Open Access   Article Go Back

Pixel Based Forensic Image Forgery Detection using Signature Resembling Detection and Signature Detection Algorithm

S. B. Pratapur1 , S. D. Chikte2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 44-53, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.4453

Online published on Oct 31, 2018

Copyright © S. B. Pratapur, S. D. Chikte . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. B. Pratapur, S. D. Chikte, “Pixel Based Forensic Image Forgery Detection using Signature Resembling Detection and Signature Detection Algorithm,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.44-53, 2018.

MLA Style Citation: S. B. Pratapur, S. D. Chikte "Pixel Based Forensic Image Forgery Detection using Signature Resembling Detection and Signature Detection Algorithm." International Journal of Computer Sciences and Engineering 6.10 (2018): 44-53.

APA Style Citation: S. B. Pratapur, S. D. Chikte, (2018). Pixel Based Forensic Image Forgery Detection using Signature Resembling Detection and Signature Detection Algorithm. International Journal of Computer Sciences and Engineering, 6(10), 44-53.

BibTex Style Citation:
@article{Pratapur_2018,
author = {S. B. Pratapur, S. D. Chikte},
title = {Pixel Based Forensic Image Forgery Detection using Signature Resembling Detection and Signature Detection Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {44-53},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2979},
doi = {https://doi.org/10.26438/ijcse/v6i10.4453}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.4453}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2979
TI - Pixel Based Forensic Image Forgery Detection using Signature Resembling Detection and Signature Detection Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - S. B. Pratapur, S. D. Chikte
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 44-53
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
568 526 downloads 288 downloads
  
  
           

Abstract

The security for the documentations, signature, manually written and mark is challenge errand and essential continuously applications. To address the issues in existing outcomes, the proposed work analyzes the outcomes utilizing three signature forgery detection algorithms, Error Level Analysis, Copy-Paste clone Detection and Fourier based Resembling Detection. Every technique is found to have its own arrangement of points of interest and confinements. An Error Level Analysis gave better outcomes on beforehand compacted, excellent JPEG signatures. The Copy-Paste Clone Detection is exceedingly fruitful on signatures produced utilizing cloning techniques, however the general runtime has considerably higher than alternate strategies, and because of the idea of the calculation false positives is routinely distinguished. Signature Resembling Detection (SRD) worked on a wide assortment of signatures which are taken from genuine signature, transcribed and signature, gives great general outcomes on each dataset, and the rate of false positives is low. The calculation has profoundly proficient in the database absolutely 10 signatures which have brilliant measures are subjected to proposed calculations to segregate amongst innovation and phony archives or transcribed or marks. The proposed work gives a perfect base to a client to decide the most relevant signature fabrication location strategy for their utilization, contingent upon the kinds of signatures that they routinely manage.

Key-Words / Index Term

Signature Resembling Detection, DWT, SVD,SURF,CMDF,SIFT

References

[1]. Ali MUMCU & Ibrahim Savran “Copy Move Forgery Detection with Using FAST Key Points and SIFT Description Vectors”, 978-1-5386-1501-0 2018 IEEE.
[2]. Anil Dada Warbhe.et.al, "A Survey on Key point Based Copy-Paste Forgery Detection Techniques", International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA, Procedia Computer Science 78 ( 2016 ), pp. 61 – 67, Published by Elsevier.
[3]. Anil Dada Warbhe.et.al, “A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics", 7th International Conference on Communication, Computing and Virtualization 2016, Published by Elsevier.
[4]. Anushree U. Tembe & Supriya S. Thombre “Survey of Copy-Paste Forgery Detection in Digital Image Forensic”, International Conference on Innovative Mechanisms for Industry Applications, pp 248-252, July 2017 IEEE.
[5]. Ashraf Y. A. Maghari & Mohammed N. Nazli “Comparison Between Image Forgery Detection Algorithms” 8th International Conference on Information Technology (ICIT) 978-1-5090-6332-1 2017 IEEE.
[6]. Ashwini V Malviya.et.al, "Pixel based Image Forensic Technique for copy-move forgery detection using Auto Color Correlogram", in proceedings of 7th International Conference on Communication, Computing and Virtualization 2016, Procedia Computer Science 79 ( 2016 ), pp. 383 – 390, Published by Elsevier.
[7]. C.S. Lu, C.Y. Hsu, S.W. Sun, and P.C. Chang, “Robust Mesh-Based Hashing for Copy Detection and Tracing of Images”, Proc. IEEE Int’l Conf. Multimedia and Expo, vol.1, pp. 731-734, 2004.
[8]. Chi-Man Pun, Senior Member, IEEE.et.al, "Image Forgery Detection Using Adaptive Over-Segmentation and Feature Point Matching", This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2015.2423261, IEEE Transactions on Information Forensics and Security.
[9]. E. Agnes, S. Devi Mahalakshmi, Dr. K. Vijayalakshmi "A Forensic Method for Detecting Image Forgery Using Codebook”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013.
[10]. F. Khelifi and J. Jiang, “Perceptual image hashing based on virtual watermark detection,” IEEE Trans. Image Process., vol. 19, no. 4, pp.981–994, Apr. 2010.
[11]. Gul MUZAFFER, Eda Sena ERDOL ve Guzin ULUTA “A Copy-Move Forgery Detection Approach Based on Local Intensity Order Pattern and PatchMatch”, IEEE Trans. Information Forensics and Security, vol. 8, no. 1,pp. 55-63, Jan. 2018.
[12]. Haodong Li.et.al, "Image Forgery Localization via Integrating Tampering Possibility Maps", IEEE Transactions On Information Forensics And Security", 1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
[13]. Jian Li.et.al, "Segmentation-based Image Copy-move Forgery Detection Scheme", This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2014.2381872, IEEE Transactions on Information Forensics and Security.
[14]. Mejren Mohammad Al-Hammadi & Sabu Emmanuel “Improving SURF Based Copy-Move Forgery Detection Using Super Resolution”, IEEE International Symposium on Multimedia, pp 341-344, June 2016.
[15]. Prajwal Pralhad Panzade.et.al, "Copy-Move Forgery Detection by Using HSV Preprocessing and Keypoint Extraction", 978-1-5090-3669-1/16, 2016, IEEE.
[16]. Rahul Dixit, Ruchira Naskar and Aditi Sahoo “Copy–Move Forgery Detection Exploiting Statistical Image Features”, IEEE WiSPNET conference, pp 2277-2281, Sep 2017.
[17]. Rahul Dixit,"Review, analysis and parameterisation of techniques for copy–move forgery detection in digital images", IET Image Process., 2017, Vol. 11 Iss. 9, pp. 746-759.
[18]. Sawinder Singh Mangat.et.al, "Improved Copy-move Forgery Detection in Image by Feature Extraction with KPCA and Adaptive Method", 2016 2nd International Conference on Next Generation Computing Technologies (NGCT-2016) Dehradun, India 14-16 October 2016, 978-1-5090-3257-0/16/$31.00 ©2016 IEEE.
[19]. Sreelakshmy I J.et.al, "An Improved Method For Copy-move Forgery Detection In Digital Forensic", 2016 Online International Conference on Green Engineering and Technologies (IC-GET), 978-1-5090-4556-3/16, 2016 IEEE.
[20]. Swaminathan, Y. Mao, and M. Wu, “Robust and Secure Image Hashing,” IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 215-230, June 2006.
[21]. Tarman & Hardeep saini, “A Review on Various Techniques of Image Forgery Detection”, 4th IEEE International Conference on Signal and Processing Computing and Control, pp 425-430, Sep 2017.
[22]. Toqeer Mahmood.et.al, "Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images", Hindawi Publishing Corporation, Mathematical Problems in Engineering, Volume 2016, Article ID 8713202, pp. 13 pages, http://dx.doi.org/10.1155/2016/8713202.
[23]. Tu Huynh-Kha, Thuong Le-Tien, Synh Ha-Viet-Uyen,Khoa Huynh-Van, Marie Luong “A Robust Algorithm of Forgery Detection in Copy- Move and Spliced Images”, International Journal of Advanced Computer Science and Applications, Vol. 7, No. 3, 016. www.ijacsa.thesai.org
[24]. V. Monga and B.L. Evans, “Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs,” IEEE Trans. Image Processing, vol. 15, no. 11, pp. 3452-3465, Nov. 2006.
[25]. V. Monga and M. K. Mihcak, “Robust and secure image hashing via non- negative matrix factorizations,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 376–390, Sep. 2007.
[26]. X. Lv and Z. J. Wang, “Perceptual image hashing based on shape contexts and local feature points,” IEEE Trans. Inf. Forensics Security, vol.7, no. 3, pp. 1081–1093, Jun. 2012.
[27]. Y. Zhao, S. Wang, X. Zhang, and H. Yao, “Robust Hashing for Image Authentication Using Zernike Moments and Local Features,” IEEE Trans. Information Forensics and Security, vol. 8, no. 1, pp. 55-63, Jan. 2013.