Comparative Study and Survey on Copy Move Image Forgery Detection Approaches

Authors

  • Naincy Research Scholar, CE Deptt. YCOE, Punjabi University, Patiala, India
  • Ashok Kumar Bathla Assistant Professor, CE Deptt. YCOE, Punjabi University, Patiala, India

DOI:

https://doi.org/10.53555/nncse.v2i6.445

Keywords:

Image forgery, Image forgery detection, Copy-move, Splicing, Resampling, Block based, Key-point based

Abstract

Nowadays the demand of digital images in various application areas is increasing and thus it is becoming important to ensure the authenticity of images. Due to easy availability of various image editing tools, continuous manipulations are done to create fake or forged images. Although various techniques like copy-move, splicing, resampling etc. for image forgery are present but copy move image forgery has received significant attention these days. Thus the focus of this paper is on copy-move image forgery detection techniques. We have presented a review of commonly used copy move image forgery detection techniques and the comparison of same is also showed to evaluate their performance on basis of various parameters.

References

Ansari M. D., Ghrera S. P., Tyagi V., “Pixel-Based Image Forgery Detection: A Review”, IETE Journal of Education, vol. 55, no. 1, pp.40-46, 2014.

Bashar M. K., Noda K., Ohnishi N., Mori K., "Exploring duplicated regions in natural images", IEEE transactions on image processing: a publication of the IEEE Signal Processing Society, pp.1-40, no.99, 2010.

Bayram S., Sencar H. T., Memon N., “An Efficient and Robust Method for Detecting Copy-Move Forgery”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Taipei, pp.1053-1056, 2009.

Bo X., Junwen W., Guangjie L., Yuewei D., "Image copy move forgery detection based on SURF", IEEE International Conference on Multimedia Information Networking and Security (MINES), Jiangsu, pp.889-892, 2010.

Christleinl V., Riess C., Jordan J., Riess C., Angelopoulou E., “An Evaluation of Popular Copy-Move Forgery Detection Approaches”, IEEETransactions on Information Forensics and Security, vol.7, no.6, pp.1841-1854, 2012.

Fridrich J., Soukal D., Lukas J., “Detection of copy-move forgery in digital images”, Proceedings of Digital Forensic Research Workshop, Citeseer, 2003.

Huang H., Guo W., Zhang Y., “Detection of CopyMove Forgery in Digital Images Using SIFT Algorithm”, IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, pp.272-276, 2008.

Isik S., Ozkan K., “A Comparative Evaluation of Well-known Feature Detectors and Descriptors”, International Journal of Applied Mathematics, Electronics and Computers (IJAMEC), pp.1-6, 2014.

Popescu A.C., Faridy H., “Exposing digital forgeries by detecting duplicated image regions”, Dartmouth College, Tech. Rep. TR2004-515 , pp.1-11, 2004.

Qureshi M. A., Deriche M., “A Review on Copy Move Image Forgery Detection Techniques”, IEEE 11th International Multi Conference on System, Signal and Devices, Barcelona, pp.1-5, 2014.

Ryu S. J, Lee M. J., Lee H. K., “Detection of CopyRotate-Move Forgery Using Zernike Moments”, Springer-Verlag Berlin Heidelberg , pp. 51–65, 2010.

Sekhar R. , Matha L., “ Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images”, International Journal of Computer Applications, vol. 89, no. 8, pp.28-33, March 2014.

Sridevi M., Mala C., Sanyam S., “Comparative Study of Image Forgery and Copy-Move Techniques”Springer-Verlag Berlin Heidelberg , vol.166, pp. 715–723, 2012.

Thajeel S. A., Sulong G., “A Survey of Copy-Move Forgery Detection Techniques”, Journal of Theoretical and Applied Information Technology, vol.70, no.1, 2014.

Zhang G. Q., Hang-jun Wang H. J., “SURF-based Detection of Copy-Move Forgery in Flat Region”, International Journal of Advancements in Computing Technology (IJACT), vol.4, no.17, 2012.

Downloads

Published

2015-06-30

How to Cite

Naincy, & Bathla, A. K. (2015). Comparative Study and Survey on Copy Move Image Forgery Detection Approaches. Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552), 2(6), 11-15. https://doi.org/10.53555/nncse.v2i6.445