International Journal of
Computer Sciences and Engineering

Scholarly, Peer-Reviewed and Fully Refereed Academic Research Journal

Flash News 

Full paper submission has now been opened for July edition. You can upload your full paper using the required templates to the Online Submission System. Deadline for uploading the full papers is July 22 July 2018.

A New Approach of copy move Forgery Detection using Rigorous Preprocessing and Feature Extraction
Open Access   Article

A New Approach of copy move Forgery Detection using Rigorous Preprocessing and Feature Extraction
A.K. Chakraverti1 , V. Dhir2
1 RIC (Computer Science and Engineering), IKG-Punjab Technical University, Jalandhar, India.
2 Department of Computer Science and Engineering, M.K. Group of Institution, Amritsar, India.
Correspondence should be addressed to:

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 50-56, Dec-2017


Online published on Dec 31, 2017

Copyright © A.K. Chakraverti, V. Dhir . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  

IEEE Style Citation: A.K. Chakraverti, V. Dhir, “A New Approach of copy move Forgery Detection using Rigorous Preprocessing and Feature Extraction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.50-56, 2017.

MLA Style Citation: A.K. Chakraverti, V. Dhir "A New Approach of copy move Forgery Detection using Rigorous Preprocessing and Feature Extraction." International Journal of Computer Sciences and Engineering 5.12 (2017): 50-56.

APA Style Citation: A.K. Chakraverti, V. Dhir, (2017). A New Approach of copy move Forgery Detection using Rigorous Preprocessing and Feature Extraction. International Journal of Computer Sciences and Engineering, 5(12), 50-56.
240 141 downloads 57 downloads
Abstract :
these days, advanced pictures are being used in an extensive variety of uses and for numerous reasons. They additionally assume an imperative part in the capacity and exchange of visual data, particularly the mystery ones. With this far reaching utilization of advanced pictures, notwithstanding the expanding number of devices and programming of computerized pictures altering, it has turned out to be anything but difficult to control and change the real data of the picture. In this way, it has turned out to be important to check the credibility and the respectability of the picture by utilizing present day and advanced methods, which add to examination and comprehension of the pictures’ substance, and after that ensure their trustworthiness. There are many sorts of picture imitation, the most critical and prominent sort is called duplicate glue fabrication, which utilizes a similar picture during the time spent falsification. This sort of fraud is utilized for one of two things, first to cover a protest or scene by replicating the region of the picture and gluing it on another zone of a similar picture. In this paper we have presented a new approach of copy move forgery detection. proposed scheme uses Oriented FAST and rotated BRIEF(ORB) alternative of scale invariant feature transform (SIFT) technique which is integrated with modified local contrast modification-contrast limited adaptive histogram equalization(LCM-CLAHE). Experimental results shows that proposed scheme is more promising in terms of false positive rate(FPR) and true positive rate(TPR) compare to state of the art techniques.
Key-Words / Index Term :
Image Processing, Image Enhancement, Histogram Equalization, SIFT, TPR, FPR, Copy move forgery, ORB
References :
[1] J. M. Morel and G. Yu. ”On the consistency of the SIFT Method”. Lecture notes, August 11, 2008.
[2] D. G. Lowe. ”Distinctive image features from scale-invariant key-points”. International Journal of Computer Vision, 60, 2, pp. 91-110, 2004.
[3] A. C. Popescu and H. Farid. ”Exposing Digital Forgeries by Detecting Duplicated Image Regions”. 6211 Sudikoff Lab, Computer Science Department, Dartmouth College, Hanover, NH 03755 USA.
[4] J. Fridrich, D. Soukal, and J. Luk. ”Detection of Copy-Move Forgery in Digital Images”. Department of Electrical and Computer Engineering, b Department of Computer Science SUNY Binghamton, Binghamton, NY 13902-6000
[5] J. Yaduwanshi, and P. Bansal. ”A Novel Approach for Copy Move Forgery Detection Using Template Matching”. Proceedings of International Conference on Communication and Networks, Advances in Intelligent Systems and Computing 508, India,Springer Nature Singapore Pte Ltd., pp. 711-721, 2017, DOI 10.1007/978-981-10-2750-5 72.
[6] K. Sachdev, M. Kaur, and S. Gupta. ”A Robust and Fast Technique to Detect Copy Move Forgery in Digital Images Using SLIC Segmentation and SURF Keypoints”. Proceeding of International Con-ference on Intelligent Communication, Control and Devices, Advances in Intelligent Systems and Computing 479, Springer Science+Business Media Singapore, pp. 787-793, 2017, DOI 10.1007/978-981-10-1708-7 91.
[7] K. Hayat, and T. Qazi. ”Forgery detection in digital images via discrete avelet and discrete cosine transforms”. Computers and Electrical Engineering (2017) 111, 2017.
[8] L. D. Amiano, D. Cozzolino, G. Poggi, and L. Ver-doliva. ”A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization”. Cornell University Library,2017, arXiv:1703.04636v1 [cs.CV].
[9] M. Emam, Q. Han, Q. Li, H. Zhang, and M. Emam. ”A Robust Detection Algorithm for Image Copy-Move Forgery in Smooth Regions”. International Conference on Circuits, System and Simulation (ICCSS),London, UK, IEEE, 2017, DOI: 10.1109/CIRSYS-SIM.2017.8023194 .
[10] M. F. Mohamed Mursi, M. M. Salama, and Md. H. Habeb. ”An Improved SIFT-PCA-Based Copy-Move Image Forgery Detection Method”. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 6, Issue 3, pp. 23-28, 2017.
[11] N. Kaur. ”A Review Paper on Copy Move Forgery Detection Techniques”. International Journal of Advanced Research in Computer Science,Volume 8, No. 7, pp. 157-161, 2017. DOI:10.26483/ijarcs.v8i7.4146.
[12] N. B. Abd. Warif, A. Wahid, Mohd. Y. I. Idris, R. Salleh,and F. Othman. ”SIFT-Symmetry: A Robust Detection Method for Copy-Move Forgery with Reflection Attack”. J. Vis. Commun. Image R., 2017, DOI: 10.1016/j.jvcir.2017.04.004.
[13] R. CRISTIN, and V. CYRIL RAJ. ”Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery”. SCIENCE CHINA Information Sciences, Vol. 60 082101:1082101:18, 2017, DOI: 10.1007/s11432-016-0478-y.
[14] S. Mohan and M. Ravishankar. ”Modified Contrast Limited Adap-tive Histogram Equalization BAsed on Local Contrast Enhancement for Mammogram Image”. In: Das V.V., Chaba Y. (eds) Mobile Com-munication and Power Engineering. Communications in Computer and Information Science, vol 296. Springer, Berlin, Heidelberg , pp 397-403, 2013
[15] R. Dixit, and R. Naskar. ”Review, analysis and parameterisa-tion of techniques for copymove forgery detection in digital images”. IET Image Processing, 2017, DOI: 10.1049/iet-ipr.2016.0322.
[16] R. Dixit, R. Naskar, and Swati Mishra. ”Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD”. IET Image Processing, 2017, DOI: 10.1049/iet-ipr.2016.0537.
[17] S. Farooq, M. Haroon Yousaf, and F. Hussain. ”A generic passive image forgery detection scheme using local binary pattern with rich models”. Computers and Electrical Engineering 0 0 0 (2017), pp. 114, 2017, DOI: 10.1016/j.compeleceng.2017.05.008.
[18] S. Sadeghi, H. A. Jalab, K. Wong, D. Uliyan, and S. Dadkhah. ”KEYPOINT BASED AUTHENTICATION AND LOCALIZATION OF COPY-MOVE FORGERY IN DIGITAL IMAGE”. Malaysian Journal of Computer Science. Vol. 30(2), pp. 117-133, 2017.
[19] T. Mahmood, A. Irtaza, Z. Mehmood, and Md. T. Mahmood. ”Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images”. Forensic Science International, DOI:10.1016/j.forsciint.2017.07.037.
[20] V. T. Manu, and B. M. Mehtre. ”Copy-move tampering detection using affine transformation property preservation on clustered keypoints”. SIViP, 2017, DOI 10.1007/s11760-017-1191-7.
[21] V. Thirunavukkarasu, J. S. Kumar, G. S. Chae, and J. Kishorkumar. ”Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering”. Wireless Pers Commun, 2017, DOI 10.1007/s11277-016-3941-1.
[22] X. Bi , and C. Pun. ”Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection”. Information Sciences, 2017, DOI: 10.1016/j.ins.2017.08.044.
[23] Y. Lai, T. Huang, and J. Lin H. Lu. ”An improved block-based matching algorithm of copy-move forgery detection”. Multimedia Tools Appl, 2017, DOI 10.1007/s11042-017-5094-y.
[24] Z. Fei, S. Wenchang, Q. Bo, and L. Bin. ”Image Forgery Detection Using Segmentation and Swarm Intelligent Algorithm”. Wuhan University Journal of Natural Sciences, Vol.22 No.2, pp. 141-148, 2017.
[25] D.Tralic , I. Zupancic , S. Grgic, and M. Grgic. CoMoFoD - New Database for Copy-Move Forgery Detection”. in Proc. 55th International Symposium ELMAR-2013, pp. 49-54, September 2013
[26] Dahale Sunil V, Thorat S.B., P.K. Butey, and M.P. Dhore. “Efficient Content Based Image Retrieval Using Fuzzy Approach”. International Journal of Computer Sciences and Engineering, Volume-5, Issue-10, pp. 38-43, 2017.