Copy-Move Forgery Detection Based on Euclidean Distance and Texture Feature Analysis

https://doi.org/10.51682/jiscom.v3i1.28

Authors

  • Ashutosh Kumar Department of Computer Science & Engineering, JECRC University, Jaipur, India
  • Neha Janu Department of Computer Science and Engineering, Swami Keshvanand Institute of Technology, Management & Gramothan, Jaipur, Rajasthan, India

Keywords:

GLCM, PCA, Haar, Euclidean Distance

Abstract

Digital images are important part of our life. Copy and Move forgery detection techniques are designed to detect edited part of the image. The copy and move forgery techniques are based on the feature detection and matching. The techniques which are designed so far use the Euclidean distance concept for feature matching. The feature detection techniques which are much popular like Haar transformation are used for feature extraction. In this research, the PCA algorithm is used for the simplification of features which are extracted with Haar transformation. The GLCM algorithm is used for texture feature analysis of input image. In the end, Euclidean distance is used for feature matching and mismatched features are marked as forgery. The proposed approach is implemented in MALTAB and results are analyzed in terms of accuracy.

References

L. Kang, and X.-P. Cheng, “Copy-move forgery detection in digital image,” in 3rd International Congress on Image and Signal Processing (CISP 2010), IEEE Computer Society, 2010, pp. 241921.

Z. Lin et al., “Fast, automatic and fine-grained tampered JPEG image detection via DCTcoefficient analysis”, Pattern Recogn., Vol. 42, pp. 2492250, 2009.

Bayram S., Avcibas I., Sankur, and B. Memon N., “Image manipulation detection,” Journal of Electronic Imaging – October - December 2006 – Volume 15, Issue 4, 041102 (17 pages), vol. 15(4), 2006.

A.C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Transactions on Signal Processing, vol. 53(2), pp. 758–767, 2005.

M.K. Johnson and H. Farid, “Exposing digital forgeries by detecting inconsistencies in lighting,” Proc. ACM Multimedia and Security Workshop, New York, pp. 1–9, 2005.

M.Wu A. Swaminathan and K. J. Ray Liu, “Image tampering identification using blind deconvolution,” Proc. IEEE ICIP, 2006.

Sencar H. T. Memon N. Sutcu Y., Coskun B., “Tamper detection based on regularity of wavelet transform coefficients,” Proc. ICIP, International Conference on Image Processing, 2007.

J. Fridrich, D. Soukal, and J. Luk, “Detection of copymove forgery in digital images,” Proc. Digital Forensic Research Workshop, Cleveland, OH, August 2003.

A.C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.

M. Turk and A. Pentland, “Eigenfaces for recognition,” Journal of Cognitive Neuroscience, vol. 3, no. 1, 1991.

Qiong Tu Dan Sun Shaojie Li, Guohui Wu, “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd,” ICME, 2007.

Weiqi Luo, Jiwu Huang, and Guoping Qiu, “Robust detection of region-duplication forgery in digital image,” in ICPR ’06: Proceedings of the 18th International Conference on Pattern Recognition, Washington, DC, USA, 2006, pp. 746–749, IEEE Computer Society.

Sevinc Bayram, Taha Sencar, and Nasir Memon, “An efficient and robust method for detecting copy-move forgery,” submitted to ICASSP 2009, 2009.

J. A. Bloom I. J. Cox M. L. Miller C. Y. Lin, M.Wu and Y. M. Lui, “Rotation, scale,and translation resilient watermarking for images,” IEEE Trans. Image Processing, vol. 10, pp. 767–782, 2001

Geetika Gupta, Akshay Girdhar, “A ROBUST PASSIVE METHOD FOR DETECTION OF COPY-MOVE FORGERY IN IMAGES”, 2017, IEEE

Yong Yew Yeap, U. U. Sheikh, Ab Al-Hadi Ab Rahman, “Image Forensic for Digital Image Copy Move Forgery Detection”, 2018 IEEE 14th International Colloquium on Signal Processing & its Applications (CSPA 2018)

Dhanya R1, R Kalai Selvi, “A State of the Art Review on Copy Move Forgery Detection Techniques”, Proceedings of 2017 IEEE International Conference on Circuits and Systems (ICCS 2017)

Yue Wu, Wael Abd-Almageed, and Prem Natarajan, “Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network”, 2018 IEEE Winter Conference on Applications of Computer Vision

Hanieh Shabanian, Farshad Mashhadi, “A New Approach for Detecting Copy-Move Forgery in Digital Images”, 2017, IEEE

Rahul Dixit, Ruchira Naskar and Aditi Sahoo, “Copy–Move Forgery Detection Exploiting Statistical Image Features”, IEEE WiSPNET 2017

Neha Janu, Pratistha Mathur, “Performance Analysis of Feature Extraction Techniques for Facial Expression Recognition”, International journal on Computer Applications, ISSN No. 0975 –8887, Volume-166, Issue-1, May 2017.

Janu Neha, Pratistha Mathur, “Performance analysis of frequency domain based feature extraction techniques for facial expression recognition.” In 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence, 2017, pp. 591-594. IEEE, 2017.

Published

31-12-2022

How to Cite

Kumar, A., & Janu, N. (2022). Copy-Move Forgery Detection Based on Euclidean Distance and Texture Feature Analysis. JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING, 3(1), 25–32. https://doi.org/10.51682/jiscom.v3i1.28

Issue

Section

Articles

ARK