SlideShare a Scribd company logo
1 of 40
COPY-ROTATE-MOVE FORGERY
DETECTION BASED ON SPATIAL
DOMAIN
Sondos M. Fadl, Noura A. Semary, and Mohiy M. Hadhoud
Faculty of Computers and Information, Menofia University, Egypt
{sondos.magdy,noura.samri,mmhadhoud}@ci.menofia.edu.eg
Introduction
Related works
Objectives
Proposed method
Experiment results
Conclusions and future work
AGENDA
INTRODUCTION
As image is better than thousands of words, World Wide Web
nowadays contains a large amount of digital images used for
effective communication process.
It becomes very trivial for professionals or non-professionals to
edit any pre-existing photographs by using freely available
image editing tools, such as Photoshop.
INTRODUCTION
INTRODUCTION
Image Forgery
Types:
Copy-Move
Image
Compositing
Image
Enhancement
INTRODUCTION
1- Copy-Move (CM) forgery:
CM image tampering is one of the frequently used techniques.
The most performed operations in (CM) forgery are either
hiding a region in the image, or adding a new object into the
image.
The left image was captured in 1930 where Nikolai Yezhov, was
walking with Stalin. Following his execution in 1940 Yezhov was
removed from all Stalin photos !!
INTRODUCTION
2- Image compositing :
that mixes between two or more different images.
3- Image enhancement:
such as blurring, contrast or brightness alteration etc.
Example of image compositing.
Example of image enhancement.
INTRODUCTION
Image Forgery Detection
Techniques:
Active Methods
Passive Methods
“Blind”
1- Active methods such as watermarking depend on prior
information about the original image that in many cases is
not available.
2- Passive or blind methods not depend on prior information
about the original image, it needs only forgery image.
INTRODUCTION
J. Fridrich et al. (2003) suggested one of the raw and earliest
methods to detect copy move forgery.
1- Blocking
2- Pixel value comparison
This method is exact match,
It detects the exact duplication of region.
exact match is hard to find any
manipulation like blurring and JPEG.
RELATED WORKS
Y. Huang et al. (2011) : Another method called robust match
is suggested in which instead of pixel value comparison “exact
match” quantized DCT coefficients are matched.
This method can detect type of manipulations such as JPEG
compression and Gaussian blurring. However the above
method fails for any type of geometric transformations of the
block such as rotation, scaling etc.
RELATED WORKS
RELATED WORKS
H. J. Lin et al. (2009) : suggested a method using subblocking
for feature extraction.
It take nine features for each block as below:
𝑓𝑖 =
𝑓𝑖 = 𝐴𝑣𝑒 𝐵 𝑖𝑓 𝑖 = 1,
𝐴𝑣𝑒(𝑆𝑖 − 1)/4 𝐴𝑣𝑒(𝐵) + 𝜀1 𝑖𝑓 2 ≤ 𝑖 ≤ 5,
𝑓𝑖 = 𝐴𝑣𝑒 𝑆𝑖 − 5 − 𝐴𝑣𝑒 𝐵 𝑖𝑓 6 ≤ 𝑖 ≤ 9.
Shift vector u(i)=P(𝐵𝑖+1)-P(𝐵𝑖) is used to detect the duplicated
regions.
Block
RELATED WORKS
G. Lynch et al. (2013) :
1- Using average gray value
as a feature for each block.
2- blocks are sorted.
2- Manual grouping for
collecting similar blocks in a
same bucket for reduce
processing time.
OBJECTIVES
Parallel block
matching
Average of
Nested frames
Rotation
detection
Accelerated
we propose method which is efficient and fast for detecting
Copy-Move regions even when the copied region was
undergone rotation modify in spatial domain. We named Copy-
Rotate-Move Forgery Detection based on Spatial Domain
(CRMS).
PROPOSED METHOD
CM forgery detection consists of basic steps:
PROPOSED METHOD
Preparing
Feature Extraction
Matching and decision
Step
1
Step
2
Step 3
PROPOSED METHOD
We detect the duplicated regions by Block Matching strategy,
where the image is dividing into equal-size overlapped blocks,
then each block is matched with all other possible blocks in the
same image.
Features are extracted from each block by dividing it to nested
frames and calculate the average of each frame.
CRMS
Input image
with size
MxN
Gray scale
conversion
Dividing into
overlapping
blocks
Features
extraction
Clustering
blocks for K
classes
lexicographically
sorted for blocks
in each class
Logical
distance
calculation
Physical
distance
calculation
Decision
Preparing
CRMS FLOWCHART
1. Preparing Stage:
If the input image is RGB, it converts the image into the
corresponding gray scale version and divide into blocks.
For an image of size M×N, the image could be divided into
small overlapping blocks of b×b pixels resulting in B blocks
where:
𝐵 = (𝑀 − 𝑏 + 1) × (𝑁 − 𝑏 + 1)
CRMS STAGES
CRMS STAGES
2. Features extraction :
If a block has been rotated by basics angles (90, 180 and
270), note the following, lack of change in the values of block,
but values in each frame have been shifted in the same frame.
(a) (F) (c) (d)
Example of F rotation: (a) Original block, (b) rotate angle 𝟗𝟎°, (c)
rotate angle 𝟏𝟖𝟎° and (d) rotate angle 𝟐𝟕𝟎°
321
654
987
963
852
741
789
456
123
147
258
369
CRMS STAGES
Features are extracted from each block as the averages of the
frames.
Feature vector contains 𝑛𝑢𝑚 = (
𝑏−1
2
+ 1) coefficients as well
as 2 indices for block position, it computed below:
𝑣𝑖 =
𝑣𝑖 = 𝐴𝑣𝑒 𝐵 𝑖𝑓 𝑖 = 1,
𝑣𝑖 = 𝐴𝑣𝑒 𝐹𝑗 𝑖𝑓 𝑖 = 2 ≤ 𝑖 ≤ 𝑛𝑢𝑚
3. K-means Clustering :
We used cluster technique to clustering blocks to many class
for parallel comparison to reduce processing time.
K-means algorithm is considered a fast clustering that groups
similar blocks based on features into K number of groups. we
used Fast K-Means algorithm (FKM), that proposed by Elkan
(2003).
CRMS STAGES
F 9F 8F 7F 6F 5F 4F 3F 2F 1
CRMS STAGES
F 9F 8F 7F 6F 5F 4F 3F 2F 1
(Class 1)
F4, F1, F6
(Class 2)
F3, F2, F5, F8
(Class 3)
F7, F9
Sorting F in each class
Applying
FKM
Block
9
Block
8
Block
7
Block
6
Block
5
Block
4
Block
3
Block
2
Block
1
Extracting
Features
CRMS STAGES
4. Matching:
Assume saving the sorted matrix in As, then each row As(i) is
compared to 𝐴𝑠(𝑖+1). Logical distance between the two feature
vectors is calculated below:
𝑑𝑖𝑓 = 𝑗=1
𝑙
𝐴𝑠𝑖
𝑗
− 𝐴𝑠𝑖+1
𝑗
If 𝑑𝑖𝑓 is less than a threshold T, then two blocks are supposed
to similar.
Physical distance is tested below to eliminate the false
positives:
𝑑𝑖𝑠
= (𝐴𝑠𝑖
L+1
− 𝐴𝑠𝑖+1
L+1
)2+(𝐴𝑠𝑖
L+2
− 𝐴𝑠𝑖+1
L+2
)2
where (𝐴𝑠𝑖
L+1
, 𝐴𝑠𝑖
L+2
) is the position of 𝐵𝑖 and (𝐴𝑠𝑖+1
L+1
, 𝐴𝑠𝑖+1
L+2
)
is the position of 𝐵𝑖+1.
When 𝑑𝑖𝑠 is greater or equal than a threshold 𝑁𝑑, mark the
regions in the result image.
CRMS STAGES
Experiment method and procedure:
The experiments were carried out on the Matlab R2012a, RAM
4 GB and processor 2.30 GHZ.
All the images were 128×128 pixels gray image saved in BMP
format.
All the parameter in the experiment were set as: b=9 ,T=0.2 ,
Nd=16 , L=9 and K={4,10,20}.
EXPERIMENT RESULTS
This figure presents the results
of detecting tampered images
without any distortion
operations, each row content
four images original, tampered,
clustering and detection result
image that content duplicated
regions from left to right
respectively.
VISUAL RESULT
This figure shows the detection
result of rotation angle is 90°.
VISUAL RESULT
This figure shows the detection
result of rotation angle is 180°.
VISUAL RESULT
This figure shows the detection
result of rotation angle is 270°.
VISUAL RESULT
This figure shows the detection
result of horizontal reflection.
VISUAL RESULT
This figure shows the detection
result of vertical reflection.
VISUAL RESULT
More detected results over
tampered images with some
modifications shown in the
figure , that shows in first row
original image, detected result
with Gaussian blur in second
row and in thread row the
detected result over JPEG
compressed with QF=70.
VISUAL RESULT
EXPERIMENT RESULTS
Time(s)
Lynch (2013) Huang (2011) Tripathi (2011) CRMS
7.68 4.7005 6.4018 1.5237
The performance time of different methods
shows the performance time of CRMS compared to other
methods.
Note that, the proposed method decreased the
processing time up to 70% faster.
Copy-move
images
Different modifications
Number of
images
Detection
rate
Without
modification
100 99.9%
Rotate with
basic angles
100 99.5%
Gaussian blur 50 90%
JPEG
compression
QF=100
50 70%
JPEG
compression
QF=90
50 64%
JPEG
compression
QF=70
50 58%
The detection rate for different
modifications
Modification
s
Different methods
G. Lynch
(2013)
Y. Huang
(2011)
CRMS
Without
modification
97% 99.9% 99.9%
Rotation 0%
Only less
than 5°
99.5%
Gaussian
blur
30% 90% 90%
JPEG
compression
30% 80% 70%
The performance rate for
different methods
Threshol
d
Number of blocks
Detection
True
Positive
False
Positive
0.1 1336
1336
(100%)
0 (0.00%)
0.2 1338
1336
(99.85%)
2 (0.14%)
0.3 1340
1336
(99.70%)
4 (0.29%)
0.4 1343
1336
(99.47%)
7 (0.52%)
EXPERIMENT RESULTS
Show the result for different Thresholds: up row shows original
image and copy-Rotate-Move image from left to right
respectively and down row shows result with T=0.1, T=0.2,
T=0.3 and T=0.4.
In this paper, we have proposed a fast and efficient method for
CM forgery detection whether without modification and with
rotation modify, by using Fast K-means and block frame
features.
The experiment results show that the proposed method has
the ability to detect CM and CRM forgery in an image faster
than other systems by about 75%.
The method is to be improved for detecting duplicated region
under the rotation with any angle, and detecting CM with scale
modification.
CONCLUSIONS AND FUTURE WORK
A. Khan, S. A. Malik, A. Ali, R. Chamlawi, M. Hussain, M. T. Mahmood, et al, "Intelligent reversible
watermarking and authentication: hiding depth map information for 3D cameras" , Elsevier
Information Sciences, vol. 216, pp. 155-175, 2012.
J. H. Hsiao, C. S. Chen, L. F. Chien, and M. S. Chen, "A new approach to image copy detection
based on extended feature sets." IEEE Image Processing, vol. 16, pp. 2069-2079, no. 8, 2007.
H. Ling, F. Zou, W. Q. Yan, Q. Ma, and H. Cheng, "Efficient image copy detection using multiscale
fingerprints", IEEE Multimedia, 2012.
S. Nikolopoulos, S. Zafeiriou, N. Nikolaidis and I. Pitas, "Image replica detection system utilizing R-
trees and linear discriminant analysis." Elsevier Pattern Recognition, vol. 43, pp. 636-649, no. 3,
2010.
V. Christlein, C. Riess, J. Jordan, C. Riess and E. Angelopoulou, "An evaluation of popular copy-
move forgery detection approaches." IEEE Information Forensics and Security, vol. 7, pp. 1841-
1854, no. 6, 2012.
A. J. Fridrich, F. D. Soukal, and A. J. Lukas, "Detection of copy-move forgery in digital images." in
Proceedings of Digital Forensic Research Workshop, 2003.
G. Lynch, F. Y. Shih and H. Y. M. Liao, "An efficient expanding F algorithm for image copy-move
forgery detection." Elsevier Information Sciences, vol. 239, pp. 253-265, 2013.
REFERENCES
Y. Huang, W. Lu, W. Sun and D. Long, "Improved DCT-based detection of copy-move forgery in images."
Elsevier Forensic science international, vol. 206, pp. 178-184, no. 1, 2011.
H. J. Lin, C. W. Wang and Y. T. Kao, "Fast copy-move forgery detection." WSEAS Transactions on Signal
Processing (World Scientific and Engineering Academy and Society), vol. 5, pp. 188-197, no. 5, 2009.
V. K. Singh and R. C. Tripathi, "Fast and efficient region duplication detection in digital images using sub-
blocking method." International Journal of Advanced Science and Technology, vol. 35, pp. 93-102, 2011.
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions." Dept.
Comput.er Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.
C. Elkan, "Using the triangle inequality to accelerate k-means." ICML. Pp. 147-153, 2003.
M. Zagha and G. E. blelloch, "Radix sort for vector multiprocessors." Proceedings of the 1991 ACM/IEEE
conference on Supercomputing.. pp. 712-721, 1991.
T. T. Ng, J. Hsu, S. F. Chang, Columbia Image Splicing Detection Evaluation Dataset.:
http://www.ee.columFia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet/
REFERENCES

More Related Content

What's hot

Chapter 3 : IMAGE
Chapter 3 : IMAGEChapter 3 : IMAGE
Chapter 3 : IMAGEazira96
 
TYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVEC
TYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVECTYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVEC
TYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVECMathankumar S
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentalsA B Shinde
 
Pneumonia Detection using CNN
Pneumonia Detection using CNNPneumonia Detection using CNN
Pneumonia Detection using CNNYashIyengar
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial DomainDEEPASHRI HK
 
Image Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):BasicsImage Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):BasicsKalyan Acharjya
 
Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaginggeetachauhan
 
Image compression standards
Image compression standardsImage compression standards
Image compression standardskirupasuchi1996
 
Image Processing
Image ProcessingImage Processing
Image Processingtijeel
 
IMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVECIMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVECMathankumar S
 
Chest X-ray Pneumonia Classification with Deep Learning
Chest X-ray Pneumonia Classification with Deep LearningChest X-ray Pneumonia Classification with Deep Learning
Chest X-ray Pneumonia Classification with Deep LearningBaoTramDuong2
 
Semi supervised learning machine learning made simple
Semi supervised learning  machine learning made simpleSemi supervised learning  machine learning made simple
Semi supervised learning machine learning made simpleDevansh16
 
Chapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsChapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsasodariyabhavesh
 
Introduction of image processing
Introduction of image processingIntroduction of image processing
Introduction of image processingAvani Shah
 

What's hot (20)

Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Chapter 3 : IMAGE
Chapter 3 : IMAGEChapter 3 : IMAGE
Chapter 3 : IMAGE
 
TYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVEC
TYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVECTYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVEC
TYPES OF IMAGE FILE FORMAT - MATHANKUMAR.S - VMKVEC
 
Spatial operation.ppt
Spatial operation.pptSpatial operation.ppt
Spatial operation.ppt
 
CV_Chap 3 Features Detection
CV_Chap 3 Features DetectionCV_Chap 3 Features Detection
CV_Chap 3 Features Detection
 
Image processing
Image processingImage processing
Image processing
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentals
 
Pneumonia Detection using CNN
Pneumonia Detection using CNNPneumonia Detection using CNN
Pneumonia Detection using CNN
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Computer Graphics
Computer GraphicsComputer Graphics
Computer Graphics
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
Image Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):BasicsImage Restoration (Frequency Domain Filters):Basics
Image Restoration (Frequency Domain Filters):Basics
 
Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaging
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
IMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVECIMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
 
Chest X-ray Pneumonia Classification with Deep Learning
Chest X-ray Pneumonia Classification with Deep LearningChest X-ray Pneumonia Classification with Deep Learning
Chest X-ray Pneumonia Classification with Deep Learning
 
Semi supervised learning machine learning made simple
Semi supervised learning  machine learning made simpleSemi supervised learning  machine learning made simple
Semi supervised learning machine learning made simple
 
Chapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsChapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woods
 
Introduction of image processing
Introduction of image processingIntroduction of image processing
Introduction of image processing
 

Similar to Copy-Rotate-Move Forgery Detection Based on Spatial Domain

FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
 
Lect 03 - first portion
Lect 03 - first portionLect 03 - first portion
Lect 03 - first portionMoe Moe Myint
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Global threshold and region based active contour model for accurate image seg...
Global threshold and region based active contour model for accurate image seg...Global threshold and region based active contour model for accurate image seg...
Global threshold and region based active contour model for accurate image seg...sipij
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression techniqueTELKOMNIKA JOURNAL
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
 
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...IJDKP
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
 
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAINSINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAINijma
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2Surabhi Ks
 
Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...Tuan Q. Pham
 
Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...
Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...
Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...BRNSSPublicationHubI
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolationVikrant Arya
 

Similar to Copy-Rotate-Move Forgery Detection Based on Spatial Domain (20)

FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
Lect 03 - first portion
Lect 03 - first portionLect 03 - first portion
Lect 03 - first portion
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Global threshold and region based active contour model for accurate image seg...
Global threshold and region based active contour model for accurate image seg...Global threshold and region based active contour model for accurate image seg...
Global threshold and region based active contour model for accurate image seg...
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression technique
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
 
crowd counting.pptx
crowd counting.pptxcrowd counting.pptx
crowd counting.pptx
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
I010634450
I010634450I010634450
I010634450
 
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAINSINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2
 
Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...
 
Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...
Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...
Fast Stereo Images Compression Method based on Wavelet Transform and Two dime...
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolation
 

Recently uploaded

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 

Recently uploaded (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 

Copy-Rotate-Move Forgery Detection Based on Spatial Domain

  • 1. COPY-ROTATE-MOVE FORGERY DETECTION BASED ON SPATIAL DOMAIN Sondos M. Fadl, Noura A. Semary, and Mohiy M. Hadhoud Faculty of Computers and Information, Menofia University, Egypt {sondos.magdy,noura.samri,mmhadhoud}@ci.menofia.edu.eg
  • 2. Introduction Related works Objectives Proposed method Experiment results Conclusions and future work AGENDA
  • 3. INTRODUCTION As image is better than thousands of words, World Wide Web nowadays contains a large amount of digital images used for effective communication process.
  • 4. It becomes very trivial for professionals or non-professionals to edit any pre-existing photographs by using freely available image editing tools, such as Photoshop. INTRODUCTION
  • 6. INTRODUCTION 1- Copy-Move (CM) forgery: CM image tampering is one of the frequently used techniques. The most performed operations in (CM) forgery are either hiding a region in the image, or adding a new object into the image. The left image was captured in 1930 where Nikolai Yezhov, was walking with Stalin. Following his execution in 1940 Yezhov was removed from all Stalin photos !!
  • 7. INTRODUCTION 2- Image compositing : that mixes between two or more different images. 3- Image enhancement: such as blurring, contrast or brightness alteration etc. Example of image compositing. Example of image enhancement.
  • 8. INTRODUCTION Image Forgery Detection Techniques: Active Methods Passive Methods “Blind”
  • 9. 1- Active methods such as watermarking depend on prior information about the original image that in many cases is not available. 2- Passive or blind methods not depend on prior information about the original image, it needs only forgery image. INTRODUCTION
  • 10. J. Fridrich et al. (2003) suggested one of the raw and earliest methods to detect copy move forgery. 1- Blocking 2- Pixel value comparison This method is exact match, It detects the exact duplication of region. exact match is hard to find any manipulation like blurring and JPEG. RELATED WORKS
  • 11. Y. Huang et al. (2011) : Another method called robust match is suggested in which instead of pixel value comparison “exact match” quantized DCT coefficients are matched. This method can detect type of manipulations such as JPEG compression and Gaussian blurring. However the above method fails for any type of geometric transformations of the block such as rotation, scaling etc. RELATED WORKS
  • 12. RELATED WORKS H. J. Lin et al. (2009) : suggested a method using subblocking for feature extraction. It take nine features for each block as below: 𝑓𝑖 = 𝑓𝑖 = 𝐴𝑣𝑒 𝐵 𝑖𝑓 𝑖 = 1, 𝐴𝑣𝑒(𝑆𝑖 − 1)/4 𝐴𝑣𝑒(𝐵) + 𝜀1 𝑖𝑓 2 ≤ 𝑖 ≤ 5, 𝑓𝑖 = 𝐴𝑣𝑒 𝑆𝑖 − 5 − 𝐴𝑣𝑒 𝐵 𝑖𝑓 6 ≤ 𝑖 ≤ 9. Shift vector u(i)=P(𝐵𝑖+1)-P(𝐵𝑖) is used to detect the duplicated regions. Block
  • 13. RELATED WORKS G. Lynch et al. (2013) : 1- Using average gray value as a feature for each block. 2- blocks are sorted. 2- Manual grouping for collecting similar blocks in a same bucket for reduce processing time.
  • 14. OBJECTIVES Parallel block matching Average of Nested frames Rotation detection Accelerated
  • 15. we propose method which is efficient and fast for detecting Copy-Move regions even when the copied region was undergone rotation modify in spatial domain. We named Copy- Rotate-Move Forgery Detection based on Spatial Domain (CRMS). PROPOSED METHOD
  • 16. CM forgery detection consists of basic steps: PROPOSED METHOD Preparing Feature Extraction Matching and decision Step 1 Step 2 Step 3
  • 17. PROPOSED METHOD We detect the duplicated regions by Block Matching strategy, where the image is dividing into equal-size overlapped blocks, then each block is matched with all other possible blocks in the same image.
  • 18. Features are extracted from each block by dividing it to nested frames and calculate the average of each frame. CRMS
  • 19. Input image with size MxN Gray scale conversion Dividing into overlapping blocks Features extraction Clustering blocks for K classes lexicographically sorted for blocks in each class Logical distance calculation Physical distance calculation Decision Preparing CRMS FLOWCHART
  • 20. 1. Preparing Stage: If the input image is RGB, it converts the image into the corresponding gray scale version and divide into blocks. For an image of size M×N, the image could be divided into small overlapping blocks of b×b pixels resulting in B blocks where: 𝐵 = (𝑀 − 𝑏 + 1) × (𝑁 − 𝑏 + 1) CRMS STAGES
  • 21. CRMS STAGES 2. Features extraction : If a block has been rotated by basics angles (90, 180 and 270), note the following, lack of change in the values of block, but values in each frame have been shifted in the same frame. (a) (F) (c) (d) Example of F rotation: (a) Original block, (b) rotate angle 𝟗𝟎°, (c) rotate angle 𝟏𝟖𝟎° and (d) rotate angle 𝟐𝟕𝟎° 321 654 987 963 852 741 789 456 123 147 258 369
  • 22. CRMS STAGES Features are extracted from each block as the averages of the frames. Feature vector contains 𝑛𝑢𝑚 = ( 𝑏−1 2 + 1) coefficients as well as 2 indices for block position, it computed below: 𝑣𝑖 = 𝑣𝑖 = 𝐴𝑣𝑒 𝐵 𝑖𝑓 𝑖 = 1, 𝑣𝑖 = 𝐴𝑣𝑒 𝐹𝑗 𝑖𝑓 𝑖 = 2 ≤ 𝑖 ≤ 𝑛𝑢𝑚
  • 23. 3. K-means Clustering : We used cluster technique to clustering blocks to many class for parallel comparison to reduce processing time. K-means algorithm is considered a fast clustering that groups similar blocks based on features into K number of groups. we used Fast K-Means algorithm (FKM), that proposed by Elkan (2003). CRMS STAGES
  • 24. F 9F 8F 7F 6F 5F 4F 3F 2F 1 CRMS STAGES F 9F 8F 7F 6F 5F 4F 3F 2F 1 (Class 1) F4, F1, F6 (Class 2) F3, F2, F5, F8 (Class 3) F7, F9 Sorting F in each class Applying FKM Block 9 Block 8 Block 7 Block 6 Block 5 Block 4 Block 3 Block 2 Block 1 Extracting Features
  • 25. CRMS STAGES 4. Matching: Assume saving the sorted matrix in As, then each row As(i) is compared to 𝐴𝑠(𝑖+1). Logical distance between the two feature vectors is calculated below: 𝑑𝑖𝑓 = 𝑗=1 𝑙 𝐴𝑠𝑖 𝑗 − 𝐴𝑠𝑖+1 𝑗 If 𝑑𝑖𝑓 is less than a threshold T, then two blocks are supposed to similar.
  • 26. Physical distance is tested below to eliminate the false positives: 𝑑𝑖𝑠 = (𝐴𝑠𝑖 L+1 − 𝐴𝑠𝑖+1 L+1 )2+(𝐴𝑠𝑖 L+2 − 𝐴𝑠𝑖+1 L+2 )2 where (𝐴𝑠𝑖 L+1 , 𝐴𝑠𝑖 L+2 ) is the position of 𝐵𝑖 and (𝐴𝑠𝑖+1 L+1 , 𝐴𝑠𝑖+1 L+2 ) is the position of 𝐵𝑖+1. When 𝑑𝑖𝑠 is greater or equal than a threshold 𝑁𝑑, mark the regions in the result image. CRMS STAGES
  • 27. Experiment method and procedure: The experiments were carried out on the Matlab R2012a, RAM 4 GB and processor 2.30 GHZ. All the images were 128×128 pixels gray image saved in BMP format. All the parameter in the experiment were set as: b=9 ,T=0.2 , Nd=16 , L=9 and K={4,10,20}. EXPERIMENT RESULTS
  • 28. This figure presents the results of detecting tampered images without any distortion operations, each row content four images original, tampered, clustering and detection result image that content duplicated regions from left to right respectively. VISUAL RESULT
  • 29. This figure shows the detection result of rotation angle is 90°. VISUAL RESULT
  • 30. This figure shows the detection result of rotation angle is 180°. VISUAL RESULT
  • 31. This figure shows the detection result of rotation angle is 270°. VISUAL RESULT
  • 32. This figure shows the detection result of horizontal reflection. VISUAL RESULT
  • 33. This figure shows the detection result of vertical reflection. VISUAL RESULT
  • 34. More detected results over tampered images with some modifications shown in the figure , that shows in first row original image, detected result with Gaussian blur in second row and in thread row the detected result over JPEG compressed with QF=70. VISUAL RESULT
  • 35. EXPERIMENT RESULTS Time(s) Lynch (2013) Huang (2011) Tripathi (2011) CRMS 7.68 4.7005 6.4018 1.5237 The performance time of different methods shows the performance time of CRMS compared to other methods. Note that, the proposed method decreased the processing time up to 70% faster.
  • 36. Copy-move images Different modifications Number of images Detection rate Without modification 100 99.9% Rotate with basic angles 100 99.5% Gaussian blur 50 90% JPEG compression QF=100 50 70% JPEG compression QF=90 50 64% JPEG compression QF=70 50 58% The detection rate for different modifications Modification s Different methods G. Lynch (2013) Y. Huang (2011) CRMS Without modification 97% 99.9% 99.9% Rotation 0% Only less than 5° 99.5% Gaussian blur 30% 90% 90% JPEG compression 30% 80% 70% The performance rate for different methods
  • 37. Threshol d Number of blocks Detection True Positive False Positive 0.1 1336 1336 (100%) 0 (0.00%) 0.2 1338 1336 (99.85%) 2 (0.14%) 0.3 1340 1336 (99.70%) 4 (0.29%) 0.4 1343 1336 (99.47%) 7 (0.52%) EXPERIMENT RESULTS Show the result for different Thresholds: up row shows original image and copy-Rotate-Move image from left to right respectively and down row shows result with T=0.1, T=0.2, T=0.3 and T=0.4.
  • 38. In this paper, we have proposed a fast and efficient method for CM forgery detection whether without modification and with rotation modify, by using Fast K-means and block frame features. The experiment results show that the proposed method has the ability to detect CM and CRM forgery in an image faster than other systems by about 75%. The method is to be improved for detecting duplicated region under the rotation with any angle, and detecting CM with scale modification. CONCLUSIONS AND FUTURE WORK
  • 39. A. Khan, S. A. Malik, A. Ali, R. Chamlawi, M. Hussain, M. T. Mahmood, et al, "Intelligent reversible watermarking and authentication: hiding depth map information for 3D cameras" , Elsevier Information Sciences, vol. 216, pp. 155-175, 2012. J. H. Hsiao, C. S. Chen, L. F. Chien, and M. S. Chen, "A new approach to image copy detection based on extended feature sets." IEEE Image Processing, vol. 16, pp. 2069-2079, no. 8, 2007. H. Ling, F. Zou, W. Q. Yan, Q. Ma, and H. Cheng, "Efficient image copy detection using multiscale fingerprints", IEEE Multimedia, 2012. S. Nikolopoulos, S. Zafeiriou, N. Nikolaidis and I. Pitas, "Image replica detection system utilizing R- trees and linear discriminant analysis." Elsevier Pattern Recognition, vol. 43, pp. 636-649, no. 3, 2010. V. Christlein, C. Riess, J. Jordan, C. Riess and E. Angelopoulou, "An evaluation of popular copy- move forgery detection approaches." IEEE Information Forensics and Security, vol. 7, pp. 1841- 1854, no. 6, 2012. A. J. Fridrich, F. D. Soukal, and A. J. Lukas, "Detection of copy-move forgery in digital images." in Proceedings of Digital Forensic Research Workshop, 2003. G. Lynch, F. Y. Shih and H. Y. M. Liao, "An efficient expanding F algorithm for image copy-move forgery detection." Elsevier Information Sciences, vol. 239, pp. 253-265, 2013. REFERENCES
  • 40. Y. Huang, W. Lu, W. Sun and D. Long, "Improved DCT-based detection of copy-move forgery in images." Elsevier Forensic science international, vol. 206, pp. 178-184, no. 1, 2011. H. J. Lin, C. W. Wang and Y. T. Kao, "Fast copy-move forgery detection." WSEAS Transactions on Signal Processing (World Scientific and Engineering Academy and Society), vol. 5, pp. 188-197, no. 5, 2009. V. K. Singh and R. C. Tripathi, "Fast and efficient region duplication detection in digital images using sub- blocking method." International Journal of Advanced Science and Technology, vol. 35, pp. 93-102, 2011. A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions." Dept. Comput.er Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004. C. Elkan, "Using the triangle inequality to accelerate k-means." ICML. Pp. 147-153, 2003. M. Zagha and G. E. blelloch, "Radix sort for vector multiprocessors." Proceedings of the 1991 ACM/IEEE conference on Supercomputing.. pp. 712-721, 1991. T. T. Ng, J. Hsu, S. F. Chang, Columbia Image Splicing Detection Evaluation Dataset.: http://www.ee.columFia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet/ REFERENCES

Editor's Notes

  1. Detection of digital image forgery is an important task in many fields such as journalism that form public opinion to the community , defaming business and political opinions.