http://iet.metastore.ingenta.com
1887

CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection

CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Image Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

With the advancement of image editing tools in today's world, the manipulation of images like cropping, cloning, resizing, etc., becomes an easy proposition and on the other end, checking or determining whether an image has been manipulated or not, becomes a great challenge. Copy-move forgery in images is the most popular tampering method in which a portion of an image is copied and pasted in some other location of the same image. The detection of copy-move forgery has become a prominent research area. This study presents a detailed review and critical discussions with pros and cons of each of copy-move forgery detection techniques from 2007 to 2017. This study also addresses the variation in databases, issues, challenges, future directions and references in this domain.

References

    1. 1)
      • T. Zhang , R.D. Wang .
        1. Zhang, T., Wang, R.D.: ‘Copy-move forgery detection based on SVD in digital image’. Int. Congress on Image and Signal Processing, 2009, pp. 15.
        . Int. Congress on Image and Signal Processing , 1 - 5
    2. 2)
      • Y. Huang , W. Lu , W. Sun .
        2. Huang, Y., Lu, W., Sun, W., et al: ‘Improved DCT-based detection of copy-move forgery in images’, Forensic Sci. Int., 2011, 206, (1–3), pp. 178184.
        . Forensic Sci. Int. , 178 - 184
    3. 3)
      • B. Yang , X. Sun , X. Chen .
        3. Yang, B., Sun, X., Chen, X., et al: ‘An efficient forensic method for copy-move forgery detection based on DWT-FWHT’, Radioengineering, 2013, 22, (4), pp. 10981105.
        . Radioengineering , 4 , 1098 - 1105
    4. 4)
      • L. Li , S. Li , J. Wang .
        4. Li, L., Li, S., Wang, J.: ‘Copy-move forgery detection based on PHT’. World Congress on Information and Communication Technologies, 2012, pp. 10611065.
        . World Congress on Information and Communication Technologies , 1061 - 1065
    5. 5)
      • M. Ghorbani , M. Firouzmand , A. Faraahi .
        5. Ghorbani, M., Firouzmand, M., Faraahi, A.: ‘DWT-DCT (QCD) based copy-move image forgery detection’. Int. Conf. on Systems, Signals and Image Processing, 2011, pp. 14.
        . Int. Conf. on Systems, Signals and Image Processing , 1 - 4
    6. 6)
      • E. Ardizzone , G. Mazzola .
        6. Ardizzone, E., Mazzola, G.: ‘Detection of duplicated regions in tampered digital images by bit-plane analysis’. 15th Int. Conf. on Image Analysis and Processing (ICIAP 2009), Vietri sul Mare, Italy, 2009, pp. 893901.
        . 15th Int. Conf. on Image Analysis and Processing (ICIAP 2009), Vietri sul Mare , 893 - 901
    7. 7)
      • B.L. Shivakumar , S.S. Baboo .
        7. Shivakumar, B.L., Baboo, S.S.: ‘Detection of region duplication forgery in digital images using SURF’, Int. J. Comput. Sci. Issues, 2011, 8, (4), pp. 199205.
        . Int. J. Comput. Sci. Issues , 4 , 199 - 205
    8. 8)
      • J. Singh , R. Balasubramanian .
        8. Singh, J., Balasubramanian, R.: ‘A high performance copy-move image forgery detection scheme on GPU’. Proc. Int. Conf. on Soft Computing for Problem Solving, 2012, pp. 239246.
        . Proc. Int. Conf. on Soft Computing for Problem Solving , 239 - 246
    9. 9)
      • H.J. Lin , C.W. Wang , Y.T. Kao .
        9. Lin, H.J., Wang, C.W., Kao, Y.T.: ‘Fast copy-move forgery detection’, WSEAS Trans. Signal Proc., 2009, 5, (5), pp. 188197.
        . WSEAS Trans. Signal Proc. , 5 , 188 - 197
    10. 10)
      • S. Bayram , H.T. Sencar , N. Memon .
        10. Bayram, S., Sencar, H.T., Memon, N.: ‘An efficient and robust method for detecting copy-move forgery’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, 2009, pp. 10531056.
        . IEEE Int. Conf. on Acoustics, Speech and Signal Processing , 1053 - 1056
    11. 11)
      • L. Li , S. Li , H. Zhu .
        11. Li, L., Li, S., Zhu, H., et al: ‘An efficient scheme for detecting copy-move forged images by local binary patterns’, IEEE Trans. Image Process., 2016, 4, (1), pp. 4656.
        . IEEE Trans. Image Process. , 1 , 46 - 56
    12. 12)
      • W. Li , N. Yu .
        12. Li, W., Yu, N.: ‘Rotation robust detection of copy-move forgery’. IEEE Int. Conf. on Image Processing, 2010, pp. 21132116.
        . IEEE Int. Conf. on Image Processing , 2113 - 2116
    13. 13)
      • G. Muhammad , M. Hussain , G. Bebis .
        13. Muhammad, G., Hussain, M., Bebis, G.: ‘Passive copy move image forgery detection using undecimated dyadic wavelet transform’, Digit. Invest., 2012, 9, (1), pp. 4957.
        . Digit. Invest. , 1 , 49 - 57
    14. 14)
      • H.C. Hsu , M.S. Wang .
        14. Hsu, H.C., Wang, M.S.: ‘Detection of copy-move forgery image using gabor descriptor’. Anti-counterfeiting, Security, and Identification, 2012, pp. 14.
        . Anti-counterfeiting, Security, and Identification , 1 - 4
    15. 15)
      • G. Muhammad , M. Hussain , K. Khawaji .
        15. Muhammad, G., Hussain, M., Khawaji, K., et al: ‘Blind copy move image forgery detection using dyadic undecimated wavelet transform’. Int. Conf. on Digital Signal Processing (DSP), 2011, pp. 16.
        . Int. Conf. on Digital Signal Processing (DSP) , 1 - 6
    16. 16)
      • M. Qiao , A. Sung , Q. Liu .
        16. Qiao, M., Sung, A., Liu, Q., et al: ‘A novel approach for detection of copy-move forgery’. Proc. Int. Conf. on Advanced Engineering Computing and Applied Science, 2011, pp. 4447.
        . Proc. Int. Conf. on Advanced Engineering Computing and Applied Science , 44 - 47
    17. 17)
      • H. Huang , W. Guo , Y. Zhang .
        17. Huang, H., Guo, W., Zhang, Y.: ‘Detection of copy-move forgery in digital images using SIFT algorithm’. IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, vol. 2, pp. 272276.
        . IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application , 272 - 276
    18. 18)
      • M. Jaberi , G. Bebis , M. Hussain .
        18. Jaberi, M., Bebis, G., Hussain, M., et al: ‘Improving the detection and localization of duplicated regions in copy-move image forgery’. Int. Conf. on Digital Signal Processing (DSP), 2013, pp. 16.
        . Int. Conf. on Digital Signal Processing (DSP) , 1 - 6
    19. 19)
      • P. Mishra , N. Mishra , S. Sharma .
        19. Mishra, P., Mishra, N., Sharma, S., et al: ‘Region duplication forgery detection technique based on SURF and HAC’, Int. J. Adv. Comput. Technol., 2013, 6, (17), pp. 18.
        . Int. J. Adv. Comput. Technol. , 17 , 1 - 8
    20. 20)
      • L. Chen , W. Lu , J. Ni .
        20. Chen, L., Lu, W., Ni, J., et al: ‘Region duplication detection based on Harris corner points and step sector statistics’, J. Vis. Commun. Image Represent., 2013, 24, (3), pp. 244254.
        . J. Vis. Commun. Image Represent. , 3 , 244 - 254
    21. 21)
      • L. Kunlun , L. Hexin , Y. Bo .
        21. Kunlun, L., Hexin, L., Bo, Y., et al: ‘Detection of image forgery based on improved PCA-SIFT’. Int. Conf. on Computer Engineering and Network, 2014, pp. 679686.
        . Int. Conf. on Computer Engineering and Network , 679 - 686
    22. 22)
      • L. Liu , R. Ni , Y. Zhao .
        22. Liu, L., Ni, R., Zhao, Y., et al: ‘Improved SIFT-based copy-move detection using BFSN clustering and CFA features’. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 2014, pp. 626629.
        . Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing , 626 - 629
    23. 23)
      • M.F. Hashmi , V. Anand , A.G. Keskar .
        23. Hashmi, M.F., Anand, V., Keskar, A.G.: ‘Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform’, AASRI Procedia, 2014, 9, pp. 8491.
        . AASRI Procedia , 84 - 91
    24. 24)
      • I. Amerini , L. Ballan , R. Caldelli .
        24. Amerini, I., Ballan, L., Caldelli, R., et al: ‘A SIFT-based forensic method for copy-move attack detection and transformation recovery’, IEEE Trans. Inf. Forensics Sec., 2011, 6, (3), pp. 10991110.
        . IEEE Trans. Inf. Forensics Sec. , 3 , 1099 - 1110
    25. 25)
      • Z. Mohamadian , A.A. Pouyan .
        25. Mohamadian, Z., Pouyan, A.A.: ‘Detection of duplication forgery in digital images in uniform and non-uniform regions’. Int. Conf. on Computer Modelling and Simulation, 2013, pp. 455460.
        . Int. Conf. on Computer Modelling and Simulation , 455 - 460
    26. 26)
      • J. Qian , Y. Dong .
        26. Qian, J., Dong, Y.: ‘A clustering algorithm based on broad first searching neighbors’, J. Southeast Univ., Nat. Sci. Ed., 2004, 34, (1), pp. 109112.
        . J. Southeast Univ., Nat. Sci. Ed. , 1 , 109 - 112
    27. 27)
      • E. Ardizzone , A. Bruno , G. Mazzola .
        27. Ardizzone, E., Bruno, A., Mazzola, G.: ‘Detecting multiple copies in tampered images’. IEEE Int. Conf. on Image Processing, 2010, pp. 21172120.
        . IEEE Int. Conf. on Image Processing , 2117 - 2120
    28. 28)
      • I. Amerini , L. Ballan , R. Caldelli .
        28. Amerini, I., Ballan, L., Caldelli, R., et al: ‘Copy-move forgery detection and localization by means of robust clustering with J-Linkage’, Signal Process., Image Commun., 2013, 28, (6), pp. 659669.
        . Signal Process., Image Commun. , 6 , 659 - 669
    29. 29)
      • V. Christlein , C. Riess , E. Angelopoulou .
        29. Christlein, V., Riess, C., Angelopoulou, E.: ‘A study on features for the detection of copy-move forgeries’. Proc. Information Security Solutions Europe, 2010, pp. 105116.
        . Proc. Information Security Solutions Europe , 105 - 116
    30. 30)
      • M. Sridevi , C. Mala , S. Siddhant .
        30. Sridevi, M., Mala, C., Siddhant, S.: ‘Comparative study of image forgery and copy-move techniques’, inAdvances in Computer Science, Engineering & Applications: Proceedings of the Second International Conference on Computer Science, Engineering and Applications (ICCSEA), 2012, pp. 715723.
        . Advances in Computer Science, Engineering & Applications: Proceedings of the Second International Conference on Computer Science, Engineering and Applications (ICCSEA) , 715 - 723
    31. 31)
      • D.P. Tian .
        31. Tian, D.P.: ‘A review on image feature extraction and representation techniques’, Int. J. Multimed. Ubiquitous Eng., 2013, 8, pp. 385395.
        . Int. J. Multimed. Ubiquitous Eng. , 385 - 395
    32. 32)
      • T. Qazi , K. Hayat , S.U. Khan .
        32. Qazi, T., Hayat, K., Khan, S.U., et al: ‘Survey on blind image forgery detection’, IET Image Process., 2013, 7, (7), pp. 660670.
        . IET Image Process. , 7 , 660 - 670
    33. 33)
      • G.K. Birajdar , V.H. Mankar .
        33. Birajdar, G.K., Mankar, V.H.: ‘Digital image forgery detection using passive techniques: a survey’, Digit. Invest., 2013, 10, (3), pp. 226245.
        . Digit. Invest. , 3 , 226 - 245
    34. 34)
      • M.D. Ansari , S.P. Ghrera , V. Tyagi .
        34. Ansari, M.D., Ghrera, S.P., Tyagi, V.: ‘Pixel-based image forgery detection: a review’, IETE J. Educ., 2014, 55, (1), pp. 4046.
        . IETE J. Educ. , 1 , 40 - 46
    35. 35)
      • W.N.N. Diane , S. Xingming , F.K. Moise .
        35. Diane, W.N.N., Xingming, S., Moise, F.K.: ‘A survey of partition-based techniques for copy-move forgery detection’, Sci. World J., 2014, 55, (1), pp. 113.
        . Sci. World J. , 1 , 1 - 13
    36. 36)
      • A.D. Warbhe , R.V. Dharaskar , V.M. Thakare .
        36. Warbhe, A.D., Dharaskar, R.V., Thakare, V.M.: ‘A survey on keypoint based copy-paste forgery detection techniques’, Procedia Comput. Sci., 2016, 78, pp. 6167.
        . Procedia Comput. Sci. , 61 - 67
    37. 37)
      • N.B.A. Warif , A.W.A. Wahab , M.Y.I. Idris .
        37. Warif, N.B.A., Wahab, A.W.A., Idris, M.Y.I., et al: ‘Copy-move forgery detection: survey, challenges and future directions’, J. Netw. Comput. Appl., 2016, 75, pp. 259278.
        . J. Netw. Comput. Appl. , 259 - 278
    38. 38)
      • S.B. Kotsiantis .
        38. Kotsiantis, S.B.: ‘Supervised machine learning: a review of classification techniques’. Proc. Conf. on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, 2007, pp. 324.
        . Proc. Conf. on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies , 3 - 24
    39. 39)
      • D.G. Lowe .
        39. Lowe, D.G.: ‘Distinctive image features from scale-invariant keypoints’, Int. J. Comput. Vis., 2004, 60, (2), pp. 91110.
        . Int. J. Comput. Vis. , 2 , 91 - 110
    40. 40)
      • H. Bay , A. Ess , T. Tuytelaars .
        40. Bay, H., Ess, A., Tuytelaars, T., et al: ‘Speeded-up robust features (SURF)’, Comput. Vis. Image Underst., 2008, 110, (3), pp. 346359.
        . Comput. Vis. Image Underst. , 3 , 346 - 359
    41. 41)
      • B. Su , Z. Kaizhen .
        41. Su, B., Kaizhen, Z.: ‘Detection of copy forgery in digital images based on LPP-SIFT’. Int. Conf. on Industrial Control and Electronics Engineering, 2012, pp. 17731776.
        . Int. Conf. on Industrial Control and Electronics Engineering , 1773 - 1776
    42. 42)
      • M.F. Hashmi , A.R. Hambarde , A.G. Keskar .
        42. Hashmi, M.F., Hambarde, A.R., Keskar, A.G.: ‘Copy move forgery detection using DWT and SIFT features’. Int. Conf. on Intelligent Systems Design and Applications, 2013, pp. 188193.
        . Int. Conf. on Intelligent Systems Design and Applications , 188 - 193
    43. 43)
      • A. Vijay , H.M. Farukh , K.G. Avinash .
        43. Vijay, A., Farukh, H.M., Avinash, K.G.: ‘A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods’. Intelligent Information and Database Systems: 6th Asian Conf., ACIIDS 2014, Bangkok, Thailand, 7–9 April 2014, Proc., Part I, 2014, pp. 530542.
        . Intelligent Information and Database Systems: 6th Asian Conf., ACIIDS 2014, Bangkok, Thailand, 7–9 April 2014, Proc., Part I , 530 - 542
    44. 44)
      • K. Sudhakar , V.M. Sandeep , S. Kulkarni .
        44. Sudhakar, K., Sandeep, V.M., Kulkarni, S.: ‘Speeding-up SIFT based copy move forgery detection using level set approach’. Int. Conf. on Advances in Electronics Computers and Communications, 2014, pp. 16.
        . Int. Conf. on Advances in Electronics Computers and Communications , 1 - 6
    45. 45)
      • T. Chihaoui , S. Bourouis , K. Hamrouni .
        45. Chihaoui, T., Bourouis, S., Hamrouni, K.: ‘Copy-move image forgery detection based on SIFT descriptors and SVD-matching’. Int. Conf. on Advanced Technologies for Signal and Image Processing (ATSIP), 2014, pp. 125129.
        . Int. Conf. on Advanced Technologies for Signal and Image Processing (ATSIP) , 125 - 129
    46. 46)
      • J. Zhang , Q. Ruan , Y. Jin .
        46. Zhang, J., Ruan, Q., Jin, Y.: ‘Combined SIFT and bi-coherence features to detect image forgery’. Int. Conf. on Signal Processing, 2014, pp. 18591863.
        . Int. Conf. on Signal Processing , 1859 - 1863
    47. 47)
      • Y. Fan , Y.S. Zhu , Z. Liu .
        47. Fan, Y., Zhu, Y.S., Liu, Z.: ‘An improved SIFT-based copy-move forgery detection method using T-linkage and multi-scale analysis’, J. Inf. Hiding Multimed. Signal Process., 2016, 7, (2), pp. 10991110.
        . J. Inf. Hiding Multimed. Signal Process. , 2 , 1099 - 1110
    48. 48)
      • L. Magri , A. Fusiello .
        48. Magri, L., Fusiello, A.: ‘T-linkage: a continuous relaxation of J-linkage for multi-model fitting’. IEEE Conf. on Computer Vision and Pattern Recognition, 2014, pp. 39543961.
        . IEEE Conf. on Computer Vision and Pattern Recognition , 3954 - 3961
    49. 49)
      • L. Jing , C. Shao .
        49. Jing, L., Shao, C.: ‘Image copy-move forgery detecting based on local invariant feature’, J. Multimed., 2012, 7, (1), pp. 9097.
        . J. Multimed. , 1 , 90 - 97
    50. 50)
      • X. Pan , S. Lyu .
        50. Pan, X., Lyu, S.: ‘Region duplication detection using image feature matching’, IEEE Trans. Inf. Forensics Sec., 2010, 5, (4), pp. 857867.
        . IEEE Trans. Inf. Forensics Sec. , 4 , 857 - 867
    51. 51)
      • Y. Bin , S. Xingming , G. Honglei .
        51. Bin, Y., Xingming, S., Honglei, G., et al: ‘A copy-move forgery detection method based on CMFD-SIFT’, Multimed. Tools Appl., 2017, pp. 119.
        . Multimed. Tools Appl. , 1 - 19
    52. 52)
      • M. Zandi , A. Mahmoudi-Aznave , A. Talebpour .
        52. Zandi, M., Mahmoudi-Aznave, A., Talebpour, A.: ‘Iterative copy-move forgery detection based on a new interest point detector’, IEEE Trans. Inf. Forensics Sec., 2011, 11, (11), pp. 24992512.
        . IEEE Trans. Inf. Forensics Sec. , 11 , 2499 - 2512
    53. 53)
      • V. Christlein , C. Riess , J. Jordan .
        53. Christlein, V., Riess, C., Jordan, J., et al: ‘An evaluation of popular copy-move forgery detection approaches’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (6), pp. 18411854.
        . IEEE Trans. Inf. Forensics Sec. , 6 , 1841 - 1854
    54. 54)
      • F. Yang , J. Li , W. Lu .
        54. Yang, F., Li, J., Lu, W., et al: ‘Copy-move forgery detection based on hybrid features’, Eng. Appl. Artif. Intell., 2017, 59, pp. 7383.
        . Eng. Appl. Artif. Intell. , 73 - 83
    55. 55)
      • Z. Jiangbin , L. Yanan , R. Jinchang .
        55. Jiangbin, Z., Yanan, L., Jinchang, R., et al: ‘Fusion of block and keypoints based approaches for effective copy-move image forgery detection’, Multidimens. Syst. Signal Process., 2016, 27, (4), pp. 9891005.
        . Multidimens. Syst. Signal Process. , 4 , 989 - 1005
    56. 56)
      • X. Bo , W. Junwen , L. Guangjie .
        56. Bo, X., Junwen, W., Guangjie, L., et al: ‘Image copy-move forgery detection based on SURF’. Int. Conf. on Multimedia Information Networking and Security, 2010, pp. 889892.
        . Int. Conf. on Multimedia Information Networking and Security , 889 - 892
    57. 57)
      • S.D. Lin , T. Wu .
        57. Lin, S.D., Wu, T.: ‘An integrated technique for splicing and copy-move forgery image detection’. Int. Congress on Image and Signal Processing, 2011, vol. 2, pp. 10861096.
        . Int. Congress on Image and Signal Processing , 1086 - 1096
    58. 58)
      • G. Zhang , H. Wang .
        58. Zhang, G., Wang, H.: ‘SURF based detection of copy-move forgery in flat region’, Int. J. Adv. Comput. Technol., 2012, 4, (17), pp. 521529.
        . Int. J. Adv. Comput. Technol. , 17 , 521 - 529
    59. 59)
      • M.F. Hashmi , V. Anand , A.G. Keskar .
        59. Hashmi, M.F., Anand, V., Keskar, A.G.: ‘A copy-move image forgery detection based on speeded up robust feature transform and wavelet transforms’. Int. Conf. on Computer and Communication Technology (ICCCT), 2014, pp. 147152.
        . Int. Conf. on Computer and Communication Technology (ICCCT) , 147 - 152
    60. 60)
      • R.C. Pandey , S.K. Singh , K.K. Shukla .
        60. Pandey, R.C., Singh, S.K., Shukla, K.K., et al: ‘Fast and robust passive copy-move forgery detection using SURF and SIFT image features’. Int. Conf. on Industrial and Information Systems (ICIIS), 2014, pp. 16.
        . Int. Conf. on Industrial and Information Systems (ICIIS) , 1 - 6
    61. 61)
      • W. Xiang-Yang , L. Shuo , L. Yu-Nan .
        61. Xiang-Yang, W., Shuo, L., Yu-Nan, L., et al: ‘A new keypoint-based copy-move forgery detection for small smooth regions’, Multimed. Tools Appl., 2016, 76, pp. 130.
        . Multimed. Tools Appl. , 1 - 30
    62. 62)
      • J. Fridrich , D. Soukal , J. Lukas .
        62. Fridrich, J., Soukal, D., Lukas, J.: ‘Detection of copy-move forgery in digital images’. Proc. Digital Forensic Research Workshop, 2003.
        . Proc. Digital Forensic Research Workshop
    63. 63)
      • S.A. Fattah , M.M.I. Ullah , M. Ahmed .
        63. Fattah, S.A., Ullah, M.M.I., Ahmed, M., et al: ‘A scheme for copy-move forgery detection in digital images based on 2D-DWT’. Int. Midwest Symp. on Circuits and Systems (MWSCAS), 2014, pp. 801804.
        . Int. Midwest Symp. on Circuits and Systems (MWSCAS) , 801 - 804
    64. 64)
      • G. Li , Q. Wu , D. Tu .
        64. Li, G., Wu, Q., Tu, D., et al: ‘A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD’. IEEE Int. Conf. on Multimedia and Expo, 2007, pp. 17501753.
        . IEEE Int. Conf. on Multimedia and Expo , 1750 - 1753
    65. 65)
      • J. Zhao , J. Guo .
        65. Zhao, J., Guo, J.: ‘Passive forensics for copy-move image forgery using a method based on {DCT} and {SVD}’, Forensic Sci. Int., 2013, 233, (1–3), pp. 158166.
        . Forensic Sci. Int. , 158 - 166
    66. 66)
      • M. Bashar , K. Noda , N. Ohnishi .
        66. Bashar, M., Noda, K., Ohnishi, N., et al: ‘Exploring duplicated regions in natural images’, IEEE Trans. Image Process., 2016, 99, pp. 140.
        . IEEE Trans. Image Process. , 1 - 40
    67. 67)
      • X. Kang , S. Wei .
        67. Kang, X., Wei, S.: ‘Identifying tampered regions using singular value decomposition in digital image forensics’. Int. Conf. on Computer Science and Software Engineering, 2008, vol. 3, pp. 926930.
        . Int. Conf. on Computer Science and Software Engineering , 926 - 930
    68. 68)
      • R. Davarzani , K. Yaghmaie , Mozaffari .
        68. Davarzani, R., Yaghmaie, K., Mozaffari, , et al: ‘Copy-move forgery detection using multiresolution local binary patterns’, Forensic Sci. Int., 2013, 231, (1–3), pp. 6172.
        . Forensic Sci. Int. , 61 - 72
    69. 69)
      • N.T. Tsong , C.S. Fu .
        69. Tsong, N.T., Fu, C.S.: ‘A data set of authentic and spliced image blocks’. DVENT Technical Report, 203-2004-3, Columbia University, 2004.
        .
    70. 70)
      • D.M. Uliyan , H.A. Jalab , A.W.A. Wahab .
        70. Uliyan, D.M., Jalab, H.A., Wahab, A.W.A.: ‘Copy move image forgery detection using Hessian and center symmetric local binary pattern’. IEEE Conf. on Open Systems (ICOS), 2015, pp. 711.
        . IEEE Conf. on Open Systems (ICOS) , 7 - 11
    71. 71)
      • G. Muhammad , M.H. Al-Hammadi , M. Hussain .
        71. Muhammad, G., Al-Hammadi, M.H., Hussain, M., et al: ‘Copy move image forgery detection method using steerable pyramid transform and texture descriptor’. Eurocon 2013, vol. 2013, pp. 15861592.
        . Eurocon 2013 , 1586 - 1592
    72. 72)
      • 72. CASIA image tampering detection evaluation database’. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science. Available at http://forensics.idealtest.org.
        .
    73. 73)
      • M. Ghulam , G. Muhammad , M.H. Al-Hammadi .
        73. Ghulam, M., Muhammad, G., Al-Hammadi, M.H., et al: ‘Image forgery detection using steerable pyramid transform and local binary pattern’, Mach. Vis. Appl., 2014, 25, (4), pp. 985995.
        . Mach. Vis. Appl. , 4 , 985 - 995
    74. 74)
      • A. Amani , H. Muhammad , A. Hatim .
        74. Amani, A., Muhammad, H., Hatim, A., et al: ‘Passive detection of image forgery using DCT and local binary pattern’, Signal Image Video Process., 2017, 11, (1), pp. 8188.
        . Signal Image Video Process. , 1 , 81 - 88
    75. 75)
      • E. Ardizzone , A. Bruno , G. Mazzola .
        75. Ardizzone, E., Bruno, A., Mazzola, G.: ‘Copy-move forgery detection via texture description’. Proc. ACM Workshop on Multimedia in Forensics, Security and Intelligence, 2010, pp. 5964.
        . Proc. ACM Workshop on Multimedia in Forensics, Security and Intelligence , 59 - 64
    76. 76)
      • G. Lynch , F.Y. Shih , H.Y.M. Liao .
        76. Lynch, G., Shih, F.Y., Liao, H.Y.M.: ‘An efficient expanding block algorithm for image copy-move forgery detection’, Inf. Sci., 2013, 239, pp. 253265.
        . Inf. Sci. , 253 - 265
    77. 77)
      • L. Jen-Chun , C. Chien-Ping , C. Wei-Kuei .
        77. Jen-Chun, L., Chien-Ping, C., Wei-Kuei, C.: ‘Detection of copy-move image forgery using histogram of orientated gradients’, Inf. Sci., 2015, 321, (13), pp. 250262.
        . Inf. Sci. , 13 , 250 - 262
    78. 78)
      • M. Alhussein .
        78. Alhussein, M.: ‘Image tampering detection based on local texture descriptor and extreme learning machine’. 2016 UKSim-AMSS 18th Int. Conf. on Computer Modelling and Simulation (UKSim), 2016, pp. 196199.
        . 2016 UKSim-AMSS 18th Int. Conf. on Computer Modelling and Simulation (UKSim) , 196 - 199
    79. 79)
      • D.M. Uliyan , H.A. Jalab , A.W.A. Wahab .
        79. Uliyan, D.M., Jalab, H.A., Wahab, A.W.A., et al: ‘A novel forged blurred region detection system for image forensic applications’, Expert Syst. Appl., 2016, 64, pp. 110.
        . Expert Syst. Appl. , 1 - 10
    80. 80)
      • B. Mahdian , S. Saic .
        80. Mahdian, B., Saic, S.: ‘Detection of copy-move forgery using a method based on blur moment invariants’, Forensic Sci. Int., 2007, 171, (2–3), pp. 180189.
        . Forensic Sci. Int. , 180 - 189
    81. 81)
      • S.J. Ryu , M.J. Lee , H.K. Lee .
        81. Ryu, S.J., Lee, M.J., Lee, H.K.: ‘Detection of copy-rotate-move forgery using Zernike moments’. 12th Int. Conf. on Information Hiding (IH), 2010, pp. 5165.
        . 12th Int. Conf. on Information Hiding (IH) , 51 - 65
    82. 82)
      • Y. Li .
        82. Li, Y.: ‘Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching’, Forensic Sci. Int., 2013, 224, (1–3), pp. 5967.
        . Forensic Sci. Int. , 59 - 67
    83. 83)
      • W. Xiang-Yang , L. Yu-Nan , X. Huan .
        83. Xiang-Yang, W., Yu-Nan, L., Huan, X., et al: ‘Robust copy–move forgery detection using quaternion exponent moments’, Pattern Anal. Appl., 2016, pp. 117.
        . Pattern Anal. Appl. , 1 - 17
    84. 84)
      • Y. Wo , K. Yang , G. Han .
        84. Wo, Y., Yang, K., Han, G., et al: ‘Copy-move forgery detection based on multi-radius PCET’, IET Image Process., 2017, 11, (2), pp. 99108.
        . IET Image Process. , 2 , 99 - 108
    85. 85)
      • Y.D. Shin .
        85. Shin, Y.D.: ‘Fast detection of copy-move forgery image using two step search algorithm’, Int. J. Sec. Appl., 2016, 10, (5), pp. 203214.
        . Int. J. Sec. Appl. , 5 , 203 - 214
    86. 86)
      • A.D. Warbhe , R.V. Dharaskar , V.M. Thakare .
        86. Warbhe, A.D., Dharaskar, R.V., Thakare, V.M.: ‘A scaling robust copy-paste tampering detection for digital image forensics’, Procedia Comput. Sci., 2016, 79, pp. 458465.
        . Procedia Comput. Sci. , 458 - 465
    87. 87)
      • J. Li , X. Li , B. Yang .
        87. Li, J., Li, X., Yang, B., et al: ‘Segmentation-based image copy-move forgery detection scheme’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (3), pp. 507518.
        . IEEE Trans. Inf. Forensics Sec. , 3 , 507 - 518
    88. 88)
      • R. Sekhar , R.S. Shaji .
        88. Sekhar, R., Shaji, R.S.: ‘A study on segmentation-based copy-move forgery detection using DAISY descriptor’. Proc. Int. Conf. on Soft Computing Systems, 2016, pp. 223233.
        . Proc. Int. Conf. on Soft Computing Systems , 223 - 233
    89. 89)
      • D. Cozzolino , G. Poggi , L. Verdoliva .
        89. Cozzolino, D., Poggi, G., Verdoliva, L.: ‘Efficient dense-field copy-move forgery detection’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (11), pp. 22842297.
        . IEEE Trans. Inf. Forensics Sec. , 11 , 2284 - 2297
    90. 90)
      • D. Tralic , I. Zupancic , S. Grgic .
        90. Tralic, D., Zupancic, I., Grgic, S., et al: ‘CoMoFoD – new database for copy-move forgery detection’. Proc. Int. Symp. ELMAR, 2013, pp. 4954.
        . Proc. Int. Symp. ELMAR , 49 - 54
    91. 91)
      • B. Wen , Y. Zhu , R. Subramanian .
        91. Wen, B., Zhu, Y., Subramanian, R., et al: ‘COVERAGE-A novel database for copy-move forgery detection’. 2016 IEEE Int. Conf. on Image Processing (ICIP), 2016, pp. 161165.
        . 2016 IEEE Int. Conf. on Image Processing (ICIP) , 161 - 165
    92. 92)
      • A.C. Popescu , H. Farid .
        92. Popescu, A.C., Farid, H.: ‘Exposing digital forgeries by detecting traces of resampling’, IEEE Trans. Signal Process., 2005, 53, (2), pp. 758767.
        . IEEE Trans. Signal Process. , 2 , 758 - 767
    93. 93)
      • S. Bravo-Solorio , A.K. Nandi .
        93. Bravo-Solorio, S., Nandi, A.K.: ‘Exposing duplicated regions affected by reflection, rotation and scaling’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 18801883.
        . IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP) , 1880 - 1883
    94. 94)
      • C. Neamtu , C. Barca , E. Achimescu .
        94. Neamtu, C., Barca, C., Achimescu, E., et al: ‘Exposing copy-move image tampering using forensic method based on SURF’. Proc. Int. Conf. on Electronics, Computers and Artificial Intelligence – ECAI, 2013, pp. 14.
        . Proc. Int. Conf. on Electronics, Computers and Artificial Intelligence – ECAI , 1 - 4
    95. 95)
      • E. Silva , T. Carvalho , A. Ferreira .
        95. Silva, E., Carvalho, T., Ferreira, A., et al: ‘Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes’, J. Vis. Commun. Image Represent., 2015, 29, pp. 1632.
        . J. Vis. Commun. Image Represent. , 16 - 32
    96. 96)
      • P. Chun-Su , K. Changjae , L. Jihoon .
        96. Chun-Su, P., Changjae, K., Jihoon, L., et al: ‘Rotation and scale invariant upsampled log-polar Fourier descriptor for copy-move forgery detection’, Multimedia Tools Appl., 2016, 75, (23), pp. 1657716595.
        . Multimedia Tools Appl. , 23 , 16577 - 16595
    97. 97)
      • H. Deng-Yuan , H. Ching-Ning , H. Wu-Chih .
        97. Deng-Yuan, H., Ching-Ning, H., Wu-Chih, H., et al: ‘Robustness of copy-move forgery detection under high JPEG compression artifacts’, Multimedia Tools Appl., 2017, 76, (1), pp. 15091530.
        . Multimedia Tools Appl. , 1 , 1509 - 1530
    98. 98)
      • R.C. Pandey , R. Agrawal , S.K. Singh .
        98. Pandey, R.C., Agrawal, R., Singh, S.K., et al: ‘Passive copy move forgery detection using SURF, HOG and SIFT features’. Proc. 3rd Int. Conf. on Frontiers of Intelligent Computing: Theory and Applications (FICTA), 2015, pp. 659666.
        . Proc. 3rd Int. Conf. on Frontiers of Intelligent Computing: Theory and Applications (FICTA) , 659 - 666
    99. 99)
      • G. Ulutas , G. Muzaffer .
        99. Ulutas, G., Muzaffer, G.: ‘A new copy move forgery detection method resistant to object removal with uniform background forgery’, Math. Probl. Eng., 2016, 2016, pp. 119.
        . Math. Probl. Eng. , 1 - 19
    100. 100)
      • S. Ketenci , G. Ulutas .
        100. Ketenci, S., Ulutas, G.: ‘Copy-move forgery detection in images via 2D-Fourier transform’. Int. Conf. on Telecommunications and Signal Processing (TSP), 2013, pp. 813816.
        . Int. Conf. on Telecommunications and Signal Processing (TSP) , 813 - 816
    101. 101)
      • S. Wenchang , Z. Fei , Q. Bo .
        101. Wenchang, S., Fei, Z., Bo, Q., et al: ‘Improving image copy-move forgery detection with particle swarm optimization techniques’, China Commun., 2016, 13, (1), pp. 139149.
        . China Commun. , 1 , 139 - 149
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2017.0441
Loading

Related content

content/journals/10.1049/iet-ipr.2017.0441
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address