SlideShare a Scribd company logo
ISSN: 2277 – 9043
                    International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                   Volume 1, Issue 5, July 2012


                 DWT Based Copy-Move Image Forgery
                             Detection
                                             Preeti Yadav ,Yogesh Rathore ,Aarti Yadu


 
                                                                                         II. LITERATURE REVIEW
 Abstract— In an age with digital media, it is no longer true that
 seeing is believing.In addition, digital forgeries, can be                    Since the key characteristics of Copy-Move forgery is
 indistinguishable from authentic photographs. In a copy-move           that the copied part and the pasted part are in the same image,
 image forgery, a part of an image is copied and then pasted on a       one method to detect this forgery is exhaustive search, but it
 different location within the same image .In this paper an             is computationally complex and more time is needed for
 improved algorithm based on Discrete Wavelet Transform                 detection. A. C. Popescu and H. Farid proposed a similar
 (DWT)is used to detect such cloning forgery. In this technique
                                                                        detection method [2], in which the image blocks are reduced
 DWT (Discrete Wavelet Transform) is applied to the input
 image to yield a reduced dimensional representation.After that         in dimension by using Principal Component Analysis (PCA).
 compressed image is divided into overlapping blocks. These             But the efficiency of detection algorithm was not good,
 blocks are then sorted and duplicated blocks are identified. Due       because, blocks are directly extracted from the original
 to DWT usage, detection is first carried out on lowest level           image, resulting in a large number of blocks. D. Soukal,
 image representation so this Copy-Move detection process               proposes DCT based copy-move forgery detection in a single
 increases accuracy of detection process.                               image, In which The image blocks are represented by
                                                                        quantized DCT (Discrete Cosine Transform) coefficients,
 Keywords- Digital Tempering,DWT Copy-Move forgery.                     and a lexicographic sort is adopted to detect the duplicated
                                                                        image blocks [3]. B.L.Shivakumar and Dr. S.Santhosh
                            I INTRODUCTION
                                                                        Baboo have proposed copy-move forgery detection method
   Copy-Move forgery is performed with the intention to                 based on SURF, which detects duplication region with
make an object ―disappear‖ from the image by covering it with           different size. Experimental result shows that the proposed
a small block copied from another part of the same image[1].            method can detect copy-move forgery with minimum false
                                                                        match for images with high resolution[4] . To increase the
Usually, such an image tampering is done with the aim of                speed of operation process many researchers use blocking
either hiding some image details, in which case a background            approaches [5]. G.Li, Q.Wu, D.Tu developed a sorted
is duplicated, or adding more details. Whichever the case,              neighborhood method based on DWT (Discrete Wavelet
image integrity is lost.Because the copied segments come                Transform) and SVD (Singular Value Decomposition) [6].In
from the same image, the color palette, noise components,               this method the computation of SVD takes lot of time and it
dynamic range and the other properties will be compatible               is computationally complex.
with the rest of the image, thus it is very difficult for a human
eye to detect. Sometimes, even it makes harder for technology                            III. PROPOSED METHOD
to detect the forgery, if the image is retouched with the tools
                                                                               In this proposed method an image is scanned from the
that are available.
                                                                        upper left corner to the lower right corner while sliding a B×B
                                                                        block. The DWT transform is calculated For each block, the
                                                                        DWT coefficients are stored as one row in the matrix A. The
                                                                        matrix will have (M+B+1)(N–B+1) rows and B×B
                                                                        columns.The rows of A are lexicographically sorted . The
                                                                        DWT coefficients for each block are now being compared
                                                                        instead of the pixel representation, if two successive rows of
                                                                        the sorted matrix A are found, the algorithm stores the
                                                                        positions of the matching blocks in a separate list B,and
                                                                        increments a shift-vector counter C. For all normalized shift
 Figure 1. Example of Copy-Move forgery (a) original image
                                                                        vectors, the matching blocks that contributed to that specific
 (b) tampered image                                                     shift vector are colored with the same color and thus
                                                                        identified as segments that might have been copied and
                                                                        moved.
                                                                           The Proposed method of copy-move forgery detection has
                                                                        following main parts.
    Manuscript received July, 2012
                                                                        1. Discrete Wavelet Transform
     Preeti Yadav:, Final year M-Tech CSE, CSVTU Bhilai,RITEE Raipur,   2. Lexicographic Sorting
 (e-mail:preetiyadu@yahoo.co.in).Raipur, India,Mobile-9827974272        3. Shift Vector Calculation
    Yogesh Rathore:, :, Department of CSE, CSVTU Bhilai,RITEE Raipur,   4. Neighbor block matching
 (e-mail:yogeshrathore23@gmail.com).Raipur, India,le-Mobi9301058533.
    Aarti Yadu, Department of IT, CSVTU Bhilai,RITEE Raipur,
 (e-mail:artiyadu@gmail.com).Raipur, India.                             3.1 Discrete Wavelet Transform
                                                                                                                                    56
                                                    All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                  International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                 Volume 1, Issue 5, July 2012

   Wavelet decomposition of the images is used due to its            s = (s1, s2) = (x1 – y1, x2 –y2).
inherent multiresolution characteristics. The basic idea of
using Discrete Wavelet Transform is to reduce the size of the        Because the shift vectors –s and s correspond to the same
image at each level, e.g., a square image of size 2j ×2j pixels at   shift, the shift vectors s are normalized[9].
level L reduces to size 2j/2 × 2j/2 pixels at level L+1. At each
level, the image is decomposed into four sub images. The sub         The normalized shift vectors s(1),s(2), …, s(K), are those
images are labeled LL,LH, HL and HH, The notation LH, HL             whose occurrence exceeds a user-specified threshold T:
and HH correspond to the vertical, horizontal and diagonal           C(s(g)) > T for all g = 1, …, K.
components of the image respectively. LL corresponds to the
coarse level coefficients or the approximation image. This           3.4 Neighbor Shift Matching
image(LL) is used for further decomposition.. These sub
                                                                        For a suspected pair of blocks, the system compares
images can be combined together to restore the previous
                                                                     features of nearby blocks of both of the blocks of a pair which
image which was decomposed.
                                                                     are at the same vector distance from the corresponding
 Below figure shows the image pyramid[7].Level-0 image is            block.Neighbor Shift value is calculated by subtracting two
used for matching of blocks and then these matched blocks            equivalent feature vectors. Shift vector of the entire suspected
are carried to the next higher level. Final match is performed       duplicate region will be same. Two copied and then moved
on the original image itself.                                        areas will yield some pair of identical features. The same shift
                                                                     vector will be formed by this. For a particular number of
                                                                     neighbors this shift vector will be checked . Same shift vector
                                                                     will be showing the duplicated region.
                                                                                        IV. EXPERIMENTAL RESULT




                                                                               (a)                   (b)                       (c)

                                                                      Figure 3. Forgery detection result (16*16)(a) original image(b) tampered
                                                                                             image (c) detection result




                   Figure 2. Image pyramid

3.2 Lexicographic Sort
The lexicographic or lexicographical order, (also known
                                                                               (a)                  (b)                 (c)
as lexical order, dictionary order, alphabetical order or
lexicographic(al) product), is a generalization of the way the
                                                                     Figure 4 Copy-Move Forgery detection result(48*48) (a) original image(b)
alphabetical order of words is based on the alphabetical order       tampered image (c) detection result
of letters.
                                                                     TABLE I. COMPARISIONWITH DIFFERENT SIZED COPY-MOVE
 An important property of the lexicographical order is that it       IMAGE REGION
preserves well-orders, that is, if I and J are well-ordered sets,                Copy-Move Region Matched
then the product set I ×J with the lexicographical order is also     Image Size                   Region     Accuracy
well-ordered[8].                                                                 Size     No of   No of      in %
                                                                                          Pixels  Pixels
In this step lexicographic sorting is performed on the rows of       256×256     16×16    256     256        100%
matrix A. if two consecutive rows of the sorted matrix A are         256×256     48×48    2304    2208       96%
found, the algorithm stores the positions of the identical
blocks in a separate list B and increments a shift-vector
counter C.                                                                                    V. CONCLUSION

                                                                     In this paper an algorithm for detecting copy move forgery
3.3 Shift Vector Calculation                                         using Discrete Wavelet Transform (DWT) is proposed,.Our
                                                                     algorithm has lower computational complexity, since
  Let (x1, x2) and (y1, y2) be the positions of the two              exhaustive search for identical blocks is performed only on
matching blocks. The shift vector s between the two                  the image at the lowest resolution. In future , I would like to
matching blocks is calculated as                                     apply Principal Component Analysis, PCA, to the feature

                                                                                                                                            57
                                               All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                    International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                   Volume 1, Issue 5, July 2012
vector to reduce its dimension, so time complexity will be
reduced. The algorithm gave best performance for detection
of small size copy move forgery.

                                                                                              Ms Arti Yadu has done B.E. in Information
                           REFERENCES                                         Technology from Chhatisgarh Swami Vivekanand University
                                                                              Bhilai,C.G..Her area of Interest is Artificial Intelligence and Network
[1] B.L.Shivakumar,Lt. Dr. S.Santhosh Baboo ‖Detecting Copy-ove Forgery       Security.
in Digital Images: A Survey and Analysis of Current ethods ―Global Journal
of Computer Science and Technology Vol. 10 Issue 7 Ver. 1.0 September
2010

[2] A.C.Popescu and H.Farid, ―Exposing digital forgeries by detecting
duplicated image regions,‖ Dartmouth College, Hanover, New Hampshire,
USA: TR2004-515, 2004.

[3] J. Fridrich, D. Soukal, and J. Lukas, ―Detection of copymove forgery in
digital images,‖ Proceedings of the Digital Forensic Research Workshop.
Cleveland OH, USA, 2003

[4] B.L.Shivakumar and Lt. Dr. S.Santhosh Baboo ―Detection of Region
Duplication Forgery in Digital Images Using SURF‖ IJCSI International
Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011

[5]Sarah A. Summers, Sarah C. Wahl ―Multimedia Security and Forensics
Authentication of Digital images‖http: // cs.uccs.edu /~cs525/ studentproj
/proj52006 / sasummer/doc/cs525projsummersWahl.doc

[6] G.Li, Q.Wu, D.Tu, and Shaojie Sun, ―A sorted neighborhood approach
for detecting duplicated regions in image forgeries based on DWT and
SVD,‖ IEEE International Conference on Multimedia & Expo, 2007.

 [7] Saiqa khan,Arun kulkarni“Reduced Time Complexity for Detection of
Copy-Move Forgery Using Discrete Wavelet Transform‖International
Journal of Computer Applications Volume 6– No.7, September 2010

[8] Vivek Kumar Singh and R.C. Tripathi‖ Fast and Efficient Region
Duplication Detection in Digital Images Using Sub-Blocking Method
―International Journal of Advanced Science and Technology Vol. 35,
October, 2011.

[9] Rafael C. Gonzalez, Richard E. Woods, Steven L.Eddins,―Digital Image
Processing using MATLAB‖,Second Edition, Pearson Publications, 2004.

[10] Preeti Yadav,Yogesh Rathore‖Detection of Copy-M ove Forgery of
Images Using DWT‖ International Journal on Computer Science and
Engineering (IJCSE) Vol 4 April 2012.



                         AUTHORS PROFILE




                     Mrs Preeti Yadav is Assistant Professor           in
Department of Computer Science and Engineering at MM ollege of
Technology, Raipur, C.G. ,India.she is Pursuing Master's degree(M-Tech 4th
semester) in Computer Science From Chhattisgarh swami vivekanand
University C.G.,India. Currently. Her research interest includes: Image
Processing and Cryptography,Information Systems Security.




                   Mr. Yogesh Rathore is a Sr. Lecturer in Department of
Computer Science and Engineering, Raipur Institute of Technology, Raipur
(c.g.) . He is M-Tech in Computer Science .His area of interest include
Digital image processing & Computer Graphics.




                                                                                                                                                        58
                                                     All Rights Reserved © 2012 IJARCSEE

More Related Content

What's hot

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation Method
Editor IJCATR
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
Ashish Kumar
 

What's hot (19)

Image Resolution Enhancement Using Undecimated Double Density Wavelet Transform
Image Resolution Enhancement Using Undecimated Double Density Wavelet TransformImage Resolution Enhancement Using Undecimated Double Density Wavelet Transform
Image Resolution Enhancement Using Undecimated Double Density Wavelet Transform
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Impulse noise removal in digital images
Impulse noise removal in digital imagesImpulse noise removal in digital images
Impulse noise removal in digital images
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation Method
 
IT6005 digital image processing question bank
IT6005   digital image processing question bankIT6005   digital image processing question bank
IT6005 digital image processing question bank
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
 
42 128-1-pb
42 128-1-pb42 128-1-pb
42 128-1-pb
 
H0545156
H0545156H0545156
H0545156
 
Ct31628631
Ct31628631Ct31628631
Ct31628631
 
E017263040
E017263040E017263040
E017263040
 
Gray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity MeasuresGray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity Measures
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
It 603
It 603It 603
It 603
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
A Novel Method for Image Enhancement
A Novel Method for Image EnhancementA Novel Method for Image Enhancement
A Novel Method for Image Enhancement
 
Hh3114071412
Hh3114071412Hh3114071412
Hh3114071412
 
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. pptImage segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
 
F0533134
F0533134F0533134
F0533134
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 

Similar to 56 58

Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
CSCJournals
 

Similar to 56 58 (20)

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Different Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewDifferent Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical Review
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Dd25624627
Dd25624627Dd25624627
Dd25624627
 
Gadljicsct955398
Gadljicsct955398Gadljicsct955398
Gadljicsct955398
 
Ijetr011837
Ijetr011837Ijetr011837
Ijetr011837
 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...
 
A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...
 
Quality assessment of image fusion
Quality assessment of image fusionQuality assessment of image fusion
Quality assessment of image fusion
 
H017416670
H017416670H017416670
H017416670
 
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSIONINFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
 
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESA HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
 
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 

More from Ijarcsee Journal (20)

130 133
130 133130 133
130 133
 
122 129
122 129122 129
122 129
 
116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
99 103
99 10399 103
99 103
 
93 98
93 9893 98
93 98
 
88 92
88 9288 92
88 92
 
82 87
82 8782 87
82 87
 
78 81
78 8178 81
78 81
 
73 77
73 7773 77
73 77
 
65 72
65 7265 72
65 72
 
58 64
58 6458 64
58 64
 
52 57
52 5752 57
52 57
 
46 51
46 5146 51
46 51
 
41 45
41 4541 45
41 45
 
36 40
36 4036 40
36 40
 
28 35
28 3528 35
28 35
 
24 27
24 2724 27
24 27
 
19 23
19 2319 23
19 23
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 

56 58

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 DWT Based Copy-Move Image Forgery Detection Preeti Yadav ,Yogesh Rathore ,Aarti Yadu  II. LITERATURE REVIEW Abstract— In an age with digital media, it is no longer true that seeing is believing.In addition, digital forgeries, can be Since the key characteristics of Copy-Move forgery is indistinguishable from authentic photographs. In a copy-move that the copied part and the pasted part are in the same image, image forgery, a part of an image is copied and then pasted on a one method to detect this forgery is exhaustive search, but it different location within the same image .In this paper an is computationally complex and more time is needed for improved algorithm based on Discrete Wavelet Transform detection. A. C. Popescu and H. Farid proposed a similar (DWT)is used to detect such cloning forgery. In this technique detection method [2], in which the image blocks are reduced DWT (Discrete Wavelet Transform) is applied to the input image to yield a reduced dimensional representation.After that in dimension by using Principal Component Analysis (PCA). compressed image is divided into overlapping blocks. These But the efficiency of detection algorithm was not good, blocks are then sorted and duplicated blocks are identified. Due because, blocks are directly extracted from the original to DWT usage, detection is first carried out on lowest level image, resulting in a large number of blocks. D. Soukal, image representation so this Copy-Move detection process proposes DCT based copy-move forgery detection in a single increases accuracy of detection process. image, In which The image blocks are represented by quantized DCT (Discrete Cosine Transform) coefficients, Keywords- Digital Tempering,DWT Copy-Move forgery. and a lexicographic sort is adopted to detect the duplicated image blocks [3]. B.L.Shivakumar and Dr. S.Santhosh I INTRODUCTION Baboo have proposed copy-move forgery detection method Copy-Move forgery is performed with the intention to based on SURF, which detects duplication region with make an object ―disappear‖ from the image by covering it with different size. Experimental result shows that the proposed a small block copied from another part of the same image[1]. method can detect copy-move forgery with minimum false match for images with high resolution[4] . To increase the Usually, such an image tampering is done with the aim of speed of operation process many researchers use blocking either hiding some image details, in which case a background approaches [5]. G.Li, Q.Wu, D.Tu developed a sorted is duplicated, or adding more details. Whichever the case, neighborhood method based on DWT (Discrete Wavelet image integrity is lost.Because the copied segments come Transform) and SVD (Singular Value Decomposition) [6].In from the same image, the color palette, noise components, this method the computation of SVD takes lot of time and it dynamic range and the other properties will be compatible is computationally complex. with the rest of the image, thus it is very difficult for a human eye to detect. Sometimes, even it makes harder for technology III. PROPOSED METHOD to detect the forgery, if the image is retouched with the tools In this proposed method an image is scanned from the that are available. upper left corner to the lower right corner while sliding a B×B block. The DWT transform is calculated For each block, the DWT coefficients are stored as one row in the matrix A. The matrix will have (M+B+1)(N–B+1) rows and B×B columns.The rows of A are lexicographically sorted . The DWT coefficients for each block are now being compared instead of the pixel representation, if two successive rows of the sorted matrix A are found, the algorithm stores the positions of the matching blocks in a separate list B,and increments a shift-vector counter C. For all normalized shift Figure 1. Example of Copy-Move forgery (a) original image vectors, the matching blocks that contributed to that specific (b) tampered image shift vector are colored with the same color and thus identified as segments that might have been copied and moved. The Proposed method of copy-move forgery detection has following main parts. Manuscript received July, 2012 1. Discrete Wavelet Transform Preeti Yadav:, Final year M-Tech CSE, CSVTU Bhilai,RITEE Raipur, 2. Lexicographic Sorting (e-mail:preetiyadu@yahoo.co.in).Raipur, India,Mobile-9827974272 3. Shift Vector Calculation Yogesh Rathore:, :, Department of CSE, CSVTU Bhilai,RITEE Raipur, 4. Neighbor block matching (e-mail:yogeshrathore23@gmail.com).Raipur, India,le-Mobi9301058533. Aarti Yadu, Department of IT, CSVTU Bhilai,RITEE Raipur, (e-mail:artiyadu@gmail.com).Raipur, India. 3.1 Discrete Wavelet Transform 56 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 Wavelet decomposition of the images is used due to its s = (s1, s2) = (x1 – y1, x2 –y2). inherent multiresolution characteristics. The basic idea of using Discrete Wavelet Transform is to reduce the size of the Because the shift vectors –s and s correspond to the same image at each level, e.g., a square image of size 2j ×2j pixels at shift, the shift vectors s are normalized[9]. level L reduces to size 2j/2 × 2j/2 pixels at level L+1. At each level, the image is decomposed into four sub images. The sub The normalized shift vectors s(1),s(2), …, s(K), are those images are labeled LL,LH, HL and HH, The notation LH, HL whose occurrence exceeds a user-specified threshold T: and HH correspond to the vertical, horizontal and diagonal C(s(g)) > T for all g = 1, …, K. components of the image respectively. LL corresponds to the coarse level coefficients or the approximation image. This 3.4 Neighbor Shift Matching image(LL) is used for further decomposition.. These sub For a suspected pair of blocks, the system compares images can be combined together to restore the previous features of nearby blocks of both of the blocks of a pair which image which was decomposed. are at the same vector distance from the corresponding Below figure shows the image pyramid[7].Level-0 image is block.Neighbor Shift value is calculated by subtracting two used for matching of blocks and then these matched blocks equivalent feature vectors. Shift vector of the entire suspected are carried to the next higher level. Final match is performed duplicate region will be same. Two copied and then moved on the original image itself. areas will yield some pair of identical features. The same shift vector will be formed by this. For a particular number of neighbors this shift vector will be checked . Same shift vector will be showing the duplicated region. IV. EXPERIMENTAL RESULT (a) (b) (c) Figure 3. Forgery detection result (16*16)(a) original image(b) tampered image (c) detection result Figure 2. Image pyramid 3.2 Lexicographic Sort The lexicographic or lexicographical order, (also known (a) (b) (c) as lexical order, dictionary order, alphabetical order or lexicographic(al) product), is a generalization of the way the Figure 4 Copy-Move Forgery detection result(48*48) (a) original image(b) alphabetical order of words is based on the alphabetical order tampered image (c) detection result of letters. TABLE I. COMPARISIONWITH DIFFERENT SIZED COPY-MOVE An important property of the lexicographical order is that it IMAGE REGION preserves well-orders, that is, if I and J are well-ordered sets, Copy-Move Region Matched then the product set I ×J with the lexicographical order is also Image Size Region Accuracy well-ordered[8]. Size No of No of in % Pixels Pixels In this step lexicographic sorting is performed on the rows of 256×256 16×16 256 256 100% matrix A. if two consecutive rows of the sorted matrix A are 256×256 48×48 2304 2208 96% found, the algorithm stores the positions of the identical blocks in a separate list B and increments a shift-vector counter C. V. CONCLUSION In this paper an algorithm for detecting copy move forgery 3.3 Shift Vector Calculation using Discrete Wavelet Transform (DWT) is proposed,.Our algorithm has lower computational complexity, since Let (x1, x2) and (y1, y2) be the positions of the two exhaustive search for identical blocks is performed only on matching blocks. The shift vector s between the two the image at the lowest resolution. In future , I would like to matching blocks is calculated as apply Principal Component Analysis, PCA, to the feature 57 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 vector to reduce its dimension, so time complexity will be reduced. The algorithm gave best performance for detection of small size copy move forgery. Ms Arti Yadu has done B.E. in Information REFERENCES Technology from Chhatisgarh Swami Vivekanand University Bhilai,C.G..Her area of Interest is Artificial Intelligence and Network [1] B.L.Shivakumar,Lt. Dr. S.Santhosh Baboo ‖Detecting Copy-ove Forgery Security. in Digital Images: A Survey and Analysis of Current ethods ―Global Journal of Computer Science and Technology Vol. 10 Issue 7 Ver. 1.0 September 2010 [2] A.C.Popescu and H.Farid, ―Exposing digital forgeries by detecting duplicated image regions,‖ Dartmouth College, Hanover, New Hampshire, USA: TR2004-515, 2004. [3] J. Fridrich, D. Soukal, and J. Lukas, ―Detection of copymove forgery in digital images,‖ Proceedings of the Digital Forensic Research Workshop. Cleveland OH, USA, 2003 [4] B.L.Shivakumar and Lt. Dr. S.Santhosh Baboo ―Detection of Region Duplication Forgery in Digital Images Using SURF‖ IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011 [5]Sarah A. Summers, Sarah C. Wahl ―Multimedia Security and Forensics Authentication of Digital images‖http: // cs.uccs.edu /~cs525/ studentproj /proj52006 / sasummer/doc/cs525projsummersWahl.doc [6] G.Li, Q.Wu, D.Tu, and Shaojie Sun, ―A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD,‖ IEEE International Conference on Multimedia & Expo, 2007. [7] Saiqa khan,Arun kulkarni“Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform‖International Journal of Computer Applications Volume 6– No.7, September 2010 [8] Vivek Kumar Singh and R.C. Tripathi‖ Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method ―International Journal of Advanced Science and Technology Vol. 35, October, 2011. [9] Rafael C. Gonzalez, Richard E. Woods, Steven L.Eddins,―Digital Image Processing using MATLAB‖,Second Edition, Pearson Publications, 2004. [10] Preeti Yadav,Yogesh Rathore‖Detection of Copy-M ove Forgery of Images Using DWT‖ International Journal on Computer Science and Engineering (IJCSE) Vol 4 April 2012. AUTHORS PROFILE Mrs Preeti Yadav is Assistant Professor in Department of Computer Science and Engineering at MM ollege of Technology, Raipur, C.G. ,India.she is Pursuing Master's degree(M-Tech 4th semester) in Computer Science From Chhattisgarh swami vivekanand University C.G.,India. Currently. Her research interest includes: Image Processing and Cryptography,Information Systems Security. Mr. Yogesh Rathore is a Sr. Lecturer in Department of Computer Science and Engineering, Raipur Institute of Technology, Raipur (c.g.) . He is M-Tech in Computer Science .His area of interest include Digital image processing & Computer Graphics. 58 All Rights Reserved © 2012 IJARCSEE