Digital Image Forgery and Techniques of Forgery Detection

Authors

  • Ishrath Nousheen  Assistant Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • Anugu Lahari Reddy  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • Poniganti Nikitha  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India

Keywords:

Copy-move forgery detection; Adaptive over-segmentation; Feature point matching and extraction; Cut-paste forgery detection.

Abstract

Image forgery means manipulation of digital image to conceal meaningful information of the image. The detection of forged image is driven by the need of authenticity and to maintain integrity of the image. A copy–move forgery detection theme victimization adaptive over segmentation and have purpose feature matching is proposed. The proposed scheme integrates both block-based and key point-based forgery detection methods. The proposed adaptive over-segmentation algorithm segments the host image into non-overlapping and irregular blocks adaptively. Then, the feature points are extracted from each block as block features, and the block features are matched with one another to locate the labeled feature points; this procedure can approximately indicate the suspected forgery regions. To detect the forgery regions more accurately, we propose the forgery region extraction algorithm which replaces the features point with small super pixels as feature blocks and them merges the neighboring blocks that have similar local color features into the feature block to generate the merged regions. Finally, it applies the morphological operation to merged regions to generate the detected forgery regions. In cut-paste image forgery detection, proposed digital image forensic techniques capable of detecting global and local contrast enhancement, identifying the use of histogram equalization.

References

  1. Soumen Chakrabarti, Martin van den Berg 2, Byron Domc, ”Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching”, IEEE Transactions On Information Forensics And Security, Vol. 10, No. 8, August 2015.
  2. Aditya R Hambarde, Avinash G Keskar,”Copy-move Forgery Detection Using DWT and SIFT Features”, proceeding Department of Electronics Engineering Visvesvaraya National Institute of Technology, Nagpur, India 78699.
  3. Mr.Arun Anup M,”Image forgery And Its Detection: A survey (2015)”, Department of computer engg and science, MES college of Engineering.
  4. Salam A.Thajeel, Ghazali Sulong,”A Survey Of CopyMove Forgery Detection Techniques”, Journal of Theoretical and Applied Information Technology, 10th December 2014.
  5. Vincent Christlein, ” An Evaluation Of Popular CopyMove Forgery Detection Approaches”, Student member IEEE,vol.07.no 6 December 2012.
  6. X.bo.w.Junwen,”Image Copy-Move forgery detection based on SURF”, in proc. Int. conf., multimedia inf.Netw.(MINES). Nov.2010.
  7. Jessica Fridich, David Soukal,”Detection of Copy Move Forgery in Digital Image”, Department of computer Science, NY 13902-6000.
  8. Hwei-Jen Lin, Chun-Wei Wang, Yang-Ta Kao, ’’Fast Copy-Move Forgery Detection”, WSEAS Transactions On Signal Processing, Issue 5, Volume 5, May 2009.
  9. Matthew C. Stamm,, “Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints”, IEEE Transactions On Information Forensics And Security, Vol. 5, No. 3, September 2010.
  10. Rani Mariya Joseph, Chithra A.S.,“Literature Survey on Image Manipulation Detection” ,International Research Journal of Engineering and Technology (IRJET) ,Volume: 02 Issue: 04,July-2015.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Ishrath Nousheen, Anugu Lahari Reddy, Poniganti Nikitha, " Digital Image Forgery and Techniques of Forgery Detection, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.650-654, March-April-2023.