Comparative Study and Survey on Copy Move Image Forgery Detection Approaches
DOI:
https://doi.org/10.53555/nncse.v2i9.441Keywords:
Image forgery, Image forgery detection, Copymove, Splicing, Resampling, Block based, Key-point basAbstract
Nowadays the demand of digital images in various application areas is increasing and thus it is becoming important to ensure the authenticity of images. Due to easy availability of various image editing tools, continuous manipulations are done to create fake or forged images. Although various techniques like copy-move, splicing, resampling etc. for image forgery are present but copy move image forgery has received significant attention these days. Thus the focus of this paper is on copy-move image forgery detection techniques. We have presented a review of commonly used copy move image forgery detection techniques and the comparison of same is also showed to evaluate their performance on basis of various parameters.
References
Ansari M. D., Ghrera S. P., Tyagi V., “Pixel-Based Algorithm”, IEEE Pacific-Asia Workshop on Image Forgery Detection: A Review”, IETE Journal Computational Intelligence and Industrial of Education, vol. 55, no. 1, pp.40-46, 2014. Application, Wuhan, pp.272-276, 2008
Bashar M. K., Noda K., Ohnishi N., Mori K., [8] Isik S., Ozkan K., “A Comparative Evaluation of "Exploring duplicated regions in natural images", Well-known Feature Detectors and Descriptors”, IEEE transactions on image processing: a publication International Journal of Applied Mathematics, of the IEEE Signal Processing Society, pp.1- 40
Bayram S., Sencar H. T., Memon N., “An Efficient by detecting duplicated image regions”, Dartmouth and Robust Method for Detecting Copy-Move College, Tech. Rep. TR2004- 515 , pp.1-11, 2004
Bo X., Junwen W., Guangjie L., Yuewei D., "Image copy move forgery detection based on SURF", IEEE
As many block based and key-point based methods for International Conference on Multimedia Information detection of copy move
image forgery available. But as it is Networking and Security (MINES), Jiangsu, pp.889clear from comparison presented in the above table that none 892, 2010
Christleinl V., Riess C., Jordan J., Riess C., compression, blurring, scaling, rotation etc. and each has its Angelopoulou E., “An Evaluation of Popular Copyown advantages and drawbacks. Thus to develop robust Move Forgery Detection Approaches”, IEEE methods for copy move image forgery detection it is advisable Transactions on Information Forensics and Security, to make hybrid techniques by combining different techniques vol.7, no.6, pp.1841-1854, 2012
Fridrich J., Soukal D., Lukas J., “Detection of copy move forgery in digital images”, Proceedings of Digital Forensic Research Workshop, Citeseer, 2003
Huang H., Guo W., Zhang Y., “Detection of CopyMove Forgery in Digital Images Using SIFT
Isik S., Ozkan K., “A Comparative Evaluation of "Exploring duplicated regions in natural images", Well-known Feature Detectors and Descriptors”, IEEE transactions on image processing: a publication International Journal of Applied Mathematics, of the IEEE Signal Processing Society, pp.1-40, Electronics and Computers (IJAMEC), pp.1-6, 2014
Qureshi M. A., Deriche M., “A Review on Copy Acoustics, Speech and Signal Processing (ICASSP), Move Image Forgery Detection Techniques”, IEEE Taipei, pp.1053-1056, 2009
Ryu S. J, Lee M. J., Lee H. K., “Detection of CopyRotate-Move Forgery Using Zernike Moments”, Springer-Verlag Berlin Heidelberg , pp. 51–65, 2010
Sekhar R. , Matha L., “ Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images”, International Journal of Computer Applications, vol. 89, no. 8, pp.28-33, March 2014
Sridevi M., Mala C., Sanyam S., “Comparative Study of Image Forgery and Copy-Move Techniques” Springer-Verlag Berlin Heidelberg , vol.166, pp. 715– 723, 2012
Thajeel S. A., Sulong G., “A Survey of Copy-Move Forgery Detection Techniques”, Journal of Theoretical and Applied Information Technology, vol.70, no.1, 2014
Zhang G. Q., Hang-jun Wang H. J., “SURF-based Detection of Copy-Move Forgery in Flat Region”, International Journal of Advancements in Computing Technology (IJACT), vol.4, no.17, 2012
Zhang J., Feng Z., Su Y.,“ A new approach for detecting copy-move forgery in digital images”, 11th IEEE Singapore International Conference on Communication Systems (ICCS), Guangzhou, pp.362366, 2008
Zheng J., Chang L., “Detection of Region-duplication Forgery in Image Based on Key Points Binary Descriptors”, Journal of Information & Computational Science, pp.3959-3966, 2014
Zhu Y., Shen X., Chen H., “Copy-move forgery detection based on scaled ORB”, Springer Science+Business Media New York, pp.51-65, 2015
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.