SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1124
A SURVEY ON IMAGE FORGERY DETECTION AND REMOVAL
Radika Krishnan1, Annamariya K S2, Blessy M D3, Neenu George4, Teena Davis5
1Assistant Professor, Department of Computer Science, Depaul Institute of Science and Technology Angamaly,
Kerala, India
2,3,4,5Student of MCA, Department of Computer Science, Depaul Institute of Science and Technology Angamaly,
Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In this paper, a survey is performed to study
more about different techniques used to detect the image
forgery. These methods are either based on global or local
features. There is another method Robust Hashing for Image
Authentication using P# and Local features. Here thehashisa
combination of global and local features of an image. Four
types of image forgeries, removal, insertion, and replacement
of objects, and unusual color changes can be identified by this
method. Threshold value determines the authenticity of the
image. Hash performance is measured bythedistancemetrics.
This method can be used to detect tampering image.
Key Words: image forgery, hashing, authentication.
1. INTRODUCTION
Today most of the people began to use different image
processing techniques to make changes in the images for
different purposes. Since it is not easy to differentiate with
original image and processed images. The processing of
images are called image forging. To identify such images
different methods are developed.Imagehashingisoneofthe
methods for image authentication. In this method a hash
value is developed for every image we created. If an image is
processed, even one bit of change in the input will change
the output hash. The original image and processed image
cannot be easily differentiated by humans but they will have
small difference in the hash value generated. Hence the
changes occurred can be identified. If one image has large
difference in the hash value of another image, then they are
not related. Sometimes image forgery leads to cybercrimes.
So it is important to detect and avoid image forging.
2. LITERATURE REVIEW
In recent years, many researchers have proposed many
image hashing methods. These methodscanbeclassifiedinto
two types: space domain methods and transform domain
methods. Methods used in the space domain include
histogram [1], singular value decomposition(SVD) [2], non-
negative matrix factorization(NMF) [3-4] and random
projections[5].Transforms used for generatingimagehashes
include discrete wavelet transform (DWT) [6-7], discrete
cosine transform (DCT) [8], Radon transform [9], Fourier-
Mellin transform [10].
Xiang et al. [1] propose a robustimagehashingmethodbased
on the fact that the shape of an image histogram is invariant
to geometric deformation. Robustness and uniqueness of
proposed hash function are investigated in detail by
representing the histogram shape as the relative relations in
the number of pixels among groups of two different bins. Itis
found from extensive testing that the histogram based hash
functionshasasatisfactoryperformancetovariousgeometric
deformation, and is also robust to most common signal
processing operations thanks to the use of Gaussian kernel
low-pass filter in the preprocessing phase.
In [2],Kozat et al. propose a new hashing algorithm
employing transforms that are based on SVD (singular value
decomposition).This algorithm construct a secondary image
derived from the input image. From the secondary image we
extract the final features whichcanbeusedasahashvalue.In
this paper we use spectral matrix invariants as embodied by
singular value decomposition.
In [3], V.Monga et al. propose the use of non-negative matrix
factorization(NMF)forimagehashing.Thisworkismotivated
by the fact that standard-rank reduction technique such as
QR, and SVD, produce low rang bases which don’trespectthe
structure of original data.
In [4], Tang et al. firstly the image re-scaled to fixed size and
low-pass filtering is performed to produce a normalized
matrix. The normalized matrix are pseudo randomly re-
arranged to generate a secondary image, and then NMF is
performed on it to generate robust image hash. Similarity
between hashesismeasuredbyhammingdistancetampering
can be detected by comparing hamming distance with
predetermined threshold.
In [5] M. Tagliasacchi et al, propose an image hashing
algorithm based on compressive sensing principles which
solves both the authentication and the tampering
identification problems. The content user receives the image
and uses the hash to estimate the mean square error
distortion between the original and the received image.
In [6], propose a method of decouple image hashing into
feature extraction (intermediate hash) followed by data
clustering (final hash). For any perceptually significant
feature extractor, we propose polynomial-time heuristic
clustering algorithm that automatically determine the final
hash length needed to satisfy the distortion.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1125
In [7], a wavelet-based hashing scheme is proposed, which
can tackle robustness, security and tamper detection issues.
In [8], digital watermarks have been proposed for
authentication of both audio data and still images and for
integrity verification of visual multimedia. The watermark
depends on a secret key and the original image. A special
image digest functions are used that return same bit for the
images derived from an original image and different bit for
completely different images.
Wu et al. [9] propose a print-scan resistant image hashing
method based on Radon and wavelet transform. The Radon
transformsan image to its luminance distribution,beforethe
wavelet extracts the relationship of the different areas from
luminance distribution.
In [10], propose a new algorithm for generating image hash
based on Fourier transform features and controlled
randomization. The robustness of image hashing is
considered as hypothesis testingproblemandtoevaluatethe
performance under various image processing operations.
In image processing, Zernike moments (ZMs) are widely
used in many occasions because of their orthogonal rotation
invariant features.ZernikemomentsareproposedbyZernike
firstly in [11], and has been studied extensively ever since.
Zernike moments have been most widely used in extracting
the region based shape features of an image. In most of the
research the magnitude of Zernikemomentsareusedandthe
phase is ignored. In [12], Li et al. propose a new shape
descriptor combining bolt magnitude and phase coefficients
of ZMs, which is invariant to rotation
3. COMPARISON TABLE
Advantages and disadvantages of different algorithm
sl
no
Matching
Algorithm
Advantages Disadvantag
es
1 Histogram based
image hashing
Robust and
secure
Misclassifica
tion,
2 SVD Robustness and
security
2
3 NMF Robust Moderate
noise
contaminatio
n
4 Polynomial time
heuristic
clustering
Authentication Insensitivity
to relative
scaling
algorithm
5 Random
projection
Authentication Random
projection
6 DWT Security High cost of
computing,
7 Wavelet based
hashing
Robustness ,
security, tamper
detection
Complex in
mathematica
l formulas
8 DCT Used for
misleading tool
for hiding facts
and evidence
Not produce
well results
in image
blurring and
video frame
reconstructi
on
9 Random
transform
Robust,
common
content
preserving
processing,
discriminable to
changes
Less speed
because of
number of
comparison
required
10 Fourier-mellin Security,
robustness
Difference in
image
properties
cause
limitations
11 Zernike
moments
Orthogonal
rotation
invariant
Less retrival
accuracy
12 Zernike
moments
Retrival
accuracy, robust
Object based
approach
4. CONCLUSION
Image forgery is one of the major problems in nowadays.
There are different techniques to identify the original image
from two similar images by using image hashing. It is
necessary to produce robust and secure image hashes. For
that different techniqueslike wavelet basedhashing,Zernike
moments, Polynomial timeheuristicclusteringalgorithm etc.
are used. In addition, further study is needed to enhance the
robustness to more content-preserving manipulation and
sensitivity of hashes to tampering in small regions involving
fine details.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1126
REFERENCES
[1] S. Xiang, H. J. Kim and J. Huang, Histogram-based image
hashing scheme robust against geometric deformations,
Proc. of the ACM Multimedia and Security Workshop, ACM
Press, 2007, pp. 121-128.
[2] S. S. Kozat, K. Mihcak and R. Venkatesan, Robust
perceptual image hashingvia matrixinvariants,Proc.ofIEEE
Conference on Image Processing (lCIP'04), Singapore, Oct.
24-27, 2004, pp. 3443-3446
. [3] V. Monga and M. K. Mihcak, Robust and secure image
hashing via nonnegative matrix factorizations, IEEE
Transactions on Information Forensics and Security, 2007,
2(3): 376-390.
[4] Z. Tang, S. Wang, X. Zhang, W. Wei and S. Su, Robust
image hashing for tamper detection using non-negative
matrix factorization. Journal of Ubiquitous Convergenceand
Technology, 2008, 2(): 18-26.
[5] M. Tagliasacchi, G. Valenzise and S. Tubaro. Hash-based
identification of sparse image tampering. IEEE Transactions
on Image Process. 2009, 18( 1):2491-504.
[6] V. Monga, A. Banerjee and B. L. Evans, A clustering based
approach to perceptual imagehashing,IEEETransactionson
Information Forensics and Security, 2006,1(): 68-79.
[7] F. Ahmed, M.Y. Siyal and V. U. Abbas, A secure and robust
hash-based scheme for image authentication, Signal
Processing, 2010, 90(5): 14561470.
[8] J. Fridrich and M. Goljan, Robust hash functions for
digital watermarking, Proc. ofIEEEInternational Conference
on Information Technology: Coding and Computing
(ITCC'OO), Las Vergas, USA, Mar. 27-29,2000, pp. 178-183.
[9] D. Wu, X. Zhou and X. Niu. A novel image hash algorithm
resistant to print-scan, Signal Processing, 2009,89(2):
2415-2424.
[10] A. Swaminathan, Y. Mao and M. Wu, Robust and secure
image hashing, IEEE Transactions on Information Forensics
and Security, 2006, 1 (2): 215-230.
[11] F. Zernike, Beugungstheorie des schneidenverfahres
und seiner verbesserten form, der phasenkontrastmethode,
Physica, 1934, 1, pp.689-704.
[12] S. Li, M.C. Lee, C.M. Pun, Complex Zernike moments
features for shape-based image retrieval, IEEE Transactions
On Systems, Ma, and Cybernetics-part A: Systems and
Humans, 2009, 39(): 227-237.

More Related Content

What's hot

What's hot (20)

D04402024029
D04402024029D04402024029
D04402024029
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
 
Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algo...
Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algo...Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algo...
Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algo...
 
IRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image SegmentationIRJET - Clustering Algorithm for Brain Image Segmentation
IRJET - Clustering Algorithm for Brain Image Segmentation
 
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
 
E1083237
E1083237E1083237
E1083237
 
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
 
IRJET- Image Enhancement using Various Discrete Wavelet Transformation Fi...
IRJET-  	  Image Enhancement using Various Discrete Wavelet Transformation Fi...IRJET-  	  Image Enhancement using Various Discrete Wavelet Transformation Fi...
IRJET- Image Enhancement using Various Discrete Wavelet Transformation Fi...
 
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
REGION CLASSIFICATION BASED IMAGE DENOISING USING SHEARLET AND WAVELET TRANSF...
 
IRJET- A Comprehensive Study on Image Defogging Techniques
IRJET-  	  A Comprehensive Study on Image Defogging TechniquesIRJET-  	  A Comprehensive Study on Image Defogging Techniques
IRJET- A Comprehensive Study on Image Defogging Techniques
 
IRJET- Image De-Blurring using Blind De-Convolution Algorithm
IRJET-  	  Image De-Blurring using Blind De-Convolution AlgorithmIRJET-  	  Image De-Blurring using Blind De-Convolution Algorithm
IRJET- Image De-Blurring using Blind De-Convolution Algorithm
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode Decomposition
 
Assessment of Vascular Network Segmentation
Assessment of Vascular Network SegmentationAssessment of Vascular Network Segmentation
Assessment of Vascular Network Segmentation
 
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTIONROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
 
Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images
 
Image Denoising of various images Using Wavelet Transform and Thresholding Te...
Image Denoising of various images Using Wavelet Transform and Thresholding Te...Image Denoising of various images Using Wavelet Transform and Thresholding Te...
Image Denoising of various images Using Wavelet Transform and Thresholding Te...
 
A Novel Multiple-kernel based Fuzzy c-means Algorithm with Spatial Informatio...
A Novel Multiple-kernel based Fuzzy c-means Algorithm with Spatial Informatio...A Novel Multiple-kernel based Fuzzy c-means Algorithm with Spatial Informatio...
A Novel Multiple-kernel based Fuzzy c-means Algorithm with Spatial Informatio...
 
IRJET- Performance Analysis of Non Linear Filtering for Image Denoising
IRJET- Performance Analysis of Non Linear Filtering for Image DenoisingIRJET- Performance Analysis of Non Linear Filtering for Image Denoising
IRJET- Performance Analysis of Non Linear Filtering for Image Denoising
 

Similar to IRJET- A Survey on Image Forgery Detection and Removal

Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...
IJEECSIAES
 
Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...
nooriasukmaningtyas
 

Similar to IRJET- A Survey on Image Forgery Detection and Removal (20)

IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–Properties
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.
 
IRJET - A Research on Video Forgery Detection using Machine Learning
IRJET -  	  A Research on Video Forgery Detection using Machine LearningIRJET -  	  A Research on Video Forgery Detection using Machine Learning
IRJET - A Research on Video Forgery Detection using Machine Learning
 
Fusion of Images using DWT and fDCT Methods
Fusion of Images using DWT and fDCT MethodsFusion of Images using DWT and fDCT Methods
Fusion of Images using DWT and fDCT Methods
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 
IRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDLIRJET - Simulation of Colour Image Processing Techniques on VHDL
IRJET - Simulation of Colour Image Processing Techniques on VHDL
 
IRJET- Video Forgery Detection using Machine Learning
IRJET-  	  Video Forgery Detection using Machine LearningIRJET-  	  Video Forgery Detection using Machine Learning
IRJET- Video Forgery Detection using Machine Learning
 
IRJET - Deep Learning Approach to Inpainting and Outpainting System
IRJET -  	  Deep Learning Approach to Inpainting and Outpainting SystemIRJET -  	  Deep Learning Approach to Inpainting and Outpainting System
IRJET - Deep Learning Approach to Inpainting and Outpainting System
 
IRJET- Detection and Recognition of Text for Dusty Image using Long Short...
IRJET-  	  Detection and Recognition of Text for Dusty Image using Long Short...IRJET-  	  Detection and Recognition of Text for Dusty Image using Long Short...
IRJET- Detection and Recognition of Text for Dusty Image using Long Short...
 
Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...
 
Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...Efficient resampling features and convolution neural network model for image ...
Efficient resampling features and convolution neural network model for image ...
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Comparison of specific segmentation methods used for copy move detection
Comparison of specific segmentation methods used for copy move detection Comparison of specific segmentation methods used for copy move detection
Comparison of specific segmentation methods used for copy move detection
 
Despeckling of Sar Image using Curvelet Transform
 	  Despeckling of Sar Image using Curvelet Transform 	  Despeckling of Sar Image using Curvelet Transform
Despeckling of Sar Image using Curvelet Transform
 
Image Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine LearningImage Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine Learning
 
IRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through QuadtreeIRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

IRJET- A Survey on Image Forgery Detection and Removal

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1124 A SURVEY ON IMAGE FORGERY DETECTION AND REMOVAL Radika Krishnan1, Annamariya K S2, Blessy M D3, Neenu George4, Teena Davis5 1Assistant Professor, Department of Computer Science, Depaul Institute of Science and Technology Angamaly, Kerala, India 2,3,4,5Student of MCA, Department of Computer Science, Depaul Institute of Science and Technology Angamaly, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this paper, a survey is performed to study more about different techniques used to detect the image forgery. These methods are either based on global or local features. There is another method Robust Hashing for Image Authentication using P# and Local features. Here thehashisa combination of global and local features of an image. Four types of image forgeries, removal, insertion, and replacement of objects, and unusual color changes can be identified by this method. Threshold value determines the authenticity of the image. Hash performance is measured bythedistancemetrics. This method can be used to detect tampering image. Key Words: image forgery, hashing, authentication. 1. INTRODUCTION Today most of the people began to use different image processing techniques to make changes in the images for different purposes. Since it is not easy to differentiate with original image and processed images. The processing of images are called image forging. To identify such images different methods are developed.Imagehashingisoneofthe methods for image authentication. In this method a hash value is developed for every image we created. If an image is processed, even one bit of change in the input will change the output hash. The original image and processed image cannot be easily differentiated by humans but they will have small difference in the hash value generated. Hence the changes occurred can be identified. If one image has large difference in the hash value of another image, then they are not related. Sometimes image forgery leads to cybercrimes. So it is important to detect and avoid image forging. 2. LITERATURE REVIEW In recent years, many researchers have proposed many image hashing methods. These methodscanbeclassifiedinto two types: space domain methods and transform domain methods. Methods used in the space domain include histogram [1], singular value decomposition(SVD) [2], non- negative matrix factorization(NMF) [3-4] and random projections[5].Transforms used for generatingimagehashes include discrete wavelet transform (DWT) [6-7], discrete cosine transform (DCT) [8], Radon transform [9], Fourier- Mellin transform [10]. Xiang et al. [1] propose a robustimagehashingmethodbased on the fact that the shape of an image histogram is invariant to geometric deformation. Robustness and uniqueness of proposed hash function are investigated in detail by representing the histogram shape as the relative relations in the number of pixels among groups of two different bins. Itis found from extensive testing that the histogram based hash functionshasasatisfactoryperformancetovariousgeometric deformation, and is also robust to most common signal processing operations thanks to the use of Gaussian kernel low-pass filter in the preprocessing phase. In [2],Kozat et al. propose a new hashing algorithm employing transforms that are based on SVD (singular value decomposition).This algorithm construct a secondary image derived from the input image. From the secondary image we extract the final features whichcanbeusedasahashvalue.In this paper we use spectral matrix invariants as embodied by singular value decomposition. In [3], V.Monga et al. propose the use of non-negative matrix factorization(NMF)forimagehashing.Thisworkismotivated by the fact that standard-rank reduction technique such as QR, and SVD, produce low rang bases which don’trespectthe structure of original data. In [4], Tang et al. firstly the image re-scaled to fixed size and low-pass filtering is performed to produce a normalized matrix. The normalized matrix are pseudo randomly re- arranged to generate a secondary image, and then NMF is performed on it to generate robust image hash. Similarity between hashesismeasuredbyhammingdistancetampering can be detected by comparing hamming distance with predetermined threshold. In [5] M. Tagliasacchi et al, propose an image hashing algorithm based on compressive sensing principles which solves both the authentication and the tampering identification problems. The content user receives the image and uses the hash to estimate the mean square error distortion between the original and the received image. In [6], propose a method of decouple image hashing into feature extraction (intermediate hash) followed by data clustering (final hash). For any perceptually significant feature extractor, we propose polynomial-time heuristic clustering algorithm that automatically determine the final hash length needed to satisfy the distortion.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1125 In [7], a wavelet-based hashing scheme is proposed, which can tackle robustness, security and tamper detection issues. In [8], digital watermarks have been proposed for authentication of both audio data and still images and for integrity verification of visual multimedia. The watermark depends on a secret key and the original image. A special image digest functions are used that return same bit for the images derived from an original image and different bit for completely different images. Wu et al. [9] propose a print-scan resistant image hashing method based on Radon and wavelet transform. The Radon transformsan image to its luminance distribution,beforethe wavelet extracts the relationship of the different areas from luminance distribution. In [10], propose a new algorithm for generating image hash based on Fourier transform features and controlled randomization. The robustness of image hashing is considered as hypothesis testingproblemandtoevaluatethe performance under various image processing operations. In image processing, Zernike moments (ZMs) are widely used in many occasions because of their orthogonal rotation invariant features.ZernikemomentsareproposedbyZernike firstly in [11], and has been studied extensively ever since. Zernike moments have been most widely used in extracting the region based shape features of an image. In most of the research the magnitude of Zernikemomentsareusedandthe phase is ignored. In [12], Li et al. propose a new shape descriptor combining bolt magnitude and phase coefficients of ZMs, which is invariant to rotation 3. COMPARISON TABLE Advantages and disadvantages of different algorithm sl no Matching Algorithm Advantages Disadvantag es 1 Histogram based image hashing Robust and secure Misclassifica tion, 2 SVD Robustness and security 2 3 NMF Robust Moderate noise contaminatio n 4 Polynomial time heuristic clustering Authentication Insensitivity to relative scaling algorithm 5 Random projection Authentication Random projection 6 DWT Security High cost of computing, 7 Wavelet based hashing Robustness , security, tamper detection Complex in mathematica l formulas 8 DCT Used for misleading tool for hiding facts and evidence Not produce well results in image blurring and video frame reconstructi on 9 Random transform Robust, common content preserving processing, discriminable to changes Less speed because of number of comparison required 10 Fourier-mellin Security, robustness Difference in image properties cause limitations 11 Zernike moments Orthogonal rotation invariant Less retrival accuracy 12 Zernike moments Retrival accuracy, robust Object based approach 4. CONCLUSION Image forgery is one of the major problems in nowadays. There are different techniques to identify the original image from two similar images by using image hashing. It is necessary to produce robust and secure image hashes. For that different techniqueslike wavelet basedhashing,Zernike moments, Polynomial timeheuristicclusteringalgorithm etc. are used. In addition, further study is needed to enhance the robustness to more content-preserving manipulation and sensitivity of hashes to tampering in small regions involving fine details.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1126 REFERENCES [1] S. Xiang, H. J. Kim and J. Huang, Histogram-based image hashing scheme robust against geometric deformations, Proc. of the ACM Multimedia and Security Workshop, ACM Press, 2007, pp. 121-128. [2] S. S. Kozat, K. Mihcak and R. Venkatesan, Robust perceptual image hashingvia matrixinvariants,Proc.ofIEEE Conference on Image Processing (lCIP'04), Singapore, Oct. 24-27, 2004, pp. 3443-3446 . [3] V. Monga and M. K. Mihcak, Robust and secure image hashing via nonnegative matrix factorizations, IEEE Transactions on Information Forensics and Security, 2007, 2(3): 376-390. [4] Z. Tang, S. Wang, X. Zhang, W. Wei and S. Su, Robust image hashing for tamper detection using non-negative matrix factorization. Journal of Ubiquitous Convergenceand Technology, 2008, 2(): 18-26. [5] M. Tagliasacchi, G. Valenzise and S. Tubaro. Hash-based identification of sparse image tampering. IEEE Transactions on Image Process. 2009, 18( 1):2491-504. [6] V. Monga, A. Banerjee and B. L. Evans, A clustering based approach to perceptual imagehashing,IEEETransactionson Information Forensics and Security, 2006,1(): 68-79. [7] F. Ahmed, M.Y. Siyal and V. U. Abbas, A secure and robust hash-based scheme for image authentication, Signal Processing, 2010, 90(5): 14561470. [8] J. Fridrich and M. Goljan, Robust hash functions for digital watermarking, Proc. ofIEEEInternational Conference on Information Technology: Coding and Computing (ITCC'OO), Las Vergas, USA, Mar. 27-29,2000, pp. 178-183. [9] D. Wu, X. Zhou and X. Niu. A novel image hash algorithm resistant to print-scan, Signal Processing, 2009,89(2): 2415-2424. [10] A. Swaminathan, Y. Mao and M. Wu, Robust and secure image hashing, IEEE Transactions on Information Forensics and Security, 2006, 1 (2): 215-230. [11] F. Zernike, Beugungstheorie des schneidenverfahres und seiner verbesserten form, der phasenkontrastmethode, Physica, 1934, 1, pp.689-704. [12] S. Li, M.C. Lee, C.M. Pun, Complex Zernike moments features for shape-based image retrieval, IEEE Transactions On Systems, Ma, and Cybernetics-part A: Systems and Humans, 2009, 39(): 227-237.