109/AsiaJCIS.2015.16
[26] Luo Juan, Oubong Gwun," A Comparison of SIFT, PCASIFT
and SURF", International Journal of Image
Processing (IJIP) Volume(3), Issue(4).
[27] Anuja Dixit , Rahul Dixit and R. K. Gupta," DCT and
DWT Based Methods for Detecting Copy-Move Image
Forgery: A Review", International Journal of Signal
Processing, Image Processing and Pattern Recognition
Vol.9, No.10, (2016), pp.249-258.
[28] Shrishail Math and R.C.Tripathi Indian Institute of
Information Technology,Allahabad," IMAGE
COMPOSITE DETECTION USING CUSTOMIZED",
International Journal of Computer Graphics & Animation
(IJCGA) Vol.1, No.3, October 2011
[29] Jen-Chun Lee, Chien-Ping Chang, Wei-Kuei Chen,"
Detection of copy-move image forgery using histogram of
orientated gradients," 2015, DOI:
10.1016/j.ins.2015.03.009
[30] Kavya Sharma," Computationally Efficient Copy-Move
Image Forgery Detection Based on DCT and SVD,"
Advanced Research in Electrical and Electronic
Engineering ,Volume 1, Number 3 (2014) pp. 76-81
[31] Kavya Sharma, Shweta Meena, UmeshGhanekar3,"
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space," Int. Journal of Electrical &
Electronics Engg.,Vol. 2, Spl. Issue 1 (2015) .
[32] Toqeer Mahmood, Tabassam Nawaz, Zahid Mehmood ,
Zakir Khan, Mohsin Shah, Rehan Ashraf," Forensic
Analysis of Copy-Move Forgery in Digital Images Using
the Stationary Wavelets," IEEE, pp576-583,2016.
[33] Jie Zhao, Jichang Guo," Passive forensics for copymove
image forgery using a method based on DCT
and SVD," Forensic Science International 233 (2013)
158-166, DOI: 10.1016/j.forsciint.2013.09.013
[34] Singh, Vivek Kumar, and R. C. Tripathi. "Fast and
efficient region duplication detection in digital images
using sub-blocking method." international journal of
advanced science and technology, Vol. 35, No. 1, pp. 93-
102, 2011.
[35] Kodak dataset, Available: http://r0k.us/graphics/kodak/
[36] CoMoFoD dataset, Available:
http://www.vcl.fer.hr/comofod/
[37] Columbia University dataset, Available:
http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSpl
icedDataSet/AuthSplicedData Set.htm
[38] CASIA dataset. Available: forensics.idealtest.org
[39] USC-SIPI dataset, Available: sipi.usc.edu/database
[40] HOG, Available: https://www.learnopencv.com/histogramof-
oriented-gradients/
[41] Nishmitha M.R and Aravind Naik," COMPARISON OF
THREE TECHNIQUES OF IMAGE FORGERY
DETECTION," International Journal of Emerging
Technology in Computer Science & Electronics
(IJETCSE) , Volume 14 Issue 2 -APRIL 2015
[42] Meera Mary Isaac, Dr. M. Wilscy," A Key point based
Copy-Move Forgery Detection using HOG
features,"IEEE,2016.
[43] GLCM,Available:
https://www.ucalgary.ca/mhallbey/glcm1
[44] EXIFTool,Available:
https://www.sno.phy.queensu.ca/~phil/exiftool/
[45] Jeffrey's Image metadata viewer, Available:
http://exif.regex.info/exif.cgi
[46] EXIF-removal,Available:
https://www.makeuseof.com/tag/3-ways-to-remove-exifmetadata-
from-photos-and-why-you-might-want-to/
[47] Hex-editor,Available:
https://en.wikipedia.org/wiki/Hex_editor
[48] Qazi, Tanzeela. "Survey on blind image forgery
detection." IET , 2013.
[49] Ali Qureshi, M., and M. Deriche. "A review on copy move
image forgery detection techniques." IEEE, 2014
[50] Huang, Hailing, Weiqiang Guo, and Yu Zhang. "Detection
of copy-move forgery in digital images using SIFT
algorithm." IEEE, 2008.
[51] Meera Mary Isaac, Dr. M. Wilscy," A Key point based
Copy-Move Forgery Detection using HOG features," 2016
International Conference on Circuit, Power and
Computing Technologies [ICCPCT],IEEE, 2016.