Professional Documents
Culture Documents
ABSTRACT
Digital Image Authentication has become a very
important research area. Digital images can be altered
easily using freely available image editing softwares.
Many a times, it becomes impossible to ascertain the
authentic image from the tampered image. These
tampered images can be created by using graphical
softwares, or can be manipulated simply by changing the
content and context of the image. This creates problems
for authentication of the digital image. Tampering a
digital image by duplicating an object or a particular
segment within the same image is one of the most
prominent and easily done forgeries. It is known as
copy-move tampering. It is very difficult to find out the
duplicated objects or segments within the given image.
In this paper, we study the recently developed major
approaches to detect duplicate objects in digital images.
Initially, the process of digital image tampering is
explained. Subsequently, we analyze some of recently
developed algorithms like Discrete Wavelet Transform
(DWT), Singular Value Decomposition (SVD), FourierMellin Transform (FMT), Discrete Cosine Transform
(DCT), Principal Component Analysis (PCA), Scale
Invariant Features Transform (SIFT), Wavelets and Logpolar Mapping, Block Artifact Grid (BAG), Speedup
Robust Features (SURF) etc. for detecting duplicate
object within the same image. Preliminary investigations
show that different algorithms have different domains of
tampering detection and have different merits and
demerits. The decision about the content authenticity is
complex and can be better established by interpreting the
results obtained by applying a set of these methods.
Keywords - Copy-Move Tampering, Digital Image
Authentication, Digital Image Tampering, Duplicate
Region Detection
I.
INTRODUCTION
Coral Draw, Free Hand etc., its not difficult now a days
to manipulate digital images to hide or create misleading
images. This creates problem for authenticating the
digital image. There are no established methodologies to
verify the authenticity and integrity of digital images in
automatic manner. So, Digital Image Authentication has
become a very important research area. Tampering a
digital image by duplicating an object or a particular
segment within the same image is one of the most
prominent and easily done forgeries. All of these
tampering can be categorized into three major groups,
based on the process involved in creating the fake digital
image, which are Image Retouching, Image Splicing,
and Copy-Move Attack.
Image retouching does not significantly change an
image, but instead, enhances or reduces certain feature
of an image. It is considered to be the less harmful kind
of digital image tampering. This technique is popular
among magazine photo editors. This technique is
employed to enhance certain features of an image so that
it becomes more attractive [1]. Image splicing, as its
name implies, is a simple process of cropping and
pasting regions from the same or different images to
form a composite image without post-processing such as
edge smoothing. Image splicing is one of the simple and
commonly used image tampering schemes. Since
splicing is often used for image tampering as an initial
step, and splicing itself, with modern image processing
techniques, can often hardly be caught by the human
visual system [2]. This technique is more aggressive
than image retouching.
Whereas copy-move attack is one of the most common
and easiest techniques for creating digital tampering. It
is more or less similar to image splicing in view of the
fact that both techniques modify certain image region of
a base image, with another image or an object. However,
instead of having an external object or an image as the
source, copy-move attack uses portion of the original
base image as its source. In other words, the source and
the destination of the modified image originated from
the same image. In a copy-move attack, parts of the
www.ijsret.org
270
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
www.ijsret.org
271
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
II.
RECENT WORK
www.ijsret.org
272
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
(2)
(3)
www.ijsret.org
273
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
III.
SUGGESTIONS
WORK
AND
FURTHER
IV.
www.ijsret.org
274
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
V.
VI.
FUTURE SCOPE
REFERENCES
CONCLUSION
www.ijsret.org
275
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 4, April 2016
Forgeries based on DWT and SVD, International Conference
on Multimedia and Expo, 2007 IEEE, pp. 1750-1753.
[9] D. Sharma, and P. Abrol, Investigating the Extent of Noise
in Digital Images using SVD, International Journal of
Software and Web Sciences, 4(1), 2013, 6-14.
[10] M. Zimba and S. Xingming, DWT-PCA (EVD) based
copy-move image forgery detection, International Journal of
Digital Content Technology and its Applications, 5(1), 2011,
pp. 251-258.
[11] S. Bayram, H. T. Sencar, and N. Memon, An efficient
and robust method for detecting copymove forgery,
International Conference on Acoustics, Speech and Signal
Processing, 2009 IEEE, pp. 10531056.
[12] A. C. Popescu and H. Farid, Exposing Digital Forgeries
by Detecting Duplicated Image Regions, Technical Report
TR2004-515, Department of Computer Science, Dartmouth
College, 2004.
[13] J. Fridrich, D. Soukal, and J. Luk, Detection of CopyMove Forgery in Digital Images, Proceedings of the Digital
Forensic Research Workshop, 2003.
1. Discrete Cosine
Transform (DCT)
Coefficients
2. Discrete Wavelet
Transform (DWT)
3. Discrete Wavelet
Transform (DWT) &
Singular Value
Decomposition (SVD)
4. Principal Component
Analysis (PCA)
5. Fourier-Mellin Transform
(FMT)
Merits
Demerits
a) This approach drastically reduces the time needed for the detection
process.
b) Since exhaustive comparisons of blocks have been applied only on the
image in the lowest resolution level, the approach has significantly
improved the time and accuracy of detection compared to the past
techniques of Copy-Move forgery.
a) This algorithm decreases computational complexity,
b) It also localizes the duplicated regions accurately even when the image
was highly JPEG compressed or edge processed to a certain extent.
c) This approach can further reduce image scale and feature dimension
while retaining its efficiency.
d) In comparison to PCA and DCT approaches, this approach can better
improve detection efficiency.
a) This technique is effective on plausible forgeries, and has quantified
its sensitivity to JPEG lossy compression and additive noise.
b) This method is robust to compression up to JPEG quality level 50 and
the time complexity of sorting is O(32x k lg k) time.
c) The detection is possible even in the presence of significant amounts
of corrupting noise.
a) It is robust to compression up to JPEG quality 20, rotation with 10 o and
scaling by 10%.
b) The proposed algorithm can detect duplicated region in the images
very accurately, even when the copied region has undergone severe image
manipulations like lossy compression, scaling and rotation.
www.ijsret.org
276