Comparative Study and Survey on Copy Move Image Forgery Detection Approaches
DOI:
https://doi.org/10.53555/nncse.v2i9.441Keywords:
Image forgery, Image forgery detection, Copymove, Splicing, Resampling, Block based, Key-point basAbstract
Nowadays the demand of digital images in various application areas is increasing and thus it is becoming important to ensure the authenticity of images. Due to easy availability of various image editing tools, continuous manipulations are done to create fake or forged images. Although various techniques like copy-move, splicing, resampling etc. for image forgery are present but copy move image forgery has received significant attention these days. Thus the focus of this paper is on copy-move image forgery detection techniques. We have presented a review of commonly used copy move image forgery detection techniques and the comparison of same is also showed to evaluate their performance on basis of various parameters.
References
Ansari M. D., Ghrera S. P., Tyagi V., “Pixel-Based Algorithm”, IEEE Pacific-Asia Workshop on Image Forgery Detection: A Review”, IETE Journal Computational Intelligence and Industrial of Education, vol. 55, no. 1, pp.40-46, 2014. Application, Wuhan, pp.272-276, 2008
Bashar M. K., Noda K., Ohnishi N., Mori K., [8] Isik S., Ozkan K., “A Comparative Evaluation of "Exploring duplicated regions in natural images", Well-known Feature Detectors and Descriptors”, IEEE transactions on image processing: a publication International Journal of Applied Mathematics, of the IEEE Signal Processing Society, pp.1- 40
Bayram S., Sencar H. T., Memon N., “An Efficient by detecting duplicated image regions”, Dartmouth and Robust Method for Detecting Copy-Move College, Tech. Rep. TR2004- 515 , pp.1-11, 2004
Bo X., Junwen W., Guangjie L., Yuewei D., "Image copy move forgery detection based on SURF", IEEE
As many block based and key-point based methods for International Conference on Multimedia Information detection of copy move
image forgery available. But as it is Networking and Security (MINES), Jiangsu, pp.889clear from comparison presented in the above table that none 892, 2010
Christleinl V., Riess C., Jordan J., Riess C., compression, blurring, scaling, rotation etc. and each has its Angelopoulou E., “An Evaluation of Popular Copyown advantages and drawbacks. Thus to develop robust Move Forgery Detection Approaches”, IEEE methods for copy move image forgery detection it is advisable Transactions on Information Forensics and Security, to make hybrid techniques by combining different techniques vol.7, no.6, pp.1841-1854, 2012
Fridrich J., Soukal D., Lukas J., “Detection of copy move forgery in digital images”, Proceedings of Digital Forensic Research Workshop, Citeseer, 2003
Huang H., Guo W., Zhang Y., “Detection of CopyMove Forgery in Digital Images Using SIFT
Isik S., Ozkan K., “A Comparative Evaluation of "Exploring duplicated regions in natural images", Well-known Feature Detectors and Descriptors”, IEEE transactions on image processing: a publication International Journal of Applied Mathematics, of the IEEE Signal Processing Society, pp.1-40, Electronics and Computers (IJAMEC), pp.1-6, 2014
Qureshi M. A., Deriche M., “A Review on Copy Acoustics, Speech and Signal Processing (ICASSP), Move Image Forgery Detection Techniques”, IEEE Taipei, pp.1053-1056, 2009
Ryu S. J, Lee M. J., Lee H. K., “Detection of CopyRotate-Move Forgery Using Zernike Moments”, Springer-Verlag Berlin Heidelberg , pp. 51–65, 2010
Sekhar R. , Matha L., “ Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images”, International Journal of Computer Applications, vol. 89, no. 8, pp.28-33, March 2014
Sridevi M., Mala C., Sanyam S., “Comparative Study of Image Forgery and Copy-Move Techniques” Springer-Verlag Berlin Heidelberg , vol.166, pp. 715– 723, 2012
Thajeel S. A., Sulong G., “A Survey of Copy-Move Forgery Detection Techniques”, Journal of Theoretical and Applied Information Technology, vol.70, no.1, 2014
Zhang G. Q., Hang-jun Wang H. J., “SURF-based Detection of Copy-Move Forgery in Flat Region”, International Journal of Advancements in Computing Technology (IJACT), vol.4, no.17, 2012
Zhang J., Feng Z., Su Y.,“ A new approach for detecting copy-move forgery in digital images”, 11th IEEE Singapore International Conference on Communication Systems (ICCS), Guangzhou, pp.362366, 2008
Zheng J., Chang L., “Detection of Region-duplication Forgery in Image Based on Key Points Binary Descriptors”, Journal of Information & Computational Science, pp.3959-3966, 2014
Zhu Y., Shen X., Chen H., “Copy-move forgery detection based on scaled ORB”, Springer Science+Business Media New York, pp.51-65, 2015
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.