SlideShare a Scribd company logo
1 of 11
Download to read offline
Research Scholar’s Conclave presentation
on
Digital Image Forgery Detection using
Salient Keypoint Selection
Presented By:
Nitish Kumar
Ph.D. Scholar
Dept. of Electronics and Communication
Under the Guidance of:
Dr. Toshanlal Meenpal
Introduction
• With the advancement of image editing techniques, authenticity and reliability of digital image
has become very challenging.
• Realistic visual effect can be achieved in such a way that forged images are visually
indistinguishable from real ones.
• Image forgery aims to deliver deceptive information through the image graphic content.
• Image forensics verify the authenticity, ownership, and copyright of an image and detect changes
to the original image.
Fig.1 Example of a forged image
Types of Image Forgery:
Image Forgery
Copy-move
Forgery
Image Splicing
Forgery
Image
Inpainting
Forgery
Fig.2 Types of image forgery
Clues of Image Forgery:
Table I. Forgery detection clues for different forgery techniques
Tampering
Clues
Copy-move Inpainting Splicing
Region Duplication Yes Yes No
Edge Anomaly
(Sharp Edges)
Yes No Yes
Edge Anomaly
(Blurred Edges)
Yes No Yes
Region Anomaly
(JPEG Double
Quantization)
No Yes Yes
Region Anomaly
(Lighting
inconsistency)
No No Yes
Region Anomaly
(Camera trace
inconsistency)
No No Yes
Proposed Copy-move Forgery Detection
Fig.3 Framework of proposed salient keypoint-based copy-move image forgery detection
Selection of Salient Keypoints
• Salient keypoints are selected by
ranking the keypoints based on 3
parameters.
1) Distinctiveness: How different
the keypoint is from the rest of
the keypoints in the image.
2) Detectability: How robustly the
keypoints can be detected under
viewpoint/lighting changes.
3) Repeatability: It refers to the
ability of keypoints to remain
invariant to various
transformations.
Fig.4 Visualization of reduction in number of keypoints
Results and Discussion
Fig.5 Comparison of number of keypoints for four
different images of size 512 x 512.
Fig.6 Detection of copy-move forgery on CoMoFoD dataset
where a) original image, b) forged image c) detection result
Cont..
Author Methods FPR Precision F1 Score
Hashmi et. al DyWT and SIFT 10.00 88.89 85.00
Ojeniyi et al. DCT and SURF 6.36 93.86 95.45
Niyishaka et al. DoG and ORB - 90.09 86.24
Liu et. al CKN 7.27 93.16 96.03
Soni et al. SURF and 2NN 8.4 - -
Proposed Salient SIFT and KAZE 3.6 96.22 94.87
Table II. Comparison of proposed method with existing
techniques on the MICC-F220 dataset.
Author Methods FPR Precision F1 Score
Malviya et. al Auto colour correlogram 16 95.65 93.62
Soni et al. LBP-HP 7.40 - -
Mahmood et al. SWT - 95.76 96.05
Niyishaka et. al Blob and BRISK 9 96.84 94.35
El Biach et al. Encoder-decoder - - 81.56
Proposed Salient SIFT and KAZE 6 97.90 95.73
Table III. Comparison of proposed method with existing
techniques on the CoMoFoD dataset.
Conclusion and Future Scope
• In this work keypoint-based copy–move forgery detection has been proposed
using SIFT and KAZE features.
• Salient keypoints are selected for reduction in number of keypoints.
• Proposed detection approach has been evaluated on CoMoFoD and MICC-F220
datasets and gives promising results under geometric transformations and common
post-processing operations.
• As a future work, detection of other image forgery approach can be proposed.
• Robust detection algorithm can also be proposed which can detect any kind of
image forgery.
References
[1] Zheng L, Zhang Y, Thing VL. A survey on image tampering and its detection in real-world photos. J Visual
Commun Image Represent. 2019;58:380–399. doi:10.1016/j.jvcir.2018.12.022.
[2] Hashmi MF, Anand V, Keskar AG. Copy-move image forgery detection using an efficient and robust method
combining un-decimated wavelet transform and scale invariant feature transform. Aasri Procedia. 2014; 9:84–
91.
[3] Niyishaka P, Bhagvati C. Digital image forensics technique for copy-move forgery detection using DOG and
ORB. International conference on computer vision and graphics; 2018. p.472–483.
[4] Niyishaka P, Bhagvati C. Copy-move forgery detection using image blobs and brisk feature. Multimedia
Tools Appl. 2020;79(35):26045–26059. doi:10.1007/s11042-020-09225-6.
[5] X. Niu, H. Han, S. Shan, and X. Chen, “Synrhythm: Learning a deep heart rate estimator from general to
specific,” in 2018 24th International Conference on Pattern Recognition (ICPR), pp. 3580–3585, IEEE, (2018).
[6] Mukherjee P, Lall B. Saliency and KAZE features assisted object segmentation. Image Vis Comput.
2017;61:82–97. Available from: https://www.sciencedirect.com/science/article/pii/S0262885617300537.
[7] Lowe DG. Object recognition from local scale-invariant features. Proceedings of the Seventh IEEE
International Conference on Computer Vision; 1999. Vol. 2, p. 1150–1157.
[8] Alcantarilla PF, Bartoli A, Davison AJ. KAZE features. In: Fitzgibbon A, Lazebnik S, Perona P, Sato Y,
Schmid C, editors. Computer vision eccv 2012. Berlin (Heidelberg): Springer; 2012. p. 214–227.
Image Forgery Detection

More Related Content

What's hot

Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing BasicsNam Le
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slidesSrinath Dhayalamoorthy
 
Fruit Disease Detection and Classification
Fruit Disease Detection and ClassificationFruit Disease Detection and Classification
Fruit Disease Detection and ClassificationIRJET Journal
 
The application of image enhancement in color and grayscale images
The application of image enhancement in color and grayscale imagesThe application of image enhancement in color and grayscale images
The application of image enhancement in color and grayscale imagesNisar Ahmed Rana
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial DomainDEEPASHRI HK
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxBasavaPrabhu14
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression modelslavanya marichamy
 
Image proccessing and its application
Image proccessing and its applicationImage proccessing and its application
Image proccessing and its applicationAshwini Awatare
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentationramya marichamy
 
Color fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingColor fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingAmna
 
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
CANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSINGCANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSING
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSINGkajikho9
 

What's hot (20)

Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing Basics
 
image enhancement
 image enhancement image enhancement
image enhancement
 
Cse image processing ppt
Cse image processing pptCse image processing ppt
Cse image processing ppt
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slides
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Fruit Disease Detection and Classification
Fruit Disease Detection and ClassificationFruit Disease Detection and Classification
Fruit Disease Detection and Classification
 
The application of image enhancement in color and grayscale images
The application of image enhancement in color and grayscale imagesThe application of image enhancement in color and grayscale images
The application of image enhancement in color and grayscale images
 
Image compression .
Image compression .Image compression .
Image compression .
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
 
Image proccessing and its application
Image proccessing and its applicationImage proccessing and its application
Image proccessing and its application
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Color fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingColor fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image Processing
 
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
CANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSINGCANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSING
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
 

Similar to Image Forgery Detection

researchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxresearchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxNiharikaDubey17
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Imagesiosrjce
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paperCharlie716895
 
Elucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentElucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentVIT-AP University
 
A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniquesijtsrd
 
Salient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdfSalient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdfSravaniSanapala2
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering DetectionIRJET Journal
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...journalBEEI
 
Image Forgery Detection Using Deep Neural Network
Image Forgery Detection Using Deep Neural NetworkImage Forgery Detection Using Deep Neural Network
Image Forgery Detection Using Deep Neural NetworkIRJET Journal
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationIIRindia
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...CSCJournals
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...journalBEEI
 
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURESRECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATUREScsandit
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmIJARIIT
 

Similar to Image Forgery Detection (20)

researchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxresearchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptx
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
G010245056
G010245056G010245056
G010245056
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paper
 
Elucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentElucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragment
 
A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniques
 
20120140502012
2012014050201220120140502012
20120140502012
 
20120140502012
2012014050201220120140502012
20120140502012
 
Salient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdfSalient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdf
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering Detection
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
 
Image Forgery Detection Using Deep Neural Network
Image Forgery Detection Using Deep Neural NetworkImage Forgery Detection Using Deep Neural Network
Image Forgery Detection Using Deep Neural Network
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image Segmentation
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
 
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURESRECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Image Forgery Detection

  • 1. Research Scholar’s Conclave presentation on Digital Image Forgery Detection using Salient Keypoint Selection Presented By: Nitish Kumar Ph.D. Scholar Dept. of Electronics and Communication Under the Guidance of: Dr. Toshanlal Meenpal
  • 2. Introduction • With the advancement of image editing techniques, authenticity and reliability of digital image has become very challenging. • Realistic visual effect can be achieved in such a way that forged images are visually indistinguishable from real ones. • Image forgery aims to deliver deceptive information through the image graphic content. • Image forensics verify the authenticity, ownership, and copyright of an image and detect changes to the original image. Fig.1 Example of a forged image
  • 3. Types of Image Forgery: Image Forgery Copy-move Forgery Image Splicing Forgery Image Inpainting Forgery Fig.2 Types of image forgery
  • 4. Clues of Image Forgery: Table I. Forgery detection clues for different forgery techniques Tampering Clues Copy-move Inpainting Splicing Region Duplication Yes Yes No Edge Anomaly (Sharp Edges) Yes No Yes Edge Anomaly (Blurred Edges) Yes No Yes Region Anomaly (JPEG Double Quantization) No Yes Yes Region Anomaly (Lighting inconsistency) No No Yes Region Anomaly (Camera trace inconsistency) No No Yes
  • 5. Proposed Copy-move Forgery Detection Fig.3 Framework of proposed salient keypoint-based copy-move image forgery detection
  • 6. Selection of Salient Keypoints • Salient keypoints are selected by ranking the keypoints based on 3 parameters. 1) Distinctiveness: How different the keypoint is from the rest of the keypoints in the image. 2) Detectability: How robustly the keypoints can be detected under viewpoint/lighting changes. 3) Repeatability: It refers to the ability of keypoints to remain invariant to various transformations. Fig.4 Visualization of reduction in number of keypoints
  • 7. Results and Discussion Fig.5 Comparison of number of keypoints for four different images of size 512 x 512. Fig.6 Detection of copy-move forgery on CoMoFoD dataset where a) original image, b) forged image c) detection result
  • 8. Cont.. Author Methods FPR Precision F1 Score Hashmi et. al DyWT and SIFT 10.00 88.89 85.00 Ojeniyi et al. DCT and SURF 6.36 93.86 95.45 Niyishaka et al. DoG and ORB - 90.09 86.24 Liu et. al CKN 7.27 93.16 96.03 Soni et al. SURF and 2NN 8.4 - - Proposed Salient SIFT and KAZE 3.6 96.22 94.87 Table II. Comparison of proposed method with existing techniques on the MICC-F220 dataset. Author Methods FPR Precision F1 Score Malviya et. al Auto colour correlogram 16 95.65 93.62 Soni et al. LBP-HP 7.40 - - Mahmood et al. SWT - 95.76 96.05 Niyishaka et. al Blob and BRISK 9 96.84 94.35 El Biach et al. Encoder-decoder - - 81.56 Proposed Salient SIFT and KAZE 6 97.90 95.73 Table III. Comparison of proposed method with existing techniques on the CoMoFoD dataset.
  • 9. Conclusion and Future Scope • In this work keypoint-based copy–move forgery detection has been proposed using SIFT and KAZE features. • Salient keypoints are selected for reduction in number of keypoints. • Proposed detection approach has been evaluated on CoMoFoD and MICC-F220 datasets and gives promising results under geometric transformations and common post-processing operations. • As a future work, detection of other image forgery approach can be proposed. • Robust detection algorithm can also be proposed which can detect any kind of image forgery.
  • 10. References [1] Zheng L, Zhang Y, Thing VL. A survey on image tampering and its detection in real-world photos. J Visual Commun Image Represent. 2019;58:380–399. doi:10.1016/j.jvcir.2018.12.022. [2] Hashmi MF, Anand V, Keskar AG. Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. Aasri Procedia. 2014; 9:84– 91. [3] Niyishaka P, Bhagvati C. Digital image forensics technique for copy-move forgery detection using DOG and ORB. International conference on computer vision and graphics; 2018. p.472–483. [4] Niyishaka P, Bhagvati C. Copy-move forgery detection using image blobs and brisk feature. Multimedia Tools Appl. 2020;79(35):26045–26059. doi:10.1007/s11042-020-09225-6. [5] X. Niu, H. Han, S. Shan, and X. Chen, “Synrhythm: Learning a deep heart rate estimator from general to specific,” in 2018 24th International Conference on Pattern Recognition (ICPR), pp. 3580–3585, IEEE, (2018). [6] Mukherjee P, Lall B. Saliency and KAZE features assisted object segmentation. Image Vis Comput. 2017;61:82–97. Available from: https://www.sciencedirect.com/science/article/pii/S0262885617300537. [7] Lowe DG. Object recognition from local scale-invariant features. Proceedings of the Seventh IEEE International Conference on Computer Vision; 1999. Vol. 2, p. 1150–1157. [8] Alcantarilla PF, Bartoli A, Davison AJ. KAZE features. In: Fitzgibbon A, Lazebnik S, Perona P, Sato Y, Schmid C, editors. Computer vision eccv 2012. Berlin (Heidelberg): Springer; 2012. p. 214–227.