SlideShare a Scribd company logo
1 of 5
Download to read offline
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
NITTTR, Chandigarh EDIT -2015 188
Hybrid Technique for Copy-Move Forgery
Detection Using L*A*B* Color Space
Kavya Sharma1
, Shweta Meena2
, UmeshGhanekar3
Dept. of ECE, N.I.T. Kurukshetra, Haryana, India
1
kavyasharma49@gmail.com, 2
mail2shwetameena@nitkkr.ac.in, 2
ugnitk@nitkkr.ac.in
Abstract—Copy-move forgery is applied on an image to hide a
region or an object. Most of the detection techniques either
use transform domain or spatial domain information to detect
the forgery. This paper presents a hybrid method to detect
the forgery making use of both the domains i.e. transform
domain in whichSVD is used to extract the useful
information from image and spatial domain in which L*a*b*
color space is used. Here block based approach and
lexicographical sorting is used to group matching feature
vectors. Obtained experimental results demonstrate that
proposed method efficiently detects copy-move forgery even
when post-processing operations like blurring, noise
contamination, and severe lossy compression are applied.
Keywords—Copy-move forgery; Duplicate region detection;
Singular Value Decomposition; CIEL*a*b* color space.
I. INTRODUCTION
Availability and popularity of digital image tampering
tools is increasing day by day. With the help of these tools
an untrained person can also perform forgery on digital
images. Importance of images on internet, media has also
increased, images are being used in several fields such as
military purposes, medical purposes, journalism etc. Thus
developing methods to check the authenticity and integrity
of images has become important. Methods present to detect
image forgery uses either of the two approaches, Active
approach or passive approach. Methods using active
approach use some information about the original image to
detect forgery e.g. watermarking, digital signature, etc.
whereas methods using passive approach do not need any
prior information about the original image to detect forgery.
Forgeries like copy-move, image splicing, image retouching
etc. can be detected using passive detection methods.
Among many other forgeries, copy-move forgery is the
most popular and commonly used image tampering method
whichis used to create a false image. In this type of
tampering a small part of an image is copied and pasted on
another part within the same image. Fig 1.shows a typical
example of copy-move forgery. The main key to detect
copy-move forgery is that the duplicate regions have similar
features like noise, color, texture etc. as they are from same
image. Thus a copy-move detection method should be able
to detect the presence of duplicate region and precisely
locate them. Several methods have been suggested till now
to detect this forgery. An exhaustive search method was
proposed by J. Fridric [1], but
Fig.1. Example of copy-move digital image forgery.
due to its high complexity it was not suitable for practical
use. J. Fridric [1] also proposed a block based method in
which Discrete Cosine Transform (DCT) was used to
extract feature vector from each block. Popscue[2]
suggested a method using Principal component analysis to
extract unique representation of each block. W. Luo [3]
proposed the use of spatial domain features like average
color of blocks and intensity ratio. Kang [4] suggested
using Singular Value Decomposition (SVD) to represent
features. Mahdian [5] suggested use of blur moment
invariants to form the feature vector. Li [6] proposed using
Discrete Wavelet Transform (DWT) and SVD to extract
block representation. SVD is applied on low frequency sub
band of image obtained after applying DWT. Zhang [7]
proposed a method using DWTin which phase correlation
between non-overlapping sub-images is computed to get the
spatial offset. J. Zhao [8] proposed a hybrid method based
on DCT and SVD which is more robust against post-
processing operations. Another approach was proposed by
Fattah [9] in which approximate DWT coefficients are used
to locate forgery. All the methods discussed so far either
take advantage of frequency domain or spatial domain. To
exploit the advantages of both the domains, this paper
presents a block based method which uses CIE-L*a*b*
color space [10] and singular values obtained by applying
SVD on L*, a*, and b* component of image to detect
forgery. Experimental results demonstrate that the proposed
method is efficient to detect the copy-move forgery and
robust against several post-processing operations. Section II
presentsthe proposed detection approach. Experiments and
simulations are presented and discussed in Section III.
Conclusions are given in Section IV.
II. PROPOSED APPROACH
In copy-move forgery,since the copied region is pasted
in the same image, thus to detect this type of forgery, we
need to detect region in the image with similar properties.
Generally it is unlikely to have large similar regions in
anatural image, thus we need to detect presence of large
similar regions. For this purpose, the image is divided into
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
189 NITTTR, Chandigarh EDIT-2015
overlapping blocks and unique representation of each block
is generated. These unique representations are matched with
each other to find the duplicated blocks.
Algorithm framework
The proposed algorithm includes five steps, given as
follows:
1) Convert RGB image into L*a*b* color space.
2) Divide L*, a*, and b* components into
overlapping blocks of fixed size.
3) Extract features from L*a*b* components of each
block as well as after applying SVD on each
block.
4) Apply Lexicographical sorting and match similar
pairs of blocks.
5) Matched blocks are mapped to indicate forgery
detection.
Detailed Procedure
The algorithm mentioned in above section is
implemented as follows:
Step1: Pre-processing
Let a suspicious image I of size × is converted
from RGB color space to L*a*b* color space [10]. Where
L* represents lightness, a* and b* represent the color
difference values. Studies indicate L*a*b* system is an
excellent decoupler of intensity and color. Thus we have
used L*a*b* color space for extracting feature vectors
which gives us better detection accuracy than achieved by
working in RGB color space.
Step2: Block tilling
The L*, a*, and b* components IL, Ia, Ib are divided into
overlapping blocks of size × pixels, generating ( −
+ 1)( − + 1) blocks per component. Thus for an
image of size × total number of blocks will be(M −
b + 1)(N − b + 1) × 3. Resulting blocks from L*, a*
and b* components are denoted as Lij, aij and bij
respectively, where i and j denotes starting coordinates of
block’s row and column, respectively.
Step3: Applying SVD and extracting feature vectors
SVD is a matrix decomposition method. Let Z be a
matrix of size × , and with rank r. its SVD is given by
=  (1)
Where, U is a × matrix of orthonormal
eigenvectors of ZZT
, V is a × matrix of orthonormal
eigenvectors of ZT
Z,  is a × diagonal matrix
containing square roots of the eigenvalues of ZT
Z, called
singular values.
 =
 0
0 0
(2)
Where  is a square diagonal matrix in ×
. can be
defined as,  = ( , , ,… … , ), where ( ≥
≥ ≥. . … ≥ ) > 0. Large singular values are less
sensitive to noise, and largest singular value is most stable
against some minor distortions.
In proposed method, SVD is applied on each ×
block of Lij, aij and bij. Six elements of the feature vector are
obtained from resulting blocks. The feature vector Vij
contains 8 elements.
= [ , , , , , , , ] (3)
Where , , , are the first four singular values
obtained after applying SVD on Lij. and are the largest
singular values obtained by applying SVD on aij and bij,
respectively. and are the average value of × block
of aij and bij, respectively.
Step4: Matching of similar block pairs
Feature vector for each block is obtained and a matrix
A, named as feature matrix is created by arranging feature
vectors into it. Matrix A will be of size(M − b + 1)(N −
b + 1) × 8, each row denotingthe feature vector of a block.
Note that ifa block is duplicatedthen its feature vectors
will be identical with the original one, thus we need to find
matching feature vectors. For this purpose,rows of Aare
sorted lexicographically to arrange feature vectors of
matching blocks adjacent to each other. Two blocks will be
considered matched only if they satisfy the following three
conditions:
Condition1. If the difference between two adjacent rows
of lexicographically sorted matrix ( ) is found less than a
fixed threshold ( ).
Condition2. If the Euclidean distance between blocks
satisfying above condition is greater than .
( − ) + ( − ) > (4)
It is assumed that duplicated regions are non-
overlapping, thus the value of threshold is selected to
differentiate between overlapping and non-overlapping
blocks.
Condition3. A matching block pair is considered to be a
part of forged region only if there are many other matching
pairs with similar shift vectors. For this purpose, shift
vector is calculated between blocks satisfying condition 2.
The locations of respective blocks are stored in a separately.
Shift vector Scan be calculated as,
= ( , ) = ( − , − )(5)
Where ( , ), ( , ) are the co-ordinates of top left
corner of the blocks corresponding to adjacent feature
vectors in . As shift vector –S and S corresponds to same
shift, only absolute value is considered. For each matching
block pair, the corresponding shift vector counter (C)is
incrementedby one.
( , ) = ( , ) + 1) (6)
In the beginning of algorithm the value of C is kept
zero, C indicates the frequency of occurrence of different
shift vectors. Then we compare the value of shift vector
counter of all shift vectors with a threshold( ) and
choose shift vectors, , , … … , whose occurrence
exceeds the threshold .
( ) ≥ , for all r=1, 2,…, k(7)
Value of this threshold is related with the size of
smallest region that can be identified by algorithm.
Step5: Output
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
NITTTR, Chandigarh EDIT -2015 190
Duplicated blocks for which the test satisfies all three
conditions are mapped in the image to represent the forgery
detection result.
III. EXPERIMENTAL RESULTS
To evaluate the performance of the proposed method,
several experiments are performed on the test images
collected from two databases [11, 12]. We randomly
selected 50 images from these datasets to generate forged
images by copying a region of 32 × 32 pixels from a
random location and pasting onto a non-overlapping region.
Images with larger size forged region are also created by
copying a square region of 64 × 64 pixels. For each
image,the copied region is pasted on four different relative
locations to generate 400 tampered images. In our
experiment all the parameters are set as: b=8, Tdiff=0.05,
Td=40, Tshift=90. The algorithm has been implemented
using Matlab R2013a.
Detection performance was evaluated by determining,
how correctly it can locate the forged regions. The
quantitative measures used for this purpose are
( ) =


(8)
( ) =


(9)
Where  represents the number of correctly detected
copy-move tampered pixels; represents the number of
actual copy-move tampered pixels; represents the number
of falsely detected copy-move tampered pixels;
and represents the total number of pixels detected as
copy-move tampered.
A. Accuracy Test
To test the effectiveness and accuracy of proposed
algorithm we applied detection algorithm on created dataset
of copy-move forged images. Fig. 2 shows the detection
results,tampered images are shown in top row and detection
results by proposed method are shown in bottom row.
Results shows that our algorithm can localize the forged
regions quite precisely as obtained values of D are generally
greater than 0.95 and values ofF equals to 0.
B. Robustness Test
Generally forgers do different post-processing
operations to make an imperceptible tempered image. There
are various post processing operations e.g. Gaussian
blurring, JPEG compression, AWGN etc.To test the
robustness of proposed algorithm against different post
processing operations, some of the forged images were
applied with Gaussian blurring, AWGN and JPEG
compression with different parameters.Fig.3. shows
detection results of copy-move forgeries with these post
processing operations. Table I, II and III show the
experimental results when AWGN, Gaussian blurring,
andJPEG compression are applied with different parameter
values
D=1, F=0 D=1, F=0
Fig. 2.Detection resultsof copy-move forgeries. Tampered images are
shown in top row, detection results by proposed method are shown in
bottom row. D/F rates are given below respectively.
D=0.878, F=0.003D=0.938, F=0.001
Gaussian blurring Gaussian blurring
(w=3,σ=0.5) (w=3,σ=0.5)
D=0.945, F=0.004 D=0.989, F=0.003
AWGN AWGN
(SNR=30dB) (SNR=30dB)
D=0.899,F=0.011D=0.930, F=.007
JPEG compression JPEG compression
(Q=70) (Q=70)
Fig. 3. Shown are the detection results of copy-move forgeries under
multiple post-processing operations. DAR/FPR rates are given below
respectively.
TABLE I. Detection result when tampered images are distorted by AWGN
SNR=40db SNR=35db SNR=30db SNR=25db
32 × 32
D 0.986 0.985 0.980 0.973
F 0.012 0.020 0.023 0.076
64 × 64
D 0.997 0.995 0.992 0.983
F 0.002 0.003 0.003 0.014
TABLE II. Detection result when tampered images are distorted by
Gaussian blurring
w=3, =0.5 w=3, =1 w=5, =05 w=5, =1
32 × 32
D 0.945 0.944 0.956 0.889
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
191 NITTTR, Chandigarh EDIT-2015
F 0.030 0.030 0.032 0.033
64 × 64
D 0.967 0.956 0.977 0.902
F 0.013 0.015 0.012 0.015
TABLE III. Detection result when tampered images are distorted by JPEG
compression
Q=90 Q=80 Q=70
32 × 32
D 0.973 0.890 0.789
F 0.013 0.038 0.074
64 × 64
D 0.982 0.956 0.910
F 0.003 0.005 0.019
Fig. 4. D plot for DCT, SVD and proposed method against different
AWGN levels when size of duplicate region is 64 × 64.
Fig. 5. D plot for DCT, SVD and proposed method against
differentGaussian blurring(w=5) when size of duplicate region is 64 × 64.
Fig. 6. D plot for DCT, SVD and proposed method against different JPEG
compression quality levels when size of duplicate region is 64 × 64.
Fig. 7. F plot for DCT, SVD and proposed method against different
AWGNlevels when size of duplicate region is 64 × 64.
Fig. 8. F plot for DCT, SVD and proposed method against different
Gaussian blurring (w=5) when size of duplicate region is 64 × 64.
on tampered images respectively. From Fig.3 and Table I-
III it is evident that our method performs accurately in
presence of post-processing operations. To evaluate the
performance of the proposed method the experiments were
performed on other two well-known existing methods, DCT
[1] and SVD [4].
Fig. 9. F plot for DCT, SVD and proposed method against different JPEG
compression quality levels when size of duplicate region is 64 × 64.
Comparison results of performance in terms of average D/F
are shown in Fig. 4-9. From the graph it can be easily
inferred that the proposed method out performs the several
other methods in terms of accuracy and false detection rate
in presence of AWGN, Gaussian blurring, and JPEG
compression.
IV. CONCLUSION
In this paper a hybrid method has been proposed for
copy-move image forgery detection, making use of spatial
and transform domain. The L*a*b* color space is used to
extract color information and then SVDis applied on
L*a*b* components to get transform domain features. The
experimental results show that the proposed algorithm can
efficiently detect copy-move forgery and precisely locate
the duplicated regions. It also exhibits high robustness to
post processing operations like Gaussian blurring, AWGN,
and JPEG compression.Extensive simulation results exhibit
that the proposed method significantly outperforms many
other well-known techniques.
REFERENCES
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
NITTTR, Chandigarh EDIT -2015 192
[1] J. Fridrich, D. Soukal, and J. Lukas, “Detection of copy–move forgery
in digital images”, in Proceedings of Digital Forensic Research
Workshop, Cleveland, pp. 55–61, August 2003.
[2] Popescu, H. Farid, “Exposing digital forgeries by detecting duplicated
image regions”, Dept. Comput. Sci., Dartmouth College, Tech. Rep.
TR2004-515, 2004.
[3] W. Luo, J. Huang, and G. Qiu, “Robust detection of region-duplication
forgery in digital image”, in 18th international Coriference on Pattern
Recognition,(ICPR'06), vol. 4. IEEE, pp. 746-749, 2006.
[4] Kang and S. Wei, “Identifying tampered regions using singular value
decomposition in digital image forensics”, inProceedings of
International Conference on Computer Science and Software
Engineering,vol. 3. IEEE, pp. 926–930, 2008.
[5] Mahdian, S. Saic, “Detection of copy-move forgery using a method
based on blurmoment invariants”, Forensic science international,vol.
171, no. 2, pp. 180-189, Sep. 2007.
[6] G. Li, Q. Wu, D. Tu, and S. Sun, “A Sorted Neighborhood Approach
for Detecting Duplicated Regions in Image Forgeries based on DWT
and SVD”, in Proceedings of IEEE International Conference on
Multimedia and Expo, Beijing, pp. 1750-1753, July 2007.
[7] J. Zhang, Z. Feng, and Y. Su, “A new approach for detecting copy–
move forgery in digital images”, in IEEE Singapore International
Conference on Communication Systems, pp. 362–366, 2008.
[8] J. Zhao and J. Guo, “Passive forensics for copy-move image forgery
using a method based on DCT and SVD”, Forensic Science
International, pp. 158–166, 2013.
[9] S. A. Fattah, M. M. I. Ullah, M. Ahmed, I. Ahmmed, and C. Shahnaz,
“A scheme for copy-move forgery detection in digital images based on
2D-DWT”, IEEE 57th International Midwest Symposium on Circuits
and Systems (MWSCAS), pp. 801- 804, 2014.
[10] R. Lukac and K. Plataniotis,“Color Image Processing: Methods and
Applications”, CRC Press, 2006.
[11] The USC-SIPI Image Database: http://sipi.usc.edu/database/.
[12] Kodak Lossless True Color Image Suite: http://r0k.us/graphics/kodak/

More Related Content

What's hot

Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Petroleum Training Institute
 
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Koteswar Rao Jerripothula
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIRZahra Mansoori
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Zahra Mansoori
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2Aly Abdelkareem
 
Image segmentation
Image segmentationImage segmentation
Image segmentationDeepak Kumar
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object trackingPriyanka Goswami
 
Image segmentation
Image segmentationImage segmentation
Image segmentationMukul Jindal
 

What's hot (18)

Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
 
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIR
 
PPT s10-machine vision-s2
PPT s10-machine vision-s2PPT s10-machine vision-s2
PPT s10-machine vision-s2
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
Av4301248253
Av4301248253Av4301248253
Av4301248253
 
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
 
regions
regionsregions
regions
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
PPT s08-machine vision-s2
PPT s08-machine vision-s2PPT s08-machine vision-s2
PPT s08-machine vision-s2
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object tracking
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 

Viewers also liked

FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?
The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?
The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?Mario Lubenka
 
IBM Cloud Solutions Customer Deck
IBM Cloud Solutions Customer Deck IBM Cloud Solutions Customer Deck
IBM Cloud Solutions Customer Deck David Barry
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
E-goverment Estonia framework Arvo Ott
E-goverment Estonia framework  Arvo OttE-goverment Estonia framework  Arvo Ott
E-goverment Estonia framework Arvo OttVincent Everts
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...arorasurbhi
 
Building government e-services in Estonia
Building government e-services in EstoniaBuilding government e-services in Estonia
Building government e-services in EstoniaAndres Kütt
 
Next generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyondNext generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyondoleg2030
 

Viewers also liked (9)

FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?
The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?
The Politics of Web 2.0 - E-Government or state surveillance and cyber wars?
 
IBM Cloud Solutions Customer Deck
IBM Cloud Solutions Customer Deck IBM Cloud Solutions Customer Deck
IBM Cloud Solutions Customer Deck
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
E-goverment Estonia framework Arvo Ott
E-goverment Estonia framework  Arvo OttE-goverment Estonia framework  Arvo Ott
E-goverment Estonia framework Arvo Ott
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...
 
Building government e-services in Estonia
Building government e-services in EstoniaBuilding government e-services in Estonia
Building government e-services in Estonia
 
Digital Government - Cloud best practices
Digital Government - Cloud best practicesDigital Government - Cloud best practices
Digital Government - Cloud best practices
 
Next generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyondNext generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyond
 

Similar to Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Segmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachSegmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachIjrdt Journal
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Effect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins ApproachEffect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins ApproachCSCJournals
 
Finding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By QuadtreeFinding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By Quadtreeiosrjce
 
Fast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesFast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesCSCJournals
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation IJEEE
 
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...cscpconf
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...ZaidHussein6
 
Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...IJECEIAES
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Quality assessment of image fusion
Quality assessment of image fusionQuality assessment of image fusion
Quality assessment of image fusionijitjournal
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 

Similar to Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space (20)

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
I07015261
I07015261I07015261
I07015261
 
Segmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachSegmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approach
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Effect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins ApproachEffect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins Approach
 
Finding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By QuadtreeFinding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By Quadtree
 
Fast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesFast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular Organelles
 
Id62
Id62Id62
Id62
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
 
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
 
H017416670
H017416670H017416670
H017416670
 
Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
I017417176
I017417176I017417176
I017417176
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Quality assessment of image fusion
Quality assessment of image fusionQuality assessment of image fusion
Quality assessment of image fusion
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 

More from IJEEE

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoIJEEE
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierIJEEE
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...IJEEE
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...IJEEE
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas IJEEE
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyIJEEE
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewIJEEE
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyIJEEE
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications IJEEE
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsIJEEE
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyIJEEE
 

More from IJEEE (20)

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using Arduino
 
Id136
Id136Id136
Id136
 
Id135
Id135Id135
Id135
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric System
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A Survey
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS Technology
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI Interconnects
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm Technology
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 

Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space

  • 1. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 NITTTR, Chandigarh EDIT -2015 188 Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Kavya Sharma1 , Shweta Meena2 , UmeshGhanekar3 Dept. of ECE, N.I.T. Kurukshetra, Haryana, India 1 kavyasharma49@gmail.com, 2 mail2shwetameena@nitkkr.ac.in, 2 ugnitk@nitkkr.ac.in Abstract—Copy-move forgery is applied on an image to hide a region or an object. Most of the detection techniques either use transform domain or spatial domain information to detect the forgery. This paper presents a hybrid method to detect the forgery making use of both the domains i.e. transform domain in whichSVD is used to extract the useful information from image and spatial domain in which L*a*b* color space is used. Here block based approach and lexicographical sorting is used to group matching feature vectors. Obtained experimental results demonstrate that proposed method efficiently detects copy-move forgery even when post-processing operations like blurring, noise contamination, and severe lossy compression are applied. Keywords—Copy-move forgery; Duplicate region detection; Singular Value Decomposition; CIEL*a*b* color space. I. INTRODUCTION Availability and popularity of digital image tampering tools is increasing day by day. With the help of these tools an untrained person can also perform forgery on digital images. Importance of images on internet, media has also increased, images are being used in several fields such as military purposes, medical purposes, journalism etc. Thus developing methods to check the authenticity and integrity of images has become important. Methods present to detect image forgery uses either of the two approaches, Active approach or passive approach. Methods using active approach use some information about the original image to detect forgery e.g. watermarking, digital signature, etc. whereas methods using passive approach do not need any prior information about the original image to detect forgery. Forgeries like copy-move, image splicing, image retouching etc. can be detected using passive detection methods. Among many other forgeries, copy-move forgery is the most popular and commonly used image tampering method whichis used to create a false image. In this type of tampering a small part of an image is copied and pasted on another part within the same image. Fig 1.shows a typical example of copy-move forgery. The main key to detect copy-move forgery is that the duplicate regions have similar features like noise, color, texture etc. as they are from same image. Thus a copy-move detection method should be able to detect the presence of duplicate region and precisely locate them. Several methods have been suggested till now to detect this forgery. An exhaustive search method was proposed by J. Fridric [1], but Fig.1. Example of copy-move digital image forgery. due to its high complexity it was not suitable for practical use. J. Fridric [1] also proposed a block based method in which Discrete Cosine Transform (DCT) was used to extract feature vector from each block. Popscue[2] suggested a method using Principal component analysis to extract unique representation of each block. W. Luo [3] proposed the use of spatial domain features like average color of blocks and intensity ratio. Kang [4] suggested using Singular Value Decomposition (SVD) to represent features. Mahdian [5] suggested use of blur moment invariants to form the feature vector. Li [6] proposed using Discrete Wavelet Transform (DWT) and SVD to extract block representation. SVD is applied on low frequency sub band of image obtained after applying DWT. Zhang [7] proposed a method using DWTin which phase correlation between non-overlapping sub-images is computed to get the spatial offset. J. Zhao [8] proposed a hybrid method based on DCT and SVD which is more robust against post- processing operations. Another approach was proposed by Fattah [9] in which approximate DWT coefficients are used to locate forgery. All the methods discussed so far either take advantage of frequency domain or spatial domain. To exploit the advantages of both the domains, this paper presents a block based method which uses CIE-L*a*b* color space [10] and singular values obtained by applying SVD on L*, a*, and b* component of image to detect forgery. Experimental results demonstrate that the proposed method is efficient to detect the copy-move forgery and robust against several post-processing operations. Section II presentsthe proposed detection approach. Experiments and simulations are presented and discussed in Section III. Conclusions are given in Section IV. II. PROPOSED APPROACH In copy-move forgery,since the copied region is pasted in the same image, thus to detect this type of forgery, we need to detect region in the image with similar properties. Generally it is unlikely to have large similar regions in anatural image, thus we need to detect presence of large similar regions. For this purpose, the image is divided into
  • 2. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 189 NITTTR, Chandigarh EDIT-2015 overlapping blocks and unique representation of each block is generated. These unique representations are matched with each other to find the duplicated blocks. Algorithm framework The proposed algorithm includes five steps, given as follows: 1) Convert RGB image into L*a*b* color space. 2) Divide L*, a*, and b* components into overlapping blocks of fixed size. 3) Extract features from L*a*b* components of each block as well as after applying SVD on each block. 4) Apply Lexicographical sorting and match similar pairs of blocks. 5) Matched blocks are mapped to indicate forgery detection. Detailed Procedure The algorithm mentioned in above section is implemented as follows: Step1: Pre-processing Let a suspicious image I of size × is converted from RGB color space to L*a*b* color space [10]. Where L* represents lightness, a* and b* represent the color difference values. Studies indicate L*a*b* system is an excellent decoupler of intensity and color. Thus we have used L*a*b* color space for extracting feature vectors which gives us better detection accuracy than achieved by working in RGB color space. Step2: Block tilling The L*, a*, and b* components IL, Ia, Ib are divided into overlapping blocks of size × pixels, generating ( − + 1)( − + 1) blocks per component. Thus for an image of size × total number of blocks will be(M − b + 1)(N − b + 1) × 3. Resulting blocks from L*, a* and b* components are denoted as Lij, aij and bij respectively, where i and j denotes starting coordinates of block’s row and column, respectively. Step3: Applying SVD and extracting feature vectors SVD is a matrix decomposition method. Let Z be a matrix of size × , and with rank r. its SVD is given by =  (1) Where, U is a × matrix of orthonormal eigenvectors of ZZT , V is a × matrix of orthonormal eigenvectors of ZT Z,  is a × diagonal matrix containing square roots of the eigenvalues of ZT Z, called singular values.  =  0 0 0 (2) Where  is a square diagonal matrix in × . can be defined as,  = ( , , ,… … , ), where ( ≥ ≥ ≥. . … ≥ ) > 0. Large singular values are less sensitive to noise, and largest singular value is most stable against some minor distortions. In proposed method, SVD is applied on each × block of Lij, aij and bij. Six elements of the feature vector are obtained from resulting blocks. The feature vector Vij contains 8 elements. = [ , , , , , , , ] (3) Where , , , are the first four singular values obtained after applying SVD on Lij. and are the largest singular values obtained by applying SVD on aij and bij, respectively. and are the average value of × block of aij and bij, respectively. Step4: Matching of similar block pairs Feature vector for each block is obtained and a matrix A, named as feature matrix is created by arranging feature vectors into it. Matrix A will be of size(M − b + 1)(N − b + 1) × 8, each row denotingthe feature vector of a block. Note that ifa block is duplicatedthen its feature vectors will be identical with the original one, thus we need to find matching feature vectors. For this purpose,rows of Aare sorted lexicographically to arrange feature vectors of matching blocks adjacent to each other. Two blocks will be considered matched only if they satisfy the following three conditions: Condition1. If the difference between two adjacent rows of lexicographically sorted matrix ( ) is found less than a fixed threshold ( ). Condition2. If the Euclidean distance between blocks satisfying above condition is greater than . ( − ) + ( − ) > (4) It is assumed that duplicated regions are non- overlapping, thus the value of threshold is selected to differentiate between overlapping and non-overlapping blocks. Condition3. A matching block pair is considered to be a part of forged region only if there are many other matching pairs with similar shift vectors. For this purpose, shift vector is calculated between blocks satisfying condition 2. The locations of respective blocks are stored in a separately. Shift vector Scan be calculated as, = ( , ) = ( − , − )(5) Where ( , ), ( , ) are the co-ordinates of top left corner of the blocks corresponding to adjacent feature vectors in . As shift vector –S and S corresponds to same shift, only absolute value is considered. For each matching block pair, the corresponding shift vector counter (C)is incrementedby one. ( , ) = ( , ) + 1) (6) In the beginning of algorithm the value of C is kept zero, C indicates the frequency of occurrence of different shift vectors. Then we compare the value of shift vector counter of all shift vectors with a threshold( ) and choose shift vectors, , , … … , whose occurrence exceeds the threshold . ( ) ≥ , for all r=1, 2,…, k(7) Value of this threshold is related with the size of smallest region that can be identified by algorithm. Step5: Output
  • 3. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 NITTTR, Chandigarh EDIT -2015 190 Duplicated blocks for which the test satisfies all three conditions are mapped in the image to represent the forgery detection result. III. EXPERIMENTAL RESULTS To evaluate the performance of the proposed method, several experiments are performed on the test images collected from two databases [11, 12]. We randomly selected 50 images from these datasets to generate forged images by copying a region of 32 × 32 pixels from a random location and pasting onto a non-overlapping region. Images with larger size forged region are also created by copying a square region of 64 × 64 pixels. For each image,the copied region is pasted on four different relative locations to generate 400 tampered images. In our experiment all the parameters are set as: b=8, Tdiff=0.05, Td=40, Tshift=90. The algorithm has been implemented using Matlab R2013a. Detection performance was evaluated by determining, how correctly it can locate the forged regions. The quantitative measures used for this purpose are ( ) =   (8) ( ) =   (9) Where  represents the number of correctly detected copy-move tampered pixels; represents the number of actual copy-move tampered pixels; represents the number of falsely detected copy-move tampered pixels; and represents the total number of pixels detected as copy-move tampered. A. Accuracy Test To test the effectiveness and accuracy of proposed algorithm we applied detection algorithm on created dataset of copy-move forged images. Fig. 2 shows the detection results,tampered images are shown in top row and detection results by proposed method are shown in bottom row. Results shows that our algorithm can localize the forged regions quite precisely as obtained values of D are generally greater than 0.95 and values ofF equals to 0. B. Robustness Test Generally forgers do different post-processing operations to make an imperceptible tempered image. There are various post processing operations e.g. Gaussian blurring, JPEG compression, AWGN etc.To test the robustness of proposed algorithm against different post processing operations, some of the forged images were applied with Gaussian blurring, AWGN and JPEG compression with different parameters.Fig.3. shows detection results of copy-move forgeries with these post processing operations. Table I, II and III show the experimental results when AWGN, Gaussian blurring, andJPEG compression are applied with different parameter values D=1, F=0 D=1, F=0 Fig. 2.Detection resultsof copy-move forgeries. Tampered images are shown in top row, detection results by proposed method are shown in bottom row. D/F rates are given below respectively. D=0.878, F=0.003D=0.938, F=0.001 Gaussian blurring Gaussian blurring (w=3,σ=0.5) (w=3,σ=0.5) D=0.945, F=0.004 D=0.989, F=0.003 AWGN AWGN (SNR=30dB) (SNR=30dB) D=0.899,F=0.011D=0.930, F=.007 JPEG compression JPEG compression (Q=70) (Q=70) Fig. 3. Shown are the detection results of copy-move forgeries under multiple post-processing operations. DAR/FPR rates are given below respectively. TABLE I. Detection result when tampered images are distorted by AWGN SNR=40db SNR=35db SNR=30db SNR=25db 32 × 32 D 0.986 0.985 0.980 0.973 F 0.012 0.020 0.023 0.076 64 × 64 D 0.997 0.995 0.992 0.983 F 0.002 0.003 0.003 0.014 TABLE II. Detection result when tampered images are distorted by Gaussian blurring w=3, =0.5 w=3, =1 w=5, =05 w=5, =1 32 × 32 D 0.945 0.944 0.956 0.889
  • 4. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 191 NITTTR, Chandigarh EDIT-2015 F 0.030 0.030 0.032 0.033 64 × 64 D 0.967 0.956 0.977 0.902 F 0.013 0.015 0.012 0.015 TABLE III. Detection result when tampered images are distorted by JPEG compression Q=90 Q=80 Q=70 32 × 32 D 0.973 0.890 0.789 F 0.013 0.038 0.074 64 × 64 D 0.982 0.956 0.910 F 0.003 0.005 0.019 Fig. 4. D plot for DCT, SVD and proposed method against different AWGN levels when size of duplicate region is 64 × 64. Fig. 5. D plot for DCT, SVD and proposed method against differentGaussian blurring(w=5) when size of duplicate region is 64 × 64. Fig. 6. D plot for DCT, SVD and proposed method against different JPEG compression quality levels when size of duplicate region is 64 × 64. Fig. 7. F plot for DCT, SVD and proposed method against different AWGNlevels when size of duplicate region is 64 × 64. Fig. 8. F plot for DCT, SVD and proposed method against different Gaussian blurring (w=5) when size of duplicate region is 64 × 64. on tampered images respectively. From Fig.3 and Table I- III it is evident that our method performs accurately in presence of post-processing operations. To evaluate the performance of the proposed method the experiments were performed on other two well-known existing methods, DCT [1] and SVD [4]. Fig. 9. F plot for DCT, SVD and proposed method against different JPEG compression quality levels when size of duplicate region is 64 × 64. Comparison results of performance in terms of average D/F are shown in Fig. 4-9. From the graph it can be easily inferred that the proposed method out performs the several other methods in terms of accuracy and false detection rate in presence of AWGN, Gaussian blurring, and JPEG compression. IV. CONCLUSION In this paper a hybrid method has been proposed for copy-move image forgery detection, making use of spatial and transform domain. The L*a*b* color space is used to extract color information and then SVDis applied on L*a*b* components to get transform domain features. The experimental results show that the proposed algorithm can efficiently detect copy-move forgery and precisely locate the duplicated regions. It also exhibits high robustness to post processing operations like Gaussian blurring, AWGN, and JPEG compression.Extensive simulation results exhibit that the proposed method significantly outperforms many other well-known techniques. REFERENCES
  • 5. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 NITTTR, Chandigarh EDIT -2015 192 [1] J. Fridrich, D. Soukal, and J. Lukas, “Detection of copy–move forgery in digital images”, in Proceedings of Digital Forensic Research Workshop, Cleveland, pp. 55–61, August 2003. [2] Popescu, H. Farid, “Exposing digital forgeries by detecting duplicated image regions”, Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004. [3] W. Luo, J. Huang, and G. Qiu, “Robust detection of region-duplication forgery in digital image”, in 18th international Coriference on Pattern Recognition,(ICPR'06), vol. 4. IEEE, pp. 746-749, 2006. [4] Kang and S. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics”, inProceedings of International Conference on Computer Science and Software Engineering,vol. 3. IEEE, pp. 926–930, 2008. [5] Mahdian, S. Saic, “Detection of copy-move forgery using a method based on blurmoment invariants”, Forensic science international,vol. 171, no. 2, pp. 180-189, Sep. 2007. [6] G. Li, Q. Wu, D. Tu, and S. Sun, “A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries based on DWT and SVD”, in Proceedings of IEEE International Conference on Multimedia and Expo, Beijing, pp. 1750-1753, July 2007. [7] J. Zhang, Z. Feng, and Y. Su, “A new approach for detecting copy– move forgery in digital images”, in IEEE Singapore International Conference on Communication Systems, pp. 362–366, 2008. [8] J. Zhao and J. Guo, “Passive forensics for copy-move image forgery using a method based on DCT and SVD”, Forensic Science International, pp. 158–166, 2013. [9] S. A. Fattah, M. M. I. Ullah, M. Ahmed, I. Ahmmed, and C. Shahnaz, “A scheme for copy-move forgery detection in digital images based on 2D-DWT”, IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 801- 804, 2014. [10] R. Lukac and K. Plataniotis,“Color Image Processing: Methods and Applications”, CRC Press, 2006. [11] The USC-SIPI Image Database: http://sipi.usc.edu/database/. [12] Kodak Lossless True Color Image Suite: http://r0k.us/graphics/kodak/