SlideShare a Scribd company logo
1
Digital Image Forgery
Detection
2
Presentation Division
Introduction
Forgery
Detection
Region
Duplication
Conclusion
 Digital Image
Forgery
Detection
 Types of
Forgery
 Forgery
Detection
Mechanisms
 High Precision
Rotation Angle
Estimation For
Copy Move.
 Explaination
 Rotation Angle
Calculation
 Variance
Estimation
 Algorithm
 Discrete
Cosine
Transform
 Walsh
Transform
 Hybrid
Wavelet
Transform
 Results
 Future Works
 References
3
Digital Image Forgery Detection
 Alteration of the semantic components of a digital
image.
 Removing Contents from the image
 Adding Data to the image
 Types of Forgery
 Image Retouching
 Image Splicing (Copy-Paste)
 Image Cloning (Copy-Move)
4
Image Retouching
 One of the oldest types of image forgery
 Image features are tampered with.
 Used to enhance or reduce digital image features.
 Considered less dangerous type of image forgery.
5
Image Splicing (Copy-Paste)
 Fragments of 2 or more images are combined to form an image.
 This operation is fundamental in digital photo montaging and in turn is a
mechanism for image forgery creation.
 Image splicing technique may change the visual message of digital images
more aggressively than image retouching.
6
Image Cloning (Copy-Move)
 Considered as a special case of image splicing, where the tampering occurs
within a single image and no need for multiple images.
 Part of the image is copied and then pasted in a desired location within the
same image.
 The purpose of such tampering is to duplicate or conceal a certain object in
that image.
7
Image Cloning
 Blurring is usually used to reduce the expected irregularity along the border
of the pasted regions.
 The similarity of texture, color, noise and other information inside the image
make it very difficult to detect this kind of tampering via visual inspection.
 Moreover, performing of post-processing operations such as blurring, adding
noise and JPEG compression or geometric operations such as scaling, shifting
and rotation increase the hardness of detection task.
8
Forgery Detection Mechanisms
 Can be Classified into Two Types
 Active Methods
 Passive Methods
 Active Methods
 Hidden Information inside the Digital Image.
 Done at the time of Data Acquisition or before disseminated
to the public.
 Embedded information can be used to identify the source of
such image or to detect possible modification to that image.
9
Forgery Detection Mechanisms
(Active Methods)
 Two Major Types
 Digital Signature
 Digital Watermarking
10
Forgery Detection Mechanisms
(Passive Methods)
 Use traces left by the processing steps in different phases of acquisition and
storage of digital images.
 These traces can be treated as a fingerprint of the image source device.
 Passive methods work in the absence of protecting techniques.
 They do not use any pre-image distribution information inserted into digital
image.
 They work by analyzing the binary information of digital image in order to
detect forgery traces, if any
 Limitation is the number of false positives.
11
High Precision Rotation Angle Estimation for
Rotated Images
 Paper addresses the detection of “copy-move”(cloning) technique
 As discussed before cloning detection becomes harder when the forger uses
geometric alterations like scaling, rotation & shifting.
 Particularly addresses the Rotation transformation.
 This paper proposes a novel blind image rotation detection algorithm with
high precision rotation angle estimation
12
 S, t=pixel coordinates in the rotated image I.
 𝜑 = weighted value.
𝑖′
= 𝑖𝑐𝑜𝑠 𝜃 − 𝑗𝑠𝑖𝑛 𝜃
𝑗′
= 𝑖𝑠𝑖𝑛𝜃 + 𝑗𝑐𝑜𝑠 𝜃
I= Original image
I’=Intermediate Image
I”= Rotated Image
𝐼𝑠,𝑡
"
=
𝑛=−𝑁
𝑁
𝑚=−𝑁
𝑁
𝜑(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚 )𝑰′(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚
High Precision Rotation Angle Estimation for
Rotated Images
13
 α = horizontal distance rotated image I′′ & intermediate image I′
 β = vertical distance.
𝛼2
= (pcosθ − 𝑓𝑙𝑜𝑜𝑟(𝑝𝑐𝑜𝑠𝜃) + 𝑅)2
𝛽2
= (𝑞𝑠𝑖𝑛θ − 𝑓𝑙𝑜𝑜𝑟(𝑞𝑠𝑖𝑛𝜃) + 𝑆)2
R and S are constant(translation)
High Precision Rotation Angle Estimation for
Rotated Images
14
𝑉𝑎𝑟 𝑋 = 𝐸[ 𝑋 − 𝜇 2
]
𝑉𝑎𝑟 𝑎𝑋 + 𝑏𝑌 = 𝑎2 𝑉𝑎𝑟 𝑋 + 𝑏2 𝑉𝑎𝑟(𝑌)
𝐼𝑠,𝑡
"
=
𝑛=−𝑁
𝑁
𝑚=−𝑁
𝑁
𝜑(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚 )𝑰′(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚
For a single pixel, we have:
𝐼𝑠,𝑡
"
≈
𝑛=0
1
𝑚=0
1
𝜑(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚 )𝑰′(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚
High Precision Rotation Angle Estimation for
Rotated Images
15
 Plot of horizontal distance vector and
its spectrum at 𝜃 = 300.
 Plot of peak frequency of distance vector
𝛼2
against all 𝜃 𝜖 [00
− 450
]. Frequency is
normalized to [0,1].
High Precision Rotation Angle Estimation for
Rotated Images
16
 Algorithm of the approach
High Precision Rotation Angle Estimation for
Rotated Images
17
Resolution Total Images Correct Images Correct Rate
10
500 486 97.2%
0.80
500 480 96.0%
0.60 500 471 94.2%
0.40 500 459 91.8%
0.20
500 438 87.6%
High Precision Rotation Angle Estimation for
Rotated Images
18
 Experiment results. 1st column: three images rotated at 50
, 250
, 450
respectively;
2nd column: theoretical pixel variance spectrum for the rotated images; 3rd
column: actual pixel variance spectrum for the rotated images.
High Precision Rotation Angle Estimation for
Rotated Images
19
 Conclusion
 In this paper, propose a blind image rotation angle estimation
method is proposed by exploring the periodicity of pixel variance
of rotated images.
 Experiment results show that this method works well for rotation
angles larger than 50
, but not as good for smaller rotation angles.
 The method can be used in areas like copy-paste image forgery
detection. In the future, the author plans to modify the algorithm
to improve the correct rate of small rotation angle estimation.
High Precision Rotation Angle Estimation for
Rotated Images
20
Region Duplication Forgery Detection
using Hybrid Wavelet Transforms
21
Region Duplication Forgery Detection using
Hybrid Wavelet Transforms
 Starts by dividing the M×N suspicious image into small overlapping blocks.
 This step is achieved by sliding a window of size B×B from the upper left
corner to the lower right corner one pixel each time.
 The quantized DCT coefficients are extracted from each block and used to
represent the features of these blocks.
 The quantized DCT coefficients are stored as one row in a matrix A of (M-B+1)
× (N-B+1) rows and B× B columns, where B× B is the block size.
 Two identical rows in the matrix A, correspond to two identical blocks in the
suspicious image.
Discrete Cosine Transforms
22
Region Duplication Forgery Detection
using Hybrid Wavelet Transforms
Hadamard Walsh Transforms
The Product of a Boolean Function and a Walsh Matrix is a Walsh Spectrum
23
Region Duplication Forgery Detection
using Hybrid Wavelet Transforms
 Example of Copy-Move Forgery, (a) Original Image (b) Forged Image
24
Thank you
25

More Related Content

What's hot

Image recognition
Image recognitionImage recognition
Image recognition
Aseed Usmani
 
Image pre processing
Image pre processingImage pre processing
Image pre processingAshish Kumar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Spatial domain and filtering
Spatial domain and filteringSpatial domain and filtering
Spatial domain and filtering
University of Potsdam
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
kirupasuchi1996
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic science
venati munishareddy
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2
Surabhi Ks
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
Gautam Saxena
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Python
ijtsrd
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
ijtsrd
 
Content Based Image Retrieval
Content Based Image Retrieval Content Based Image Retrieval
Content Based Image Retrieval
Swati Chauhan
 
Fundamental steps in image processing
Fundamental steps in image processingFundamental steps in image processing
Fundamental steps in image processing
PremaPRC211300301103
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
Kalyan Acharjya
 
Image segmentation
Image segmentation Image segmentation
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
Inamul Hossain Imran
 

What's hot (20)

Image recognition
Image recognitionImage recognition
Image recognition
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Run length encoding
Run length encodingRun length encoding
Run length encoding
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Spatial domain and filtering
Spatial domain and filteringSpatial domain and filtering
Spatial domain and filtering
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic science
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Python
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
 
Content Based Image Retrieval
Content Based Image Retrieval Content Based Image Retrieval
Content Based Image Retrieval
 
Fundamental steps in image processing
Fundamental steps in image processingFundamental steps in image processing
Fundamental steps in image processing
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 

Viewers also liked

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
SondosFadl
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...
arorasurbhi
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
SondosFadl
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
ijsrd.com
 
Forgery by Shukun Karthika
Forgery by Shukun KarthikaForgery by Shukun Karthika
Forgery by Shukun Karthika
Shukun Karthika
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
Tharindu Rusira
 
Learning by Shukun Karthika
Learning by Shukun KarthikaLearning by Shukun Karthika
Learning by Shukun Karthika
Shukun Karthika
 
Introduction image features
Introduction image featuresIntroduction image features
Introduction image features
payalshah14
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
LogicMindtech Nologies
 
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
braddehavenx
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
Tejraj Thakor
 
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Wookjin Choi
 
Sign verification
Sign verificationSign verification
Sign verification
projectseven1222
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection Model
Editor IJMTER
 
Malaysian Penal Code - Act 574
Malaysian Penal Code - Act 574Malaysian Penal Code - Act 574
Malaysian Penal Code - Act 574
FAROUQ
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3Soon Zoo Kwon
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
Cybersecurity Education and Research Centre
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
Ali A Jalil
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
wolf
 

Viewers also liked (20)

A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
Forgery by Shukun Karthika
Forgery by Shukun KarthikaForgery by Shukun Karthika
Forgery by Shukun Karthika
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Learning by Shukun Karthika
Learning by Shukun KarthikaLearning by Shukun Karthika
Learning by Shukun Karthika
 
Introduction image features
Introduction image featuresIntroduction image features
Introduction image features
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
 
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
 
Fraud Detection Using Signature Recognition
Fraud Detection Using Signature RecognitionFraud Detection Using Signature Recognition
Fraud Detection Using Signature Recognition
 
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
 
Sign verification
Sign verificationSign verification
Sign verification
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection Model
 
Malaysian Penal Code - Act 574
Malaysian Penal Code - Act 574Malaysian Penal Code - Act 574
Malaysian Penal Code - Act 574
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
main project doument
main project doumentmain project doument
main project doument
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
 

Similar to Digital image forgery detection

Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
iosrjce
 
F017374752
F017374752F017374752
F017374752
IOSR Journals
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
B018110915
B018110915B018110915
B018110915
IOSR Journals
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
rahulmonikasharma
 
A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...
A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...
A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...
cscpconf
 
Image processing
Image processingImage processing
Image processing
kamal330
 
Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...
Fraud and Tamper Detection in Authenticity Verification through  Gradient Bas...Fraud and Tamper Detection in Authenticity Verification through  Gradient Bas...
Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...
IOSR Journals
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
ijcisjournal
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
Azharo7
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
ijcga
 
I010634450
I010634450I010634450
I010634450
IOSR Journals
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
iosrjce
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
csandit
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
cscpconf
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
General Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image SegmentationGeneral Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image Segmentation
Melissa Moore
 
IRJET- Low Light Image Enhancement using Convolutional Neural Network
IRJET-  	  Low Light Image Enhancement using Convolutional Neural NetworkIRJET-  	  Low Light Image Enhancement using Convolutional Neural Network
IRJET- Low Light Image Enhancement using Convolutional Neural Network
IRJET Journal
 

Similar to Digital image forgery detection (20)

Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
B018110915
B018110915B018110915
B018110915
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
 
A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...
A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...
A REGULARIZED ROBUST SUPER-RESOLUTION APPROACH FORALIASED IMAGES AND LOW RESO...
 
Image processing
Image processingImage processing
Image processing
 
Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...
Fraud and Tamper Detection in Authenticity Verification through  Gradient Bas...Fraud and Tamper Detection in Authenticity Verification through  Gradient Bas...
Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
 
I010634450
I010634450I010634450
I010634450
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
General Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image SegmentationGeneral Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image Segmentation
 
h.pdf
h.pdfh.pdf
h.pdf
 
IRJET- Low Light Image Enhancement using Convolutional Neural Network
IRJET-  	  Low Light Image Enhancement using Convolutional Neural NetworkIRJET-  	  Low Light Image Enhancement using Convolutional Neural Network
IRJET- Low Light Image Enhancement using Convolutional Neural Network
 

Recently uploaded

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 

Digital image forgery detection

  • 1. 1
  • 3. Presentation Division Introduction Forgery Detection Region Duplication Conclusion  Digital Image Forgery Detection  Types of Forgery  Forgery Detection Mechanisms  High Precision Rotation Angle Estimation For Copy Move.  Explaination  Rotation Angle Calculation  Variance Estimation  Algorithm  Discrete Cosine Transform  Walsh Transform  Hybrid Wavelet Transform  Results  Future Works  References 3
  • 4. Digital Image Forgery Detection  Alteration of the semantic components of a digital image.  Removing Contents from the image  Adding Data to the image  Types of Forgery  Image Retouching  Image Splicing (Copy-Paste)  Image Cloning (Copy-Move) 4
  • 5. Image Retouching  One of the oldest types of image forgery  Image features are tampered with.  Used to enhance or reduce digital image features.  Considered less dangerous type of image forgery. 5
  • 6. Image Splicing (Copy-Paste)  Fragments of 2 or more images are combined to form an image.  This operation is fundamental in digital photo montaging and in turn is a mechanism for image forgery creation.  Image splicing technique may change the visual message of digital images more aggressively than image retouching. 6
  • 7. Image Cloning (Copy-Move)  Considered as a special case of image splicing, where the tampering occurs within a single image and no need for multiple images.  Part of the image is copied and then pasted in a desired location within the same image.  The purpose of such tampering is to duplicate or conceal a certain object in that image. 7
  • 8. Image Cloning  Blurring is usually used to reduce the expected irregularity along the border of the pasted regions.  The similarity of texture, color, noise and other information inside the image make it very difficult to detect this kind of tampering via visual inspection.  Moreover, performing of post-processing operations such as blurring, adding noise and JPEG compression or geometric operations such as scaling, shifting and rotation increase the hardness of detection task. 8
  • 9. Forgery Detection Mechanisms  Can be Classified into Two Types  Active Methods  Passive Methods  Active Methods  Hidden Information inside the Digital Image.  Done at the time of Data Acquisition or before disseminated to the public.  Embedded information can be used to identify the source of such image or to detect possible modification to that image. 9
  • 10. Forgery Detection Mechanisms (Active Methods)  Two Major Types  Digital Signature  Digital Watermarking 10
  • 11. Forgery Detection Mechanisms (Passive Methods)  Use traces left by the processing steps in different phases of acquisition and storage of digital images.  These traces can be treated as a fingerprint of the image source device.  Passive methods work in the absence of protecting techniques.  They do not use any pre-image distribution information inserted into digital image.  They work by analyzing the binary information of digital image in order to detect forgery traces, if any  Limitation is the number of false positives. 11
  • 12. High Precision Rotation Angle Estimation for Rotated Images  Paper addresses the detection of “copy-move”(cloning) technique  As discussed before cloning detection becomes harder when the forger uses geometric alterations like scaling, rotation & shifting.  Particularly addresses the Rotation transformation.  This paper proposes a novel blind image rotation detection algorithm with high precision rotation angle estimation 12
  • 13.  S, t=pixel coordinates in the rotated image I.  𝜑 = weighted value. 𝑖′ = 𝑖𝑐𝑜𝑠 𝜃 − 𝑗𝑠𝑖𝑛 𝜃 𝑗′ = 𝑖𝑠𝑖𝑛𝜃 + 𝑗𝑐𝑜𝑠 𝜃 I= Original image I’=Intermediate Image I”= Rotated Image 𝐼𝑠,𝑡 " = 𝑛=−𝑁 𝑁 𝑚=−𝑁 𝑁 𝜑(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 )𝑰′(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 High Precision Rotation Angle Estimation for Rotated Images 13
  • 14.  α = horizontal distance rotated image I′′ & intermediate image I′  β = vertical distance. 𝛼2 = (pcosθ − 𝑓𝑙𝑜𝑜𝑟(𝑝𝑐𝑜𝑠𝜃) + 𝑅)2 𝛽2 = (𝑞𝑠𝑖𝑛θ − 𝑓𝑙𝑜𝑜𝑟(𝑞𝑠𝑖𝑛𝜃) + 𝑆)2 R and S are constant(translation) High Precision Rotation Angle Estimation for Rotated Images 14
  • 15. 𝑉𝑎𝑟 𝑋 = 𝐸[ 𝑋 − 𝜇 2 ] 𝑉𝑎𝑟 𝑎𝑋 + 𝑏𝑌 = 𝑎2 𝑉𝑎𝑟 𝑋 + 𝑏2 𝑉𝑎𝑟(𝑌) 𝐼𝑠,𝑡 " = 𝑛=−𝑁 𝑁 𝑚=−𝑁 𝑁 𝜑(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 )𝑰′(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 For a single pixel, we have: 𝐼𝑠,𝑡 " ≈ 𝑛=0 1 𝑚=0 1 𝜑(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 )𝑰′(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 High Precision Rotation Angle Estimation for Rotated Images 15
  • 16.  Plot of horizontal distance vector and its spectrum at 𝜃 = 300.  Plot of peak frequency of distance vector 𝛼2 against all 𝜃 𝜖 [00 − 450 ]. Frequency is normalized to [0,1]. High Precision Rotation Angle Estimation for Rotated Images 16
  • 17.  Algorithm of the approach High Precision Rotation Angle Estimation for Rotated Images 17
  • 18. Resolution Total Images Correct Images Correct Rate 10 500 486 97.2% 0.80 500 480 96.0% 0.60 500 471 94.2% 0.40 500 459 91.8% 0.20 500 438 87.6% High Precision Rotation Angle Estimation for Rotated Images 18
  • 19.  Experiment results. 1st column: three images rotated at 50 , 250 , 450 respectively; 2nd column: theoretical pixel variance spectrum for the rotated images; 3rd column: actual pixel variance spectrum for the rotated images. High Precision Rotation Angle Estimation for Rotated Images 19
  • 20.  Conclusion  In this paper, propose a blind image rotation angle estimation method is proposed by exploring the periodicity of pixel variance of rotated images.  Experiment results show that this method works well for rotation angles larger than 50 , but not as good for smaller rotation angles.  The method can be used in areas like copy-paste image forgery detection. In the future, the author plans to modify the algorithm to improve the correct rate of small rotation angle estimation. High Precision Rotation Angle Estimation for Rotated Images 20
  • 21. Region Duplication Forgery Detection using Hybrid Wavelet Transforms 21
  • 22. Region Duplication Forgery Detection using Hybrid Wavelet Transforms  Starts by dividing the M×N suspicious image into small overlapping blocks.  This step is achieved by sliding a window of size B×B from the upper left corner to the lower right corner one pixel each time.  The quantized DCT coefficients are extracted from each block and used to represent the features of these blocks.  The quantized DCT coefficients are stored as one row in a matrix A of (M-B+1) × (N-B+1) rows and B× B columns, where B× B is the block size.  Two identical rows in the matrix A, correspond to two identical blocks in the suspicious image. Discrete Cosine Transforms 22
  • 23. Region Duplication Forgery Detection using Hybrid Wavelet Transforms Hadamard Walsh Transforms The Product of a Boolean Function and a Walsh Matrix is a Walsh Spectrum 23
  • 24. Region Duplication Forgery Detection using Hybrid Wavelet Transforms  Example of Copy-Move Forgery, (a) Original Image (b) Forged Image 24

Editor's Notes

  1. Semantics is the subfield that is devoted to the study of meaning, as inherent at the levels of words, phrases, sentences, and larger units of discourse (termed texts, or narratives).
  2. Montage (/mɒnˈtɑːʒ/) is a technique in film editing in which a series of short shots are edited into a sequence to condense space, time, and information. The term has been used in various contexts.