SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Collaborative Research in Engineering Sciences(2348-9707)
Volume I Issue 2, April, 2014
1
ISSN: 2348-9707© IJCRES | ijcres.com
FORGERY (COPY-MOVE) DETECTION IN DIGITAL
IMAGES USING BLOCK METHOD
AKHILESH KUMAR YADAV, DEENBANDHU SINGH, VIVEK KUMAR
Department of Computer Science and Engineering
Babu Banarasi Das University, Lucknow
akhi2232232@gmail.com, deenbandhusingh85@gmail.com, vivek.kumar0091@gmail.com
ABSTRACT- Digital images can be easily modified using powerful image editing software. Determining whether a
manipulation is innocent of sharpening from those which are malicious, such as removing or adding parts to an
image is the topic of this paper. In this paper we focus on detection of a special type of forgery-the Copy-Move
forgery, in this part of the original image is copied moved to desired location in the same image and pasted. The
proposed method compress images using DWT (discrete wavelet transform) and divided into blocks and choose
blocks than perform feature vector calculation and lexicographical sorting and duplicated blocks are identified
after sorting. This method is good at some manipulation/attack likes scaling, rotation, Gaussian noise, smoothing,
JPEG compression etc.
INDEX TERMS- Copy-Move forgery, Wavelet Transform, Lexicographical Sorting, Region Duplication Detection.
— — — — — — — — — —  — — — — — — — — — —
1. INTRODUCTION
Now a day, it is easy task to create digital image forgeries
from the advanced digital cameras. Some of the tools
found in the editor are: cropping, resizing an image,
selecting part of a (lasso tool), removing rotating objects,
unwanted part of an image, merging pictures together.
Therefore it’s become a challenging task to verify the
originality of an image.
Digital image forgery detection methods are classified into
two approaches, which are active and passive approach. In
active approaches, the digital images require signatures,
watermarking etc. which are pre-processing. Passive
approach is different from active approaches; passive
approach does not need any watermark embedded in
advance.
The copy-move forgery is one of the difficult types of
forgery. In this forgery one portion of an image are copied
and then select the desired location for pasting in same
image. The target of this type of forgery is to hide or add
some main feature in same image. A reduced dimension
representation is proposed to A.C. Popescu [2], in this
image blocks are given by PCA (principal component
analysis). After that to get duplicated regions we performed
lexicographically sorting into every block. H. Huang [3]
first calculates SIFT descriptors of an image, which are not
depending on rotation and illumination etc. For detecting
copy-move forgery in the image, all these descriptors are
matched with each other.
2. PROPOSED METHOD
In our proposed method first we take an input image and
then check image is in RGB or Gray. If image is not in
gray scales, convert the image into gray scale image, then
following the step hich are shown in figure-1.
Figure-1 Flow Chart of Proposed Method
Gray Scale Conversion
Block Creation
Feature Extraction
Exact Match
Shift Vector Calculation
Detection Result
Input Image
International Journal of Collaborative Research in Engineering Sciences(2348-9707)
Volume I Issue 2, April, 2014
2
ISSN: 2348-9707© IJCRES | ijcres.com
2.1 Discrete Wavelet Transform
A discrete wavelet transforms (DWT) is wavelet
transforms for which the wavelets are discretely sampled.
The basic idea of discrete wavelet transform is to reduce at
each level for the size of the image.
The haar wavelet transforms is the simplest of the all
wavelet transform. In this simply input value 2n
, sorting the
difference and passing the sum. This process is repeated
recursively, pairing up the sums to provide the next scale:
finally resulting in 2n
-1 differences and one final sum.
Figure 2
Figure 3 Type [2] an example of the 2D DWT
2.2 Block Creation
Figure 1 depicts the flow chart of proposed methods. The
input image of size x×y is divided into ‘a’ blocks of size
b×b pixels by moving the block point to point on the
image[1]. Each block of the image is iteratively compared
to every other block. The adjacent neighbors of the marked
blocks are compared, in copy-move forgery.
2.3 Exact Match
So that, every block contains nine feature vectors V = v1s,
v2, v3, v4, v5, v6, v7, v8. We contain an array a, all these
block is sorted into it. The starting pixel of this block will
contain in array of row and column indices with features of
block. It means, this array has contained d [M – b + 1] *[N
– b + rows] and [9+2] columns. In sorting, first nine
columns may be used. Since, radix sort is sufficient method
for the integers of normalization by features [4].
Alphabetical order or lexicographical product is
generalization of the way the alphabetical order of words is
based on the alphabetical order of their component letters.
So that, the highest priority is given by serial, first priority
is given to v1 to v5 and left for the other vectors features
v6 to v9. One pixel is containing information which is
contributing to two different sub blocks. Strongly
correlated features are given by it [5].
2.4 Feature Extraction
Formally, the positions are let be consider as [j1, j2] and
[k1, k2]. Between the two matching blocks, the shift vector
s is calculated as-
s = [s1, s2] = [j1 – k1, j2 – k2].
So that, the same shift is corresponding to the shift vector s
and –s, the normalization is done for shift vectors s.
If necessary, we get s1≥0 by multiplying by -1. So that for
every pair of block matching, the normalized shift vector
counter C is incremented by one:
C (s1, s2) = C (s1, s2) + 1.
The sorted matrix A contains the counter C incrementation
for every pair of consecutive matching’s rows. Before the
algorithm starts, the shift vector is initialized zero. At the
end of the matching process, different normalized shift
vectors occur by the counter C indicates the frequencies.
Then the entire normalized shift vectors s (1), s (2)… s (K)
find by the algorithm, whose occurrence exceeds an user-
specified threshold T: C(s(r)) > T for all r = 1… K.
The matching blocks that contributed to that specific shift
vector are colored with the same color and thus identified
with segments that might have been moved and copied; it
is for all normalized shift vectors [6].
2.5 Detection of Duplicated Region
The algorithm identified the size of the smallest segment
which is related to the value of the threshold T. The
algorithm may miss some not-so-closely matching blocks
of large value. While too many false matches may
introduce to too small value of T. We repeat that the Q
factor Controls the sensitivity of the algorithm to the
degree of matching between blocks, while the block size B
and threshold T control the minimal size of the segment
that can be detected.
We perform erosion for removing such false matches
followed by dilation. Before one or two erosions, the
boundaries are shrunk from erosion of the matched block.
Unwanted blocks are removing from it for the small
blocks. For getting forged region for the original shape, we
performed dilation of same numbers of time [5].
3. Experimental Result
In the experiments carried out for the detection process,
several images are tempered by copying and pasting one
image block over another, in the same image using
malicious tools. The whole process was implemented in
MATLAB (R2011a) and executed on a computer of CPU
2.0 GHz with secondary storage memory of 320 GB and
main memory 3 GB. Experimental data set consists of data
International Journal of Collaborative Research in Engineering Sciences(2348-9707)
Volume I Issue 2, April, 2014
3
ISSN: 2348-9707© IJCRES | ijcres.com
sets, I which has 50 forged images and data set II having
10 noisy images (noise level range from 6% to 25% normal
noise) and data set III has 10 images saved with low JPEG
levels (level range from 5 to 9), data set IV which has 30
original images with natural duplication in them. All
images are compressed using discrete wavelet transforms.
Block size is set based on image size. The detected results
from tempered images shown in figure.
Figure 4 Original Image
Figure 5 Forged Images
Figure 6 Detection Result
Figure 7 Original Image
Figure 8 Forged Images
Figure 9 Detection Result
International Journal of Collaborative Research in Engineering Sciences(2348-9707)
Volume I Issue 2, April, 2014
4
ISSN: 2348-9707© IJCRES | ijcres.com
Figure 10 Original Image
Figure 11 Forged Images
Figure 12 Detection Result
Comparison result of propose approach with other existing
methods [1] [5].
Table 1 Comparison
Algorithm False Detection Right Detection
[1] 0.222 0.643
[2] 0.721 0.8771
Proposed
Method
0.822 0.9633
CONCLUSION
In this paper an algorithm for detecting copy move forgery
using wavelet transform is proposed. Our method of stand
to in the original images for detecting duplicated region
attacked by way of rotation (up to some extent), JPEG
compression and Gaussian noise.
REFERENCES
[1] Tehseen Shahid, Atif Bin Mansoor,” copy-move forgery detection
algorithm for a digital images and a new accuracy metric”, in
international journal of recent trends in engineering, Vol 2, No. 2,
November 2009.
[2] A.C. Popescu and H. Farid,” Exposing digital forgeries by detecting
duplicated image regions”, Technical Report TR2004-515,
Dartmouth College, Aug. 2004.
[3] H. Huang, W. Guo, and Y. Zhang, “Detection of Copy-Move
Forgery in Digital Images Using SIFT Algorithm,” in Proceedings
of IEEE Pacific-Asia Workshop on Computational Intelligence and
Industrial Application, Vol. 2, 2008, pp. 272-276.
[4] Hwei-Jen Lin, Chun-Wei Wang, Yang-Ta Kao, “Fast Copy-Move
Forgery Detection,” WSEAS TRANSACTIONS on SIGNAL
PROCESSING, Issue 5, Volume 5, May 2009, pp. 188-197.
[5] Vivek Kumar Singh and R.C. Tripathi,” Fast and Efficient Region
Duplication Detection in Digital Images Using Sub-Blocking
Methods”, in international journal of advanced science and
technology, Vol. 35, October, 2011.
[6] Jessica Fridrich, David Soukal, and Jan Lukáš,” Detection of Copy-
Move Forgery in Digital Images”.
[7] Shinfeng D. Lin and Tszan Wu,” An Integrated Technique for
Splicing and Copy Move forgery Image Detection”, in 2011 4th
International Confress on Image and Signal Processing.
[8] Saiqa Khan, Arun Kulkarni,” Robust Method for Detection of Copy-
Move Forgery in Digital Images”, in IEEE 2010.
AUTHORS
First Author – Akhilesh Kumar Yadav, M.tech. Babu
Banarasi Das University, Lucknow, Uttar Pradesh, India.
akhi2232232@gmail.com
Second Author – Deenbandhu Singh, M.tech. Babu
Banarasi Das University, Lucknow, Uttar Pradesh, India
deenbandhusingh85@gmail.com
Third Author – Vivek Kumar, Sr. Lecturer Computer
Science Department, Babu Banarasi Das University,
Lucknow, Uttar Pradesh, India.
vivek.kumar0091@gmail.com

More Related Content

What's hot

Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Image compression standards
Image compression standardsImage compression standards
Image compression standardskirupasuchi1996
 
digital image processing
digital image processingdigital image processing
digital image processingAbinaya B
 
Chapter 9 morphological image processing
Chapter 9 morphological image processingChapter 9 morphological image processing
Chapter 9 morphological image processingasodariyabhavesh
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentationasodariyabhavesh
 
Digital Image Processing - Image Enhancement
Digital Image Processing  - Image EnhancementDigital Image Processing  - Image Enhancement
Digital Image Processing - Image EnhancementMathankumar S
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filtersA B Shinde
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Image compression in digital image processing
Image compression in digital image processingImage compression in digital image processing
Image compression in digital image processingDHIVYADEVAKI
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Image segmentation 2
Image segmentation 2 Image segmentation 2
Image segmentation 2 Rumah Belajar
 
application of digital image processing and methods
application of digital image processing and methodsapplication of digital image processing and methods
application of digital image processing and methodsSIRILsam
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainSondosFadl
 

What's hot (20)

Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Chapter 9 morphological image processing
Chapter 9 morphological image processingChapter 9 morphological image processing
Chapter 9 morphological image processing
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Image Segmentation
 Image Segmentation Image Segmentation
Image Segmentation
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
Digital Image Processing - Image Enhancement
Digital Image Processing  - Image EnhancementDigital Image Processing  - Image Enhancement
Digital Image Processing - Image Enhancement
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Image compression
Image compression Image compression
Image compression
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Edge detection
Edge detectionEdge detection
Edge detection
 
Image compression in digital image processing
Image compression in digital image processingImage compression in digital image processing
Image compression in digital image processing
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Image segmentation 2
Image segmentation 2 Image segmentation 2
Image segmentation 2
 
application of digital image processing and methods
application of digital image processing and methodsapplication of digital image processing and methods
application of digital image processing and methods
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 

Viewers also liked

Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...arorasurbhi
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...IDES Editor
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature reviewTharindu Rusira
 
Introduction image features
Introduction image featuresIntroduction image features
Introduction image featurespayalshah14
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...LogicMindtech Nologies
 
Segmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection schemeSegmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection schemeI3E Technologies
 
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...Wookjin Choi
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelEditor IJMTER
 
Three different classifiers for facial age estimation based on K-nearest neig...
Three different classifiers for facial age estimation based on K-nearest neig...Three different classifiers for facial age estimation based on K-nearest neig...
Three different classifiers for facial age estimation based on K-nearest neig...Alaa Tharwat
 
Feature Matching using SIFT algorithm
Feature Matching using SIFT algorithmFeature Matching using SIFT algorithm
Feature Matching using SIFT algorithmSajid Pareeth
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and ExtactionAli A Jalil
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentationwolf
 
FRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONINGFRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONINGSatish Chandra
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
Textile management system review iii
Textile management system   review iiiTextile management system   review iii
Textile management system review iiiAntony Alex
 

Viewers also liked (20)

Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Introduction image features
Introduction image featuresIntroduction image features
Introduction image features
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
 
Segmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection schemeSegmentation based image copy-move forgery detection scheme
Segmentation based image copy-move forgery detection scheme
 
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
 
Sign verification
Sign verificationSign verification
Sign verification
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection Model
 
Three different classifiers for facial age estimation based on K-nearest neig...
Three different classifiers for facial age estimation based on K-nearest neig...Three different classifiers for facial age estimation based on K-nearest neig...
Three different classifiers for facial age estimation based on K-nearest neig...
 
main project doument
main project doumentmain project doument
main project doument
 
Feature Matching using SIFT algorithm
Feature Matching using SIFT algorithmFeature Matching using SIFT algorithm
Feature Matching using SIFT algorithm
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
 
FRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONINGFRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONING
 
PPT ON FORGING
PPT ON FORGINGPPT ON FORGING
PPT ON FORGING
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Textile management system review iii
Textile management system   review iiiTextile management system   review iii
Textile management system review iii
 

Similar to FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD

Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space IJEEE
 
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...cscpconf
 
Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...csandit
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
 
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...IJDKP
 
CenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-PosterCenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-PosterYunming Zhang
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET Journal
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET Journal
 

Similar to FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD (20)

Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
56 58
56 5856 58
56 58
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 
Ijetr011837
Ijetr011837Ijetr011837
Ijetr011837
 
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
 
Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
I07015261
I07015261I07015261
I07015261
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
 
557 480-486
557 480-486557 480-486
557 480-486
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
BIG DATA-DRIVEN FAST REDUCING THE VISUAL BLOCK ARTIFACTS OF DCT COMPRESSED IM...
 
CenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-PosterCenterForDomainSpecificComputing-Poster
CenterForDomainSpecificComputing-Poster
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD

  • 1. International Journal of Collaborative Research in Engineering Sciences(2348-9707) Volume I Issue 2, April, 2014 1 ISSN: 2348-9707© IJCRES | ijcres.com FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD AKHILESH KUMAR YADAV, DEENBANDHU SINGH, VIVEK KUMAR Department of Computer Science and Engineering Babu Banarasi Das University, Lucknow akhi2232232@gmail.com, deenbandhusingh85@gmail.com, vivek.kumar0091@gmail.com ABSTRACT- Digital images can be easily modified using powerful image editing software. Determining whether a manipulation is innocent of sharpening from those which are malicious, such as removing or adding parts to an image is the topic of this paper. In this paper we focus on detection of a special type of forgery-the Copy-Move forgery, in this part of the original image is copied moved to desired location in the same image and pasted. The proposed method compress images using DWT (discrete wavelet transform) and divided into blocks and choose blocks than perform feature vector calculation and lexicographical sorting and duplicated blocks are identified after sorting. This method is good at some manipulation/attack likes scaling, rotation, Gaussian noise, smoothing, JPEG compression etc. INDEX TERMS- Copy-Move forgery, Wavelet Transform, Lexicographical Sorting, Region Duplication Detection. — — — — — — — — — —  — — — — — — — — — — 1. INTRODUCTION Now a day, it is easy task to create digital image forgeries from the advanced digital cameras. Some of the tools found in the editor are: cropping, resizing an image, selecting part of a (lasso tool), removing rotating objects, unwanted part of an image, merging pictures together. Therefore it’s become a challenging task to verify the originality of an image. Digital image forgery detection methods are classified into two approaches, which are active and passive approach. In active approaches, the digital images require signatures, watermarking etc. which are pre-processing. Passive approach is different from active approaches; passive approach does not need any watermark embedded in advance. The copy-move forgery is one of the difficult types of forgery. In this forgery one portion of an image are copied and then select the desired location for pasting in same image. The target of this type of forgery is to hide or add some main feature in same image. A reduced dimension representation is proposed to A.C. Popescu [2], in this image blocks are given by PCA (principal component analysis). After that to get duplicated regions we performed lexicographically sorting into every block. H. Huang [3] first calculates SIFT descriptors of an image, which are not depending on rotation and illumination etc. For detecting copy-move forgery in the image, all these descriptors are matched with each other. 2. PROPOSED METHOD In our proposed method first we take an input image and then check image is in RGB or Gray. If image is not in gray scales, convert the image into gray scale image, then following the step hich are shown in figure-1. Figure-1 Flow Chart of Proposed Method Gray Scale Conversion Block Creation Feature Extraction Exact Match Shift Vector Calculation Detection Result Input Image
  • 2. International Journal of Collaborative Research in Engineering Sciences(2348-9707) Volume I Issue 2, April, 2014 2 ISSN: 2348-9707© IJCRES | ijcres.com 2.1 Discrete Wavelet Transform A discrete wavelet transforms (DWT) is wavelet transforms for which the wavelets are discretely sampled. The basic idea of discrete wavelet transform is to reduce at each level for the size of the image. The haar wavelet transforms is the simplest of the all wavelet transform. In this simply input value 2n , sorting the difference and passing the sum. This process is repeated recursively, pairing up the sums to provide the next scale: finally resulting in 2n -1 differences and one final sum. Figure 2 Figure 3 Type [2] an example of the 2D DWT 2.2 Block Creation Figure 1 depicts the flow chart of proposed methods. The input image of size x×y is divided into ‘a’ blocks of size b×b pixels by moving the block point to point on the image[1]. Each block of the image is iteratively compared to every other block. The adjacent neighbors of the marked blocks are compared, in copy-move forgery. 2.3 Exact Match So that, every block contains nine feature vectors V = v1s, v2, v3, v4, v5, v6, v7, v8. We contain an array a, all these block is sorted into it. The starting pixel of this block will contain in array of row and column indices with features of block. It means, this array has contained d [M – b + 1] *[N – b + rows] and [9+2] columns. In sorting, first nine columns may be used. Since, radix sort is sufficient method for the integers of normalization by features [4]. Alphabetical order or lexicographical product is generalization of the way the alphabetical order of words is based on the alphabetical order of their component letters. So that, the highest priority is given by serial, first priority is given to v1 to v5 and left for the other vectors features v6 to v9. One pixel is containing information which is contributing to two different sub blocks. Strongly correlated features are given by it [5]. 2.4 Feature Extraction Formally, the positions are let be consider as [j1, j2] and [k1, k2]. Between the two matching blocks, the shift vector s is calculated as- s = [s1, s2] = [j1 – k1, j2 – k2]. So that, the same shift is corresponding to the shift vector s and –s, the normalization is done for shift vectors s. If necessary, we get s1≥0 by multiplying by -1. So that for every pair of block matching, the normalized shift vector counter C is incremented by one: C (s1, s2) = C (s1, s2) + 1. The sorted matrix A contains the counter C incrementation for every pair of consecutive matching’s rows. Before the algorithm starts, the shift vector is initialized zero. At the end of the matching process, different normalized shift vectors occur by the counter C indicates the frequencies. Then the entire normalized shift vectors s (1), s (2)… s (K) find by the algorithm, whose occurrence exceeds an user- specified threshold T: C(s(r)) > T for all r = 1… K. The matching blocks that contributed to that specific shift vector are colored with the same color and thus identified with segments that might have been moved and copied; it is for all normalized shift vectors [6]. 2.5 Detection of Duplicated Region The algorithm identified the size of the smallest segment which is related to the value of the threshold T. The algorithm may miss some not-so-closely matching blocks of large value. While too many false matches may introduce to too small value of T. We repeat that the Q factor Controls the sensitivity of the algorithm to the degree of matching between blocks, while the block size B and threshold T control the minimal size of the segment that can be detected. We perform erosion for removing such false matches followed by dilation. Before one or two erosions, the boundaries are shrunk from erosion of the matched block. Unwanted blocks are removing from it for the small blocks. For getting forged region for the original shape, we performed dilation of same numbers of time [5]. 3. Experimental Result In the experiments carried out for the detection process, several images are tempered by copying and pasting one image block over another, in the same image using malicious tools. The whole process was implemented in MATLAB (R2011a) and executed on a computer of CPU 2.0 GHz with secondary storage memory of 320 GB and main memory 3 GB. Experimental data set consists of data
  • 3. International Journal of Collaborative Research in Engineering Sciences(2348-9707) Volume I Issue 2, April, 2014 3 ISSN: 2348-9707© IJCRES | ijcres.com sets, I which has 50 forged images and data set II having 10 noisy images (noise level range from 6% to 25% normal noise) and data set III has 10 images saved with low JPEG levels (level range from 5 to 9), data set IV which has 30 original images with natural duplication in them. All images are compressed using discrete wavelet transforms. Block size is set based on image size. The detected results from tempered images shown in figure. Figure 4 Original Image Figure 5 Forged Images Figure 6 Detection Result Figure 7 Original Image Figure 8 Forged Images Figure 9 Detection Result
  • 4. International Journal of Collaborative Research in Engineering Sciences(2348-9707) Volume I Issue 2, April, 2014 4 ISSN: 2348-9707© IJCRES | ijcres.com Figure 10 Original Image Figure 11 Forged Images Figure 12 Detection Result Comparison result of propose approach with other existing methods [1] [5]. Table 1 Comparison Algorithm False Detection Right Detection [1] 0.222 0.643 [2] 0.721 0.8771 Proposed Method 0.822 0.9633 CONCLUSION In this paper an algorithm for detecting copy move forgery using wavelet transform is proposed. Our method of stand to in the original images for detecting duplicated region attacked by way of rotation (up to some extent), JPEG compression and Gaussian noise. REFERENCES [1] Tehseen Shahid, Atif Bin Mansoor,” copy-move forgery detection algorithm for a digital images and a new accuracy metric”, in international journal of recent trends in engineering, Vol 2, No. 2, November 2009. [2] A.C. Popescu and H. Farid,” Exposing digital forgeries by detecting duplicated image regions”, Technical Report TR2004-515, Dartmouth College, Aug. 2004. [3] H. Huang, W. Guo, and Y. Zhang, “Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm,” in Proceedings of IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Vol. 2, 2008, pp. 272-276. [4] Hwei-Jen Lin, Chun-Wei Wang, Yang-Ta Kao, “Fast Copy-Move Forgery Detection,” WSEAS TRANSACTIONS on SIGNAL PROCESSING, Issue 5, Volume 5, May 2009, pp. 188-197. [5] Vivek Kumar Singh and R.C. Tripathi,” Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Methods”, in international journal of advanced science and technology, Vol. 35, October, 2011. [6] Jessica Fridrich, David Soukal, and Jan Lukáš,” Detection of Copy- Move Forgery in Digital Images”. [7] Shinfeng D. Lin and Tszan Wu,” An Integrated Technique for Splicing and Copy Move forgery Image Detection”, in 2011 4th International Confress on Image and Signal Processing. [8] Saiqa Khan, Arun Kulkarni,” Robust Method for Detection of Copy- Move Forgery in Digital Images”, in IEEE 2010. AUTHORS First Author – Akhilesh Kumar Yadav, M.tech. Babu Banarasi Das University, Lucknow, Uttar Pradesh, India. akhi2232232@gmail.com Second Author – Deenbandhu Singh, M.tech. Babu Banarasi Das University, Lucknow, Uttar Pradesh, India deenbandhusingh85@gmail.com Third Author – Vivek Kumar, Sr. Lecturer Computer Science Department, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India. vivek.kumar0091@gmail.com