access icon free CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection

With the advancement of image editing tools in today's world, the manipulation of images like cropping, cloning, resizing, etc., becomes an easy proposition and on the other end, checking or determining whether an image has been manipulated or not, becomes a great challenge. Copy-move forgery in images is the most popular tampering method in which a portion of an image is copied and pasted in some other location of the same image. The detection of copy-move forgery has become a prominent research area. This study presents a detailed review and critical discussions with pros and cons of each of copy-move forgery detection techniques from 2007 to 2017. This study also addresses the variation in databases, issues, challenges, future directions and references in this domain.

Inspec keywords: image forensics

Other keywords: image cloning; image cropping; block based technique; image copy-move forgery detection technique; tampering method; key feature based technique; image resizing; image editing tool; CMFD; image manipulation

Subjects: Optical, image and video signal processing; Computer vision and image processing techniques

References

    1. 1)
      • 63. Fattah, S.A., Ullah, M.M.I., Ahmed, M., et al: ‘A scheme for copy-move forgery detection in digital images based on 2D-DWT’. Int. Midwest Symp. on Circuits and Systems (MWSCAS), 2014, pp. 801804.
    2. 2)
      • 36. Warbhe, A.D., Dharaskar, R.V., Thakare, V.M.: ‘A survey on keypoint based copy-paste forgery detection techniques’, Procedia Comput. Sci., 2016, 78, pp. 6167.
    3. 3)
      • 73. Ghulam, M., Muhammad, G., Al-Hammadi, M.H., et al: ‘Image forgery detection using steerable pyramid transform and local binary pattern’, Mach. Vis. Appl., 2014, 25, (4), pp. 985995.
    4. 4)
      • 40. Bay, H., Ess, A., Tuytelaars, T., et al: ‘Speeded-up robust features (SURF)’, Comput. Vis. Image Underst., 2008, 110, (3), pp. 346359.
    5. 5)
      • 42. Hashmi, M.F., Hambarde, A.R., Keskar, A.G.: ‘Copy move forgery detection using DWT and SIFT features’. Int. Conf. on Intelligent Systems Design and Applications, 2013, pp. 188193.
    6. 6)
      • 5. Ghorbani, M., Firouzmand, M., Faraahi, A.: ‘DWT-DCT (QCD) based copy-move image forgery detection’. Int. Conf. on Systems, Signals and Image Processing, 2011, pp. 14.
    7. 7)
      • 82. Li, Y.: ‘Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching’, Forensic Sci. Int., 2013, 224, (1–3), pp. 5967.
    8. 8)
      • 17. Huang, H., Guo, W., Zhang, Y.: ‘Detection of copy-move forgery in digital images using SIFT algorithm’. IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, vol. 2, pp. 272276.
    9. 9)
      • 101. Wenchang, S., Fei, Z., Bo, Q., et al: ‘Improving image copy-move forgery detection with particle swarm optimization techniques’, China Commun., 2016, 13, (1), pp. 139149.
    10. 10)
      • 9. Lin, H.J., Wang, C.W., Kao, Y.T.: ‘Fast copy-move forgery detection’, WSEAS Trans. Signal Proc., 2009, 5, (5), pp. 188197.
    11. 11)
      • 29. Christlein, V., Riess, C., Angelopoulou, E.: ‘A study on features for the detection of copy-move forgeries’. Proc. Information Security Solutions Europe, 2010, pp. 105116.
    12. 12)
      • 68. Davarzani, R., Yaghmaie, K., Mozaffari, , et al: ‘Copy-move forgery detection using multiresolution local binary patterns’, Forensic Sci. Int., 2013, 231, (1–3), pp. 6172.
    13. 13)
      • 38. Kotsiantis, S.B.: ‘Supervised machine learning: a review of classification techniques’. Proc. Conf. on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, 2007, pp. 324.
    14. 14)
      • 34. Ansari, M.D., Ghrera, S.P., Tyagi, V.: ‘Pixel-based image forgery detection: a review’, IETE J. Educ., 2014, 55, (1), pp. 4046.
    15. 15)
      • 99. Ulutas, G., Muzaffer, G.: ‘A new copy move forgery detection method resistant to object removal with uniform background forgery’, Math. Probl. Eng., 2016, 2016, pp. 119.
    16. 16)
      • 79. Uliyan, D.M., Jalab, H.A., Wahab, A.W.A., et al: ‘A novel forged blurred region detection system for image forensic applications’, Expert Syst. Appl., 2016, 64, pp. 110.
    17. 17)
      • 72. CASIA image tampering detection evaluation database’. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science. Available at http://forensics.idealtest.org.
    18. 18)
      • 12. Li, W., Yu, N.: ‘Rotation robust detection of copy-move forgery’. IEEE Int. Conf. on Image Processing, 2010, pp. 21132116.
    19. 19)
      • 44. Sudhakar, K., Sandeep, V.M., Kulkarni, S.: ‘Speeding-up SIFT based copy move forgery detection using level set approach’. Int. Conf. on Advances in Electronics Computers and Communications, 2014, pp. 16.
    20. 20)
      • 65. Zhao, J., Guo, J.: ‘Passive forensics for copy-move image forgery using a method based on {DCT} and {SVD}’, Forensic Sci. Int., 2013, 233, (1–3), pp. 158166.
    21. 21)
      • 74. Amani, A., Muhammad, H., Hatim, A., et al: ‘Passive detection of image forgery using DCT and local binary pattern’, Signal Image Video Process., 2017, 11, (1), pp. 8188.
    22. 22)
      • 51. Bin, Y., Xingming, S., Honglei, G., et al: ‘A copy-move forgery detection method based on CMFD-SIFT’, Multimed. Tools Appl., 2017, pp. 119.
    23. 23)
      • 53. Christlein, V., Riess, C., Jordan, J., et al: ‘An evaluation of popular copy-move forgery detection approaches’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (6), pp. 18411854.
    24. 24)
      • 52. Zandi, M., Mahmoudi-Aznave, A., Talebpour, A.: ‘Iterative copy-move forgery detection based on a new interest point detector’, IEEE Trans. Inf. Forensics Sec., 2011, 11, (11), pp. 24992512.
    25. 25)
      • 50. Pan, X., Lyu, S.: ‘Region duplication detection using image feature matching’, IEEE Trans. Inf. Forensics Sec., 2010, 5, (4), pp. 857867.
    26. 26)
      • 28. Amerini, I., Ballan, L., Caldelli, R., et al: ‘Copy-move forgery detection and localization by means of robust clustering with J-Linkage’, Signal Process., Image Commun., 2013, 28, (6), pp. 659669.
    27. 27)
      • 75. Ardizzone, E., Bruno, A., Mazzola, G.: ‘Copy-move forgery detection via texture description’. Proc. ACM Workshop on Multimedia in Forensics, Security and Intelligence, 2010, pp. 5964.
    28. 28)
      • 13. Muhammad, G., Hussain, M., Bebis, G.: ‘Passive copy move image forgery detection using undecimated dyadic wavelet transform’, Digit. Invest., 2012, 9, (1), pp. 4957.
    29. 29)
      • 86. Warbhe, A.D., Dharaskar, R.V., Thakare, V.M.: ‘A scaling robust copy-paste tampering detection for digital image forensics’, Procedia Comput. Sci., 2016, 79, pp. 458465.
    30. 30)
      • 35. Diane, W.N.N., Xingming, S., Moise, F.K.: ‘A survey of partition-based techniques for copy-move forgery detection’, Sci. World J., 2014, 55, (1), pp. 113.
    31. 31)
      • 71. Muhammad, G., Al-Hammadi, M.H., Hussain, M., et al: ‘Copy move image forgery detection method using steerable pyramid transform and texture descriptor’. Eurocon 2013, vol. 2013, pp. 15861592.
    32. 32)
      • 60. Pandey, R.C., Singh, S.K., Shukla, K.K., et al: ‘Fast and robust passive copy-move forgery detection using SURF and SIFT image features’. Int. Conf. on Industrial and Information Systems (ICIIS), 2014, pp. 16.
    33. 33)
      • 100. Ketenci, S., Ulutas, G.: ‘Copy-move forgery detection in images via 2D-Fourier transform’. Int. Conf. on Telecommunications and Signal Processing (TSP), 2013, pp. 813816.
    34. 34)
      • 96. Chun-Su, P., Changjae, K., Jihoon, L., et al: ‘Rotation and scale invariant upsampled log-polar Fourier descriptor for copy-move forgery detection’, Multimedia Tools Appl., 2016, 75, (23), pp. 1657716595.
    35. 35)
      • 77. Jen-Chun, L., Chien-Ping, C., Wei-Kuei, C.: ‘Detection of copy-move image forgery using histogram of orientated gradients’, Inf. Sci., 2015, 321, (13), pp. 250262.
    36. 36)
      • 16. Qiao, M., Sung, A., Liu, Q., et al: ‘A novel approach for detection of copy-move forgery’. Proc. Int. Conf. on Advanced Engineering Computing and Applied Science, 2011, pp. 4447.
    37. 37)
      • 78. Alhussein, M.: ‘Image tampering detection based on local texture descriptor and extreme learning machine’. 2016 UKSim-AMSS 18th Int. Conf. on Computer Modelling and Simulation (UKSim), 2016, pp. 196199.
    38. 38)
      • 90. Tralic, D., Zupancic, I., Grgic, S., et al: ‘CoMoFoD – new database for copy-move forgery detection’. Proc. Int. Symp. ELMAR, 2013, pp. 4954.
    39. 39)
      • 10. Bayram, S., Sencar, H.T., Memon, N.: ‘An efficient and robust method for detecting copy-move forgery’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, 2009, pp. 10531056.
    40. 40)
      • 30. Sridevi, M., Mala, C., Siddhant, S.: ‘Comparative study of image forgery and copy-move techniques’, inAdvances in Computer Science, Engineering & Applications: Proceedings of the Second International Conference on Computer Science, Engineering and Applications (ICCSEA), 2012, pp. 715723.
    41. 41)
      • 92. Popescu, A.C., Farid, H.: ‘Exposing digital forgeries by detecting traces of resampling’, IEEE Trans. Signal Process., 2005, 53, (2), pp. 758767.
    42. 42)
      • 55. Jiangbin, Z., Yanan, L., Jinchang, R., et al: ‘Fusion of block and keypoints based approaches for effective copy-move image forgery detection’, Multidimens. Syst. Signal Process., 2016, 27, (4), pp. 9891005.
    43. 43)
      • 41. Su, B., Kaizhen, Z.: ‘Detection of copy forgery in digital images based on LPP-SIFT’. Int. Conf. on Industrial Control and Electronics Engineering, 2012, pp. 17731776.
    44. 44)
      • 57. Lin, S.D., Wu, T.: ‘An integrated technique for splicing and copy-move forgery image detection’. Int. Congress on Image and Signal Processing, 2011, vol. 2, pp. 10861096.
    45. 45)
      • 56. Bo, X., Junwen, W., Guangjie, L., et al: ‘Image copy-move forgery detection based on SURF’. Int. Conf. on Multimedia Information Networking and Security, 2010, pp. 889892.
    46. 46)
      • 24. Amerini, I., Ballan, L., Caldelli, R., et al: ‘A SIFT-based forensic method for copy-move attack detection and transformation recovery’, IEEE Trans. Inf. Forensics Sec., 2011, 6, (3), pp. 10991110.
    47. 47)
      • 64. Li, G., Wu, Q., Tu, D., et al: ‘A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD’. IEEE Int. Conf. on Multimedia and Expo, 2007, pp. 17501753.
    48. 48)
      • 25. Mohamadian, Z., Pouyan, A.A.: ‘Detection of duplication forgery in digital images in uniform and non-uniform regions’. Int. Conf. on Computer Modelling and Simulation, 2013, pp. 455460.
    49. 49)
      • 31. Tian, D.P.: ‘A review on image feature extraction and representation techniques’, Int. J. Multimed. Ubiquitous Eng., 2013, 8, pp. 385395.
    50. 50)
      • 95. Silva, E., Carvalho, T., Ferreira, A., et al: ‘Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes’, J. Vis. Commun. Image Represent., 2015, 29, pp. 1632.
    51. 51)
      • 27. Ardizzone, E., Bruno, A., Mazzola, G.: ‘Detecting multiple copies in tampered images’. IEEE Int. Conf. on Image Processing, 2010, pp. 21172120.
    52. 52)
      • 21. Kunlun, L., Hexin, L., Bo, Y., et al: ‘Detection of image forgery based on improved PCA-SIFT’. Int. Conf. on Computer Engineering and Network, 2014, pp. 679686.
    53. 53)
      • 67. Kang, X., Wei, S.: ‘Identifying tampered regions using singular value decomposition in digital image forensics’. Int. Conf. on Computer Science and Software Engineering, 2008, vol. 3, pp. 926930.
    54. 54)
      • 4. Li, L., Li, S., Wang, J.: ‘Copy-move forgery detection based on PHT’. World Congress on Information and Communication Technologies, 2012, pp. 10611065.
    55. 55)
      • 37. Warif, N.B.A., Wahab, A.W.A., Idris, M.Y.I., et al: ‘Copy-move forgery detection: survey, challenges and future directions’, J. Netw. Comput. Appl., 2016, 75, pp. 259278.
    56. 56)
      • 54. Yang, F., Li, J., Lu, W., et al: ‘Copy-move forgery detection based on hybrid features’, Eng. Appl. Artif. Intell., 2017, 59, pp. 7383.
    57. 57)
      • 94. Neamtu, C., Barca, C., Achimescu, E., et al: ‘Exposing copy-move image tampering using forensic method based on SURF’. Proc. Int. Conf. on Electronics, Computers and Artificial Intelligence – ECAI, 2013, pp. 14.
    58. 58)
      • 22. Liu, L., Ni, R., Zhao, Y., et al: ‘Improved SIFT-based copy-move detection using BFSN clustering and CFA features’. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 2014, pp. 626629.
    59. 59)
      • 15. Muhammad, G., Hussain, M., Khawaji, K., et al: ‘Blind copy move image forgery detection using dyadic undecimated wavelet transform’. Int. Conf. on Digital Signal Processing (DSP), 2011, pp. 16.
    60. 60)
      • 84. Wo, Y., Yang, K., Han, G., et al: ‘Copy-move forgery detection based on multi-radius PCET’, IET Image Process., 2017, 11, (2), pp. 99108.
    61. 61)
      • 69. Tsong, N.T., Fu, C.S.: ‘A data set of authentic and spliced image blocks’. DVENT Technical Report, 203-2004-3, Columbia University, 2004.
    62. 62)
      • 98. Pandey, R.C., Agrawal, R., Singh, S.K., et al: ‘Passive copy move forgery detection using SURF, HOG and SIFT features’. Proc. 3rd Int. Conf. on Frontiers of Intelligent Computing: Theory and Applications (FICTA), 2015, pp. 659666.
    63. 63)
      • 89. Cozzolino, D., Poggi, G., Verdoliva, L.: ‘Efficient dense-field copy-move forgery detection’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (11), pp. 22842297.
    64. 64)
      • 43. Vijay, A., Farukh, H.M., Avinash, K.G.: ‘A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods’. Intelligent Information and Database Systems: 6th Asian Conf., ACIIDS 2014, Bangkok, Thailand, 7–9 April 2014, Proc., Part I, 2014, pp. 530542.
    65. 65)
      • 45. Chihaoui, T., Bourouis, S., Hamrouni, K.: ‘Copy-move image forgery detection based on SIFT descriptors and SVD-matching’. Int. Conf. on Advanced Technologies for Signal and Image Processing (ATSIP), 2014, pp. 125129.
    66. 66)
      • 14. Hsu, H.C., Wang, M.S.: ‘Detection of copy-move forgery image using gabor descriptor’. Anti-counterfeiting, Security, and Identification, 2012, pp. 14.
    67. 67)
      • 59. Hashmi, M.F., Anand, V., Keskar, A.G.: ‘A copy-move image forgery detection based on speeded up robust feature transform and wavelet transforms’. Int. Conf. on Computer and Communication Technology (ICCCT), 2014, pp. 147152.
    68. 68)
      • 81. Ryu, S.J., Lee, M.J., Lee, H.K.: ‘Detection of copy-rotate-move forgery using Zernike moments’. 12th Int. Conf. on Information Hiding (IH), 2010, pp. 5165.
    69. 69)
      • 61. Xiang-Yang, W., Shuo, L., Yu-Nan, L., et al: ‘A new keypoint-based copy-move forgery detection for small smooth regions’, Multimed. Tools Appl., 2016, 76, pp. 130.
    70. 70)
      • 88. Sekhar, R., Shaji, R.S.: ‘A study on segmentation-based copy-move forgery detection using DAISY descriptor’. Proc. Int. Conf. on Soft Computing Systems, 2016, pp. 223233.
    71. 71)
      • 2. Huang, Y., Lu, W., Sun, W., et al: ‘Improved DCT-based detection of copy-move forgery in images’, Forensic Sci. Int., 2011, 206, (1–3), pp. 178184.
    72. 72)
      • 85. Shin, Y.D.: ‘Fast detection of copy-move forgery image using two step search algorithm’, Int. J. Sec. Appl., 2016, 10, (5), pp. 203214.
    73. 73)
      • 83. Xiang-Yang, W., Yu-Nan, L., Huan, X., et al: ‘Robust copy–move forgery detection using quaternion exponent moments’, Pattern Anal. Appl., 2016, pp. 117.
    74. 74)
      • 87. Li, J., Li, X., Yang, B., et al: ‘Segmentation-based image copy-move forgery detection scheme’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (3), pp. 507518.
    75. 75)
      • 19. Mishra, P., Mishra, N., Sharma, S., et al: ‘Region duplication forgery detection technique based on SURF and HAC’, Int. J. Adv. Comput. Technol., 2013, 6, (17), pp. 18.
    76. 76)
      • 91. Wen, B., Zhu, Y., Subramanian, R., et al: ‘COVERAGE-A novel database for copy-move forgery detection’. 2016 IEEE Int. Conf. on Image Processing (ICIP), 2016, pp. 161165.
    77. 77)
      • 33. Birajdar, G.K., Mankar, V.H.: ‘Digital image forgery detection using passive techniques: a survey’, Digit. Invest., 2013, 10, (3), pp. 226245.
    78. 78)
      • 6. Ardizzone, E., Mazzola, G.: ‘Detection of duplicated regions in tampered digital images by bit-plane analysis’. 15th Int. Conf. on Image Analysis and Processing (ICIAP 2009), Vietri sul Mare, Italy, 2009, pp. 893901.
    79. 79)
      • 3. Yang, B., Sun, X., Chen, X., et al: ‘An efficient forensic method for copy-move forgery detection based on DWT-FWHT’, Radioengineering, 2013, 22, (4), pp. 10981105.
    80. 80)
      • 26. Qian, J., Dong, Y.: ‘A clustering algorithm based on broad first searching neighbors’, J. Southeast Univ., Nat. Sci. Ed., 2004, 34, (1), pp. 109112.
    81. 81)
      • 48. Magri, L., Fusiello, A.: ‘T-linkage: a continuous relaxation of J-linkage for multi-model fitting’. IEEE Conf. on Computer Vision and Pattern Recognition, 2014, pp. 39543961.
    82. 82)
      • 23. Hashmi, M.F., Anand, V., Keskar, A.G.: ‘Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform’, AASRI Procedia, 2014, 9, pp. 8491.
    83. 83)
      • 7. Shivakumar, B.L., Baboo, S.S.: ‘Detection of region duplication forgery in digital images using SURF’, Int. J. Comput. Sci. Issues, 2011, 8, (4), pp. 199205.
    84. 84)
      • 49. Jing, L., Shao, C.: ‘Image copy-move forgery detecting based on local invariant feature’, J. Multimed., 2012, 7, (1), pp. 9097.
    85. 85)
      • 18. Jaberi, M., Bebis, G., Hussain, M., et al: ‘Improving the detection and localization of duplicated regions in copy-move image forgery’. Int. Conf. on Digital Signal Processing (DSP), 2013, pp. 16.
    86. 86)
      • 58. Zhang, G., Wang, H.: ‘SURF based detection of copy-move forgery in flat region’, Int. J. Adv. Comput. Technol., 2012, 4, (17), pp. 521529.
    87. 87)
      • 62. Fridrich, J., Soukal, D., Lukas, J.: ‘Detection of copy-move forgery in digital images’. Proc. Digital Forensic Research Workshop, 2003.
    88. 88)
      • 66. Bashar, M., Noda, K., Ohnishi, N., et al: ‘Exploring duplicated regions in natural images’, IEEE Trans. Image Process., 2016, 99, pp. 140.
    89. 89)
      • 93. Bravo-Solorio, S., Nandi, A.K.: ‘Exposing duplicated regions affected by reflection, rotation and scaling’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 18801883.
    90. 90)
      • 32. Qazi, T., Hayat, K., Khan, S.U., et al: ‘Survey on blind image forgery detection’, IET Image Process., 2013, 7, (7), pp. 660670.
    91. 91)
      • 46. Zhang, J., Ruan, Q., Jin, Y.: ‘Combined SIFT and bi-coherence features to detect image forgery’. Int. Conf. on Signal Processing, 2014, pp. 18591863.
    92. 92)
      • 80. Mahdian, B., Saic, S.: ‘Detection of copy-move forgery using a method based on blur moment invariants’, Forensic Sci. Int., 2007, 171, (2–3), pp. 180189.
    93. 93)
      • 11. Li, L., Li, S., Zhu, H., et al: ‘An efficient scheme for detecting copy-move forged images by local binary patterns’, IEEE Trans. Image Process., 2016, 4, (1), pp. 4656.
    94. 94)
      • 1. Zhang, T., Wang, R.D.: ‘Copy-move forgery detection based on SVD in digital image’. Int. Congress on Image and Signal Processing, 2009, pp. 15.
    95. 95)
      • 70. Uliyan, D.M., Jalab, H.A., Wahab, A.W.A.: ‘Copy move image forgery detection using Hessian and center symmetric local binary pattern’. IEEE Conf. on Open Systems (ICOS), 2015, pp. 711.
    96. 96)
      • 39. Lowe, D.G.: ‘Distinctive image features from scale-invariant keypoints’, Int. J. Comput. Vis., 2004, 60, (2), pp. 91110.
    97. 97)
      • 47. Fan, Y., Zhu, Y.S., Liu, Z.: ‘An improved SIFT-based copy-move forgery detection method using T-linkage and multi-scale analysis’, J. Inf. Hiding Multimed. Signal Process., 2016, 7, (2), pp. 10991110.
    98. 98)
      • 76. Lynch, G., Shih, F.Y., Liao, H.Y.M.: ‘An efficient expanding block algorithm for image copy-move forgery detection’, Inf. Sci., 2013, 239, pp. 253265.
    99. 99)
      • 97. Deng-Yuan, H., Ching-Ning, H., Wu-Chih, H., et al: ‘Robustness of copy-move forgery detection under high JPEG compression artifacts’, Multimedia Tools Appl., 2017, 76, (1), pp. 15091530.
    100. 100)
      • 8. Singh, J., Balasubramanian, R.: ‘A high performance copy-move image forgery detection scheme on GPU’. Proc. Int. Conf. on Soft Computing for Problem Solving, 2012, pp. 239246.
    101. 101)
      • 20. Chen, L., Lu, W., Ni, J., et al: ‘Region duplication detection based on Harris corner points and step sector statistics’, J. Vis. Commun. Image Represent., 2013, 24, (3), pp. 244254.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2017.0441
Loading

Related content

content/journals/10.1049/iet-ipr.2017.0441
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading