SlideShare a Scribd company logo
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056
VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1113
AN APPROACH FOR COPY-MOVE ATTACK DETECTION AND
TRANSFORMATION RECOVERY
Snehal P. Chavhan1 , Prof. D. W. Wajgi2
1Student, Department of Computer Engineering, St. Vincent Palloti College of Engineering & Technology, Nagpur, India
, Maharashtra, India
2Assistant Professor, Department of Computer Engineering, St. Vincent Palloti College of Engineering & Technology,
Nagpur, India
, Maharashtra, India
.
Abstract - Digital images play an important role in
the carrier of information and are widely used in all
areas of day-to-day life. However, with the
development of modern science and technology, more
and more image processing software’s are developed.
This leads to the forgery of digital images. So, the
authenticity of the image information faces great
challenge in Digital Image Forensics. The main area of
concern is the Copy-Move forgery in Digital Images.
Copy-move forgery is one of the forensic technique in
which particular area is get copied and then pasted
onto the other portion of the image. Therefore, the
main aim is to identify the forged region in an given
image. The SIFT (Scale Invariant Feature Transform)
algorithm is used for extracting the features from an
image. This algorithm is divided into four stages. Each
stage plays an important role in extracting features
from an image. The forgery is detected when similar
features are detected within the pre-defined areas.
After detecting the features, next task is to detect
geometric transformations made in an image. The
RANSAC (Random Sample Consensus) algorithm is
used to detect the geometric transformations made in
an image.
Keywords : Copy-Move Forgery, Feature Extraction,
Geometric Transformations.
1. INTRODUCTION
Copy-move forgery in Digital Image is a simple and
effective technique. In this type of forgery, a part of the
image is copied and pasted to another part of the same
image. Copy-move simply requires the pasting of image
blocks in same image and hiding important information
from the image. Thus, this changes the originality and
degrades the authenticity of the image. Digital image
forgery detection techniques are divided into active
approaches and passive approaches. In active approach,
the digital image requires some pre-processing such as
watermark embedding or signature generation at the
time of creating the image. In passive approach, don’t
require any prior information about the image and
depends on traces left on the image by different
processing steps during image manipulation. A number
of techniques proposed to detect copy-move forgery
which can be classified into two main categories such as
Block-based methods and Key-point based methods [1].
Good forgery detection method should be robust to
manipulations made on the copied content. These
attacks are not detected by the single method. There are
several methods by which these attacks can be detected.
In copy-move forgery, some transformations such as,
rotation, scaling can be made. To detect those
transformations some methods are available. To
maintain the originality of the image transformations
made in an image should be detected and if possible the
image should be recovered. The detection algorithm
should be robust enough to detect the manipulations
done in an image. Nowadays, due to rapid advances
and availabilities of powerful image processing
software, modifying the content of digital images
becomes much easier with the help of sophisticated
software such as Adobe Photoshop. Pictures are the
most common and effective way of giving or conveying
information. Digital imaging has matured to become
the dominant technology for creating, processing, and
storing pictorial memory and evidence. Though this
technology brings many advantages, it can be used as a
misleading tool for hiding facts and evidences. This is
because today digital images can be manipulated in
such perfection that forgery cannot be detected
visually. In fact, the security concern of digital content
has arisen a long time ago and different techniques for
validating the integrity of digital images have been
developed. There are many ways to categorize the
image tampering, and generally, we can tell that some
usually performed operations in image tampering are:
1. Deleting or hiding a region in the image.
2. Adding a new object into the image.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056
VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1114
3. Misrepresenting the image information.
To insert and splicing image part of the original image
is the one of the most typical method. Watermarking is
the popular way to counterfeit the forgery image.
Unlike conventional film photographs, however, digital
images can be easily edited and modified with the aid
of today’s computer technology. Modification and
synthesis of digital images can be easily performed by a
novice with available sophisticated image processing
software’s like Adobe Photoshop [2]. While this has the
significant advantage of enjoying the creation of digital
works, it has the shortcoming of being maliciously
abused in cases where "proof" is required such as in
images of medical reports or crime scenes. Since digital
images are subjected to illicit distribution, owners of
such data are cautious about making their work
available without some method of identifying
ownership and copyright.
In the fields such as forensics, medical imaging, e-
commerce, and industrial photography, authenticity
and integrity of digital images is important. In medical
field physicians and researchers make diagnoses based
on imaging which is crucial as one is dealing with
human life. E-commerce has drastically increased in
recent years due to advancement of information
technology and the internet. As per the world internet
statistics, from 2000-2005 a growth of 160% has been
reported [4]. This is currently a market of
approximately 50 million internet users who have
made an online retail purchase. This cohort will grow
to nearly 100 million internet users by 2008 and will
be responsible for nearly 90% of all online retail sales
by that time.
Online marketing is mainly based on multimedia
technology with images and video as basic elements of
product description. With the increase of sophisticated
and advanced image processing and manipulation
software’s coming in to markets, even a novice has
gained with power to tamper images and counterfeit
revising the age old saying “A picture is worth a
thousand words” to “A picture unworthy a thousand
true words”. “The introduction and rapid spread of
digital manipulation to still and moving images raises
ethical issues of truth, deception, and digital image
integrity”, [5]. “With professionals challenging the
ethical boundaries of truth, it creates a potential loss of
public trust in digital media”, [5].
There are many cases of digital image forgery. All of
these cases can be categorized into three major groups,
based on the process involved in creating the fake
image. The groups are image retouching, image
splicing, and image copy-move forgery.
2. LITERATURE SURVEY
In Paper [1], the CLBA (Classification Based Attack)
algorithm is used for tampering detection. The main aim
behind this paper is the identification of image whose SIFT
(Scale Invariant Features Transform) keypoints have been
removed artificially from the image and then the keypoints
are re-inserted in an image, which are fake keypoints. This
algorithm point out only to the first octave keypoints i.e
those extracted from the image at its original resolution.
In paper [2], the Dempster–Shafer Theory of Evidence is
used. This paper aims at decision fusion strategy for image
forensics. The proposed system operates by combining at
the measurement level thus it permits to retain the
relevant information. The proposed framework includes:
i) The use of soft reasoning approach based on Dempster –
Shafer theory of evidence.
ii)The ease with which new information can be included as
soon as it becomes available.
iii)The framework which provides hierarchical structure,
allows to trade-off between granularity about information
provided by the fusion.
In paper [3], author has proposed a new approach of J-
linkage along with copy-move detection algorithm where
the SIFT features are considered. J-linkage is a method
which starts with Random Sampling and is robust for
multiple model fitting. It uses agglomerative clustering
procedure that link elements with Jaccard distance smaller
than one.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056
VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1115
In paper [4], a forensic algorithm which differentiates
between original and copied regions in JPEG images have
been proposed. They have used hypothesis that the
tampered image presents a double JPEG compression.
There are two compression i.e aligned (A-DJPG) or
nonaligned (NA-DJPG) and one of the scheme is used.
Unlike previous approaches, the algorithm in this paper
does not need to manually identify the suspected region in
order to test the presence or the absence of double
compression artifacts. Based on an improved and unified
statistical model characterizing the arti- facts that appear
in the presence of both A-DJPG or NA-DJPG, the proposed
algorithm automatically computes a likelihood map
indicating the probability for each 8×8 discrete cosine
transform block of being doubly compressed.
In paper [5], author has proposed new methodology based
on Transform Invariant Features. The main aim is based
on MPEG-7 image signature tools that forms a part of the
MPEG-7 standard. These tools are used for fast image and
video retrieval. Basically such tools are designed to detect
the duplicated region in an image or in video, but in
separate image. Author aims to find the duplicated region
in a same image.
The proposed method in [6], is based on a new feature
measuring the presence of demosacking artifacts at local
level. Demosacking is the digital process used to re-
construct a full color image from incomplete image
samples output from an image sensor overlid with a color
filter array. Green channel extraction is used for extracting
the features and then Map generation and Filtering is used
by which the forgery map is created.
The author in paper [7], has proposed a spliced image
detection technique based on Markov feature in DCT &
DWT domain. The proposed system consists of two kinds
of Markov features which are generated from the
transition probability matrices e.g the expanded Markov in
DCT & DWT domain. In this paper they made use of the
DCT domain to capture the correlation between DCT
coefficients and DWT domain is used to characterize the
dependency among wavelet coefficients across positions,
scales and orientations.
3. PROPOSED METHODOLOGY
The Proposed methodology uses both SIFT algorithm and
RANSAC algorithm stated in previous chapter. The
proposed approach is based on SIFT algorithm which
extracts strong features. By which we can discover if a part
of an image is was copy-moved and to detect which
geometrical transformations was applied. The copied part
has the same appearance that of the original one.
Therefore the keypoints which are extracted in the forged
region will be similar to some extend to the original ones.
So, matching among SIFT features can be adopted for
determining possible tampering.
Input Image
Output Image
Figure 1: Overview of Proposed System
The first step consist of SIFT feature extraction and
keypoint matching, the second step is keypoint clustering
and detection, while the third step estimates the geometric
transformation made, if transformation has been made.
4. CONCLUSION
The copy-move forgery detection is one of the emerging
problems in the field of digital image forensics. Many
techniques have been proposed to deal with this problem.
One of the biggest issue in these techniques is to detect the
duplicated image regions without getting affected by the
common image processing operations, e.g. compression,
noise addition, rotation. In this paper, several methods
have been studied and compared, where the main idea in
common was to detect cloned region, instead of detecting
the whole duplicated regions. A novel methodology to
support image forensics investigation based on SIFT
features has been proposed.
REFERENCES
[1] Ghulam Muhammad, Muhammad Hussain, George
Bebis “Passive copy move image forgery detection
using undecimated dyadic wavelet transform”, in
Elsevier, 2012.
[2] Andrea Costanzo, Irene Amerini, Roberto Caldelli, and
Mauro Barni, “Forensic Analysis of SIFT Keypoint
Removal and Injection”, IEEE Transactions on
Geometric
Transformation
Estimation
Feature Extraction
and Matching
Hierarchical
Clustering
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056
VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1116
Information Forensics and Security, Vol. 9, no. 9,
September 2014.
[3] Marco Fontani, Tiziano Bianchi, Alessia De Rosa,
Alessandro Piva, and Mauro Barni,“A Framework for
Decision Fusion in Image Forensics Based on
Dempster–Shafer Theory of Evidence”, IEEE
Transactions on Information Forensics and Security,
Vol. 8, no. 4, April 2013.
[4] Irene Amerini, Lamberto Ballan, Roberto Caldelli,
Alberto DelBimbo, Luca Del Tongo, Giuseppe Serra,
“Copy Move Forgery Detection And Localization By
Means Of Robust Clustering with JLinkage”
,L.Amerinietal./SignalProcessing:ImageCommunicatio
n28(2013)659–669.
[5] Tiziano Bianchi and Alessandro Piva, “Image Forgery
Localization via Block-Grained Analysis of JPEG
Artifacts” IEEE Transactions on Information Forensics
And Security, Vol. 7, No. 3, June 2012.
[6] Pravin Kakar, S and N. Sudha, “Exposing Post
processed Copy–Paste Forgeries Through Transform-
Invariant Features”, IEEE Transactions On Information
Forensics And Security, Vol. 7, No. 3, June 2012 .
[7] Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa,
and Alessandro Piva, “Image Forgery Localization via
Fine-Grained Analysis of CFA Artifacts” IEEE
Transactions On Information Forensics And Security,
Vol. 7, No. 5, October 2012.
[8] Zhongwei He, WeiLu, WeiSun, JiwuHuang, ‘Digital
Image Splicing Detection Based on Markov Features in
DCT and DWT’, Elsevier 2012, 4292-4299.
[9] Sebastiano Battiato, Giovanni Maria Farinella, Enrico
Messina, and Giovanni Puglisi, “Robust Image
Alignment for Tampering Detection”, IEEE
Transactions On Information Forensics And Security,
Vol. 7, No. 4, August 2012.
[10] Irene Amerini, Lamberto Ballan, Roberto Caldelli,
Alberto Del Bimboand Giuseppe Serra,“A SIFT-Based
Forensic Method for Copy–Move Attack Detection and
Transformation Recovery”, IEEE Transactions On
Information Forensics And Security, Vol. 6, No. 3,
September 2011.
[11] Y. Huang, W. Lu, W. Sun, and D. Long, “Improved
DCT-based detection of copy-move forgery in images”.
Forensic Sci. Int. Vol. 206, pp. 178_84, 2011.
[12] Pravin Kakar, N. Sudha, and Wee Ser, “Exposing
Digital Image Forgeries by Detecting Discrepancies in
Motion Blur” IEEE Transactions On Multimedia, Vol.
13, No. 3, June 2011.
[13] Ahmet Emir Dirik, Nasir Memon, “Image Tamper
Detection based on Demosaicing artifacts”, IEEE
Transactions 2010.

More Related Content

PDF
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
PDF
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
PDF
G010245056
PDF
IRJET- Privacy Issues in Content based Image Retrieval (CBIR) for Mobile ...
PDF
40120140501006
PDF
20120140502012
PDF
Elucidating Digital deception: Spot counterfeit fragment
PDF
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
G010245056
IRJET- Privacy Issues in Content based Image Retrieval (CBIR) for Mobile ...
40120140501006
20120140502012
Elucidating Digital deception: Spot counterfeit fragment
Face Annotation using Co-Relation based Matching for Improving Image Mining ...

What's hot (20)

PDF
Design and Development of an Algorithm for Image Clustering In Textile Image ...
PDF
IRJET- A Survey on Image Retrieval using Machine Learning
PDF
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
PDF
IRJET- Comparative Analysis of Video Processing Object Detection
PDF
IRJET - Visual E-Commerce Application using Deep Learning
PDF
Automatic Visual Concept Detection in Videos: Review
PDF
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
PDF
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
PDF
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
PDF
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
PDF
Enhanced Thinning Based Finger Print Recognition
PDF
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
PDF
Content-based Image Retrieval System for an Image Gallery Search Application
PDF
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
PPT
Digital Image Forgery
PDF
Ijarcce 27
PDF
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
PDF
06108870 analytical study of parallel and distributed image processing 2011
PDF
IRJET - Gender and Age Prediction using Wideresnet Architecture
PDF
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Design and Development of an Algorithm for Image Clustering In Textile Image ...
IRJET- A Survey on Image Retrieval using Machine Learning
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
IRJET- Comparative Analysis of Video Processing Object Detection
IRJET - Visual E-Commerce Application using Deep Learning
Automatic Visual Concept Detection in Videos: Review
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
Enhanced Thinning Based Finger Print Recognition
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...
Content-based Image Retrieval System for an Image Gallery Search Application
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
Digital Image Forgery
Ijarcce 27
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
06108870 analytical study of parallel and distributed image processing 2011
IRJET - Gender and Age Prediction using Wideresnet Architecture
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Ad

Similar to An Approach for Copy-Move Attack Detection and Transformation Recovery (20)

PDF
Digital Image Sham Detection Using Deep Learning
PDF
A Study of Image Tampering Detection
PDF
A Review on Various Forgery Detection Techniques
PDF
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
PDF
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
PDF
20120140502012
PDF
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
PDF
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
PDF
Analysis and Detection of Image Forgery Methodologies
PDF
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
PDF
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
PDF
A Review Paper On Image Forgery Detection In Image Processing
PDF
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
PDF
Image Forgery Detection Methods- A Review
PDF
IRJET - Simulation of Colour Image Processing Techniques on VHDL
PDF
Rey.survey watermarking auth_images.2002
PDF
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
PDF
Image Processing in the Current Scenario
PDF
AHP validated literature review of forgery type dependent passive image forge...
PDF
A Review on Overview of Image Processing Techniques
Digital Image Sham Detection Using Deep Learning
A Study of Image Tampering Detection
A Review on Various Forgery Detection Techniques
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
20120140502012
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
Analysis and Detection of Image Forgery Methodologies
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
A Review Paper On Image Forgery Detection In Image Processing
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
Image Forgery Detection Methods- A Review
IRJET - Simulation of Colour Image Processing Techniques on VHDL
Rey.survey watermarking auth_images.2002
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
Image Processing in the Current Scenario
AHP validated literature review of forgery type dependent passive image forge...
A Review on Overview of Image Processing Techniques
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Geodesy 1.pptx...............................................
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
composite construction of structures.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Project quality management in manufacturing
PPTX
Sustainable Sites - Green Building Construction
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Construction Project Organization Group 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Model Code of Practice - Construction Work - 21102022 .pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Geodesy 1.pptx...............................................
Lesson 3_Tessellation.pptx finite Mathematics
composite construction of structures.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Mechanical Engineering MATERIALS Selection
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Project quality management in manufacturing
Sustainable Sites - Green Building Construction
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Construction Project Organization Group 2.pptx
Internet of Things (IOT) - A guide to understanding

An Approach for Copy-Move Attack Detection and Transformation Recovery

  • 1. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056 VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1113 AN APPROACH FOR COPY-MOVE ATTACK DETECTION AND TRANSFORMATION RECOVERY Snehal P. Chavhan1 , Prof. D. W. Wajgi2 1Student, Department of Computer Engineering, St. Vincent Palloti College of Engineering & Technology, Nagpur, India , Maharashtra, India 2Assistant Professor, Department of Computer Engineering, St. Vincent Palloti College of Engineering & Technology, Nagpur, India , Maharashtra, India . Abstract - Digital images play an important role in the carrier of information and are widely used in all areas of day-to-day life. However, with the development of modern science and technology, more and more image processing software’s are developed. This leads to the forgery of digital images. So, the authenticity of the image information faces great challenge in Digital Image Forensics. The main area of concern is the Copy-Move forgery in Digital Images. Copy-move forgery is one of the forensic technique in which particular area is get copied and then pasted onto the other portion of the image. Therefore, the main aim is to identify the forged region in an given image. The SIFT (Scale Invariant Feature Transform) algorithm is used for extracting the features from an image. This algorithm is divided into four stages. Each stage plays an important role in extracting features from an image. The forgery is detected when similar features are detected within the pre-defined areas. After detecting the features, next task is to detect geometric transformations made in an image. The RANSAC (Random Sample Consensus) algorithm is used to detect the geometric transformations made in an image. Keywords : Copy-Move Forgery, Feature Extraction, Geometric Transformations. 1. INTRODUCTION Copy-move forgery in Digital Image is a simple and effective technique. In this type of forgery, a part of the image is copied and pasted to another part of the same image. Copy-move simply requires the pasting of image blocks in same image and hiding important information from the image. Thus, this changes the originality and degrades the authenticity of the image. Digital image forgery detection techniques are divided into active approaches and passive approaches. In active approach, the digital image requires some pre-processing such as watermark embedding or signature generation at the time of creating the image. In passive approach, don’t require any prior information about the image and depends on traces left on the image by different processing steps during image manipulation. A number of techniques proposed to detect copy-move forgery which can be classified into two main categories such as Block-based methods and Key-point based methods [1]. Good forgery detection method should be robust to manipulations made on the copied content. These attacks are not detected by the single method. There are several methods by which these attacks can be detected. In copy-move forgery, some transformations such as, rotation, scaling can be made. To detect those transformations some methods are available. To maintain the originality of the image transformations made in an image should be detected and if possible the image should be recovered. The detection algorithm should be robust enough to detect the manipulations done in an image. Nowadays, due to rapid advances and availabilities of powerful image processing software, modifying the content of digital images becomes much easier with the help of sophisticated software such as Adobe Photoshop. Pictures are the most common and effective way of giving or conveying information. Digital imaging has matured to become the dominant technology for creating, processing, and storing pictorial memory and evidence. Though this technology brings many advantages, it can be used as a misleading tool for hiding facts and evidences. This is because today digital images can be manipulated in such perfection that forgery cannot be detected visually. In fact, the security concern of digital content has arisen a long time ago and different techniques for validating the integrity of digital images have been developed. There are many ways to categorize the image tampering, and generally, we can tell that some usually performed operations in image tampering are: 1. Deleting or hiding a region in the image. 2. Adding a new object into the image.
  • 2. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056 VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1114 3. Misrepresenting the image information. To insert and splicing image part of the original image is the one of the most typical method. Watermarking is the popular way to counterfeit the forgery image. Unlike conventional film photographs, however, digital images can be easily edited and modified with the aid of today’s computer technology. Modification and synthesis of digital images can be easily performed by a novice with available sophisticated image processing software’s like Adobe Photoshop [2]. While this has the significant advantage of enjoying the creation of digital works, it has the shortcoming of being maliciously abused in cases where "proof" is required such as in images of medical reports or crime scenes. Since digital images are subjected to illicit distribution, owners of such data are cautious about making their work available without some method of identifying ownership and copyright. In the fields such as forensics, medical imaging, e- commerce, and industrial photography, authenticity and integrity of digital images is important. In medical field physicians and researchers make diagnoses based on imaging which is crucial as one is dealing with human life. E-commerce has drastically increased in recent years due to advancement of information technology and the internet. As per the world internet statistics, from 2000-2005 a growth of 160% has been reported [4]. This is currently a market of approximately 50 million internet users who have made an online retail purchase. This cohort will grow to nearly 100 million internet users by 2008 and will be responsible for nearly 90% of all online retail sales by that time. Online marketing is mainly based on multimedia technology with images and video as basic elements of product description. With the increase of sophisticated and advanced image processing and manipulation software’s coming in to markets, even a novice has gained with power to tamper images and counterfeit revising the age old saying “A picture is worth a thousand words” to “A picture unworthy a thousand true words”. “The introduction and rapid spread of digital manipulation to still and moving images raises ethical issues of truth, deception, and digital image integrity”, [5]. “With professionals challenging the ethical boundaries of truth, it creates a potential loss of public trust in digital media”, [5]. There are many cases of digital image forgery. All of these cases can be categorized into three major groups, based on the process involved in creating the fake image. The groups are image retouching, image splicing, and image copy-move forgery. 2. LITERATURE SURVEY In Paper [1], the CLBA (Classification Based Attack) algorithm is used for tampering detection. The main aim behind this paper is the identification of image whose SIFT (Scale Invariant Features Transform) keypoints have been removed artificially from the image and then the keypoints are re-inserted in an image, which are fake keypoints. This algorithm point out only to the first octave keypoints i.e those extracted from the image at its original resolution. In paper [2], the Dempster–Shafer Theory of Evidence is used. This paper aims at decision fusion strategy for image forensics. The proposed system operates by combining at the measurement level thus it permits to retain the relevant information. The proposed framework includes: i) The use of soft reasoning approach based on Dempster – Shafer theory of evidence. ii)The ease with which new information can be included as soon as it becomes available. iii)The framework which provides hierarchical structure, allows to trade-off between granularity about information provided by the fusion. In paper [3], author has proposed a new approach of J- linkage along with copy-move detection algorithm where the SIFT features are considered. J-linkage is a method which starts with Random Sampling and is robust for multiple model fitting. It uses agglomerative clustering procedure that link elements with Jaccard distance smaller than one.
  • 3. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056 VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1115 In paper [4], a forensic algorithm which differentiates between original and copied regions in JPEG images have been proposed. They have used hypothesis that the tampered image presents a double JPEG compression. There are two compression i.e aligned (A-DJPG) or nonaligned (NA-DJPG) and one of the scheme is used. Unlike previous approaches, the algorithm in this paper does not need to manually identify the suspected region in order to test the presence or the absence of double compression artifacts. Based on an improved and unified statistical model characterizing the arti- facts that appear in the presence of both A-DJPG or NA-DJPG, the proposed algorithm automatically computes a likelihood map indicating the probability for each 8×8 discrete cosine transform block of being doubly compressed. In paper [5], author has proposed new methodology based on Transform Invariant Features. The main aim is based on MPEG-7 image signature tools that forms a part of the MPEG-7 standard. These tools are used for fast image and video retrieval. Basically such tools are designed to detect the duplicated region in an image or in video, but in separate image. Author aims to find the duplicated region in a same image. The proposed method in [6], is based on a new feature measuring the presence of demosacking artifacts at local level. Demosacking is the digital process used to re- construct a full color image from incomplete image samples output from an image sensor overlid with a color filter array. Green channel extraction is used for extracting the features and then Map generation and Filtering is used by which the forgery map is created. The author in paper [7], has proposed a spliced image detection technique based on Markov feature in DCT & DWT domain. The proposed system consists of two kinds of Markov features which are generated from the transition probability matrices e.g the expanded Markov in DCT & DWT domain. In this paper they made use of the DCT domain to capture the correlation between DCT coefficients and DWT domain is used to characterize the dependency among wavelet coefficients across positions, scales and orientations. 3. PROPOSED METHODOLOGY The Proposed methodology uses both SIFT algorithm and RANSAC algorithm stated in previous chapter. The proposed approach is based on SIFT algorithm which extracts strong features. By which we can discover if a part of an image is was copy-moved and to detect which geometrical transformations was applied. The copied part has the same appearance that of the original one. Therefore the keypoints which are extracted in the forged region will be similar to some extend to the original ones. So, matching among SIFT features can be adopted for determining possible tampering. Input Image Output Image Figure 1: Overview of Proposed System The first step consist of SIFT feature extraction and keypoint matching, the second step is keypoint clustering and detection, while the third step estimates the geometric transformation made, if transformation has been made. 4. CONCLUSION The copy-move forgery detection is one of the emerging problems in the field of digital image forensics. Many techniques have been proposed to deal with this problem. One of the biggest issue in these techniques is to detect the duplicated image regions without getting affected by the common image processing operations, e.g. compression, noise addition, rotation. In this paper, several methods have been studied and compared, where the main idea in common was to detect cloned region, instead of detecting the whole duplicated regions. A novel methodology to support image forensics investigation based on SIFT features has been proposed. REFERENCES [1] Ghulam Muhammad, Muhammad Hussain, George Bebis “Passive copy move image forgery detection using undecimated dyadic wavelet transform”, in Elsevier, 2012. [2] Andrea Costanzo, Irene Amerini, Roberto Caldelli, and Mauro Barni, “Forensic Analysis of SIFT Keypoint Removal and Injection”, IEEE Transactions on Geometric Transformation Estimation Feature Extraction and Matching Hierarchical Clustering
  • 4. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395 -0056 VOLUME: 03 ISSUE: 01 | JAN-2016 WWW.IRJET.NET P-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1116 Information Forensics and Security, Vol. 9, no. 9, September 2014. [3] Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni,“A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence”, IEEE Transactions on Information Forensics and Security, Vol. 8, no. 4, April 2013. [4] Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto DelBimbo, Luca Del Tongo, Giuseppe Serra, “Copy Move Forgery Detection And Localization By Means Of Robust Clustering with JLinkage” ,L.Amerinietal./SignalProcessing:ImageCommunicatio n28(2013)659–669. [5] Tiziano Bianchi and Alessandro Piva, “Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts” IEEE Transactions on Information Forensics And Security, Vol. 7, No. 3, June 2012. [6] Pravin Kakar, S and N. Sudha, “Exposing Post processed Copy–Paste Forgeries Through Transform- Invariant Features”, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 3, June 2012 . [7] Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva, “Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts” IEEE Transactions On Information Forensics And Security, Vol. 7, No. 5, October 2012. [8] Zhongwei He, WeiLu, WeiSun, JiwuHuang, ‘Digital Image Splicing Detection Based on Markov Features in DCT and DWT’, Elsevier 2012, 4292-4299. [9] Sebastiano Battiato, Giovanni Maria Farinella, Enrico Messina, and Giovanni Puglisi, “Robust Image Alignment for Tampering Detection”, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 4, August 2012. [10] Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimboand Giuseppe Serra,“A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery”, IEEE Transactions On Information Forensics And Security, Vol. 6, No. 3, September 2011. [11] Y. Huang, W. Lu, W. Sun, and D. Long, “Improved DCT-based detection of copy-move forgery in images”. Forensic Sci. Int. Vol. 206, pp. 178_84, 2011. [12] Pravin Kakar, N. Sudha, and Wee Ser, “Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur” IEEE Transactions On Multimedia, Vol. 13, No. 3, June 2011. [13] Ahmet Emir Dirik, Nasir Memon, “Image Tamper Detection based on Demosaicing artifacts”, IEEE Transactions 2010.