Comparative Study and Survey on Copy Move Image Forgery Detection Approaches
DOI:
https://doi.org/10.53555/nncse.v2i6.445Keywords:
Image forgery, Image forgery detection, Copy-move, Splicing, Resampling, Block based, Key-point basedAbstract
Nowadays the demand of digital images in various application areas is increasing and thus it is becoming important to ensure the authenticity of images. Due to easy availability of various image editing tools, continuous manipulations are done to create fake or forged images. Although various techniques like copy-move, splicing, resampling etc. for image forgery are present but copy move image forgery has received significant attention these days. Thus the focus of this paper is on copy-move image forgery detection techniques. We have presented a review of commonly used copy move image forgery detection techniques and the comparison of same is also showed to evaluate their performance on basis of various parameters.
References
Ansari M. D., Ghrera S. P., Tyagi V., “Pixel-Based Image Forgery Detection: A Review”, IETE Journal of Education, vol. 55, no. 1, pp.40-46, 2014.
Bashar M. K., Noda K., Ohnishi N., Mori K., "Exploring duplicated regions in natural images", IEEE transactions on image processing: a publication of the IEEE Signal Processing Society, pp.1-40, no.99, 2010.
Bayram S., Sencar H. T., Memon N., “An Efficient and Robust Method for Detecting Copy-Move Forgery”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Taipei, pp.1053-1056, 2009.
Bo X., Junwen W., Guangjie L., Yuewei D., "Image copy move forgery detection based on SURF", IEEE International Conference on Multimedia Information Networking and Security (MINES), Jiangsu, pp.889-892, 2010.
Christleinl V., Riess C., Jordan J., Riess C., Angelopoulou E., “An Evaluation of Popular Copy-Move Forgery Detection Approaches”, IEEETransactions on Information Forensics and Security, vol.7, no.6, pp.1841-1854, 2012.
Fridrich J., Soukal D., Lukas J., “Detection of copy-move forgery in digital images”, Proceedings of Digital Forensic Research Workshop, Citeseer, 2003.
Huang H., Guo W., Zhang Y., “Detection of CopyMove Forgery in Digital Images Using SIFT Algorithm”, IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, pp.272-276, 2008.
Isik S., Ozkan K., “A Comparative Evaluation of Well-known Feature Detectors and Descriptors”, International Journal of Applied Mathematics, Electronics and Computers (IJAMEC), pp.1-6, 2014.
Popescu A.C., Faridy H., “Exposing digital forgeries by detecting duplicated image regions”, Dartmouth College, Tech. Rep. TR2004-515 , pp.1-11, 2004.
Qureshi M. A., Deriche M., “A Review on Copy Move Image Forgery Detection Techniques”, IEEE 11th International Multi Conference on System, Signal and Devices, Barcelona, pp.1-5, 2014.
Ryu S. J, Lee M. J., Lee H. K., “Detection of CopyRotate-Move Forgery Using Zernike Moments”, Springer-Verlag Berlin Heidelberg , pp. 51–65, 2010.
Sekhar R. , Matha L., “ Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images”, International Journal of Computer Applications, vol. 89, no. 8, pp.28-33, March 2014.
Sridevi M., Mala C., Sanyam S., “Comparative Study of Image Forgery and Copy-Move Techniques”Springer-Verlag Berlin Heidelberg , vol.166, pp. 715–723, 2012.
Thajeel S. A., Sulong G., “A Survey of Copy-Move Forgery Detection Techniques”, Journal of Theoretical and Applied Information Technology, vol.70, no.1, 2014.
Zhang G. Q., Hang-jun Wang H. J., “SURF-based Detection of Copy-Move Forgery in Flat Region”, International Journal of Advancements in Computing Technology (IJACT), vol.4, no.17, 2012.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.