SlideShare a Scribd company logo
1 of 11
Research Scholar’s Conclave presentation
on
Digital Image Forgery Detection using
Salient Keypoint Selection
Presented By:
Nitish Kumar
Ph.D. Scholar
Dept. of Electronics and Communication
Under the Guidance of:
Dr. Toshanlal Meenpal
Introduction
• With the advancement of image editing techniques, authenticity and reliability of digital image
has become very challenging.
• Realistic visual effect can be achieved in such a way that forged images are visually
indistinguishable from real ones.
• Image forgery aims to deliver deceptive information through the image graphic content.
• Image forensics verify the authenticity, ownership, and copyright of an image and detect changes
to the original image.
Fig.1 Example of a forged image
Types of Image Forgery:
Image Forgery
Copy-move
Forgery
Image Splicing
Forgery
Image
Inpainting
Forgery
Fig.2 Types of image forgery
Clues of Image Forgery:
Table I. Forgery detection clues for different forgery techniques
Tampering
Clues
Copy-move Inpainting Splicing
Region Duplication Yes Yes No
Edge Anomaly
(Sharp Edges)
Yes No Yes
Edge Anomaly
(Blurred Edges)
Yes No Yes
Region Anomaly
(JPEG Double
Quantization)
No Yes Yes
Region Anomaly
(Lighting
inconsistency)
No No Yes
Region Anomaly
(Camera trace
inconsistency)
No No Yes
Proposed Copy-move Forgery Detection
Fig.3 Framework of proposed salient keypoint-based copy-move image forgery detection
Selection of Salient Keypoints
• Salient keypoints are selected by
ranking the keypoints based on 3
parameters.
1) Distinctiveness: How different
the keypoint is from the rest of
the keypoints in the image.
2) Detectability: How robustly the
keypoints can be detected under
viewpoint/lighting changes.
3) Repeatability: It refers to the
ability of keypoints to remain
invariant to various
transformations.
Fig.4 Visualization of reduction in number of keypoints
Results and Discussion
Fig.5 Comparison of number of keypoints for four
different images of size 512 x 512.
Fig.6 Detection of copy-move forgery on CoMoFoD dataset
where a) original image, b) forged image c) detection result
Cont..
Author Methods FPR Precision F1 Score
Hashmi et. al DyWT and SIFT 10.00 88.89 85.00
Ojeniyi et al. DCT and SURF 6.36 93.86 95.45
Niyishaka et al. DoG and ORB - 90.09 86.24
Liu et. al CKN 7.27 93.16 96.03
Soni et al. SURF and 2NN 8.4 - -
Proposed Salient SIFT and KAZE 3.6 96.22 94.87
Table II. Comparison of proposed method with existing
techniques on the MICC-F220 dataset.
Author Methods FPR Precision F1 Score
Malviya et. al Auto colour correlogram 16 95.65 93.62
Soni et al. LBP-HP 7.40 - -
Mahmood et al. SWT - 95.76 96.05
Niyishaka et. al Blob and BRISK 9 96.84 94.35
El Biach et al. Encoder-decoder - - 81.56
Proposed Salient SIFT and KAZE 6 97.90 95.73
Table III. Comparison of proposed method with existing
techniques on the CoMoFoD dataset.
Conclusion and Future Scope
• In this work keypoint-based copy–move forgery detection has been proposed
using SIFT and KAZE features.
• Salient keypoints are selected for reduction in number of keypoints.
• Proposed detection approach has been evaluated on CoMoFoD and MICC-F220
datasets and gives promising results under geometric transformations and common
post-processing operations.
• As a future work, detection of other image forgery approach can be proposed.
• Robust detection algorithm can also be proposed which can detect any kind of
image forgery.
References
1Zheng L, Zhang Y
, Thing VL. A survey on image tampering and its detection in real-world photos. J Visual
Commun Image Represent. 2019;58:380–399. doi:10.1016/j.jvcir.2018.12.022.
2Hashmi MF, Anand V, Keskar AG. Copy-move image forgery detection using an efficient and robust method
combining un-decimated wavelet transform and scale invariant feature transform. Aasri Procedia. 2014; 9:84–
91.
3Niyishaka P, Bhagvati C. Digital image forensics technique for copy-move forgery detection using DOG and
ORB. International conference on computer vision and graphics; 2018. p.472–483.
4 Niyishaka P, Bhagvati C. Copy-move forgery detection using image blobs and brisk feature. Multimedia
ToolsAppl. 2020;79(35):26045–26059. doi:10.1007/s11042-020-09225-6.
5X. Niu, H. Han, S. Shan, and X. Chen, “Synrhythm: Learning a deep heart rate estimator from general to
specific,” in 2018 24th International Conference on Pattern Recognition (ICPR), pp. 3580–3585, IEEE, (2018).
6 Mukherjee P, Lall B. Saliency and KAZE features assisted object segmentation. Image Vis Comput.
2017;61:82–97.Available from: https://www.sciencedirect.com/science/article/pii/S0262885617300537.
7Lowe DG. Object recognition from local scale-invariant features. Proceedings of the Seventh IEEE
International Conference on Computer Vision; 1999. Vol. 2, p. 1150–1157.
8 Alcantarilla PF, Bartoli A, Davison AJ. KAZE features. In: Fitzgibbon A, Lazebnik S, Perona P, Sato Y
,
Schmid C, editors. Computer vision eccv 2012. Berlin (Heidelberg): Springer; 2012. p. 214–227.
researchconclavenitish-220715141929-be03069b (1).pptx

More Related Content

Similar to researchconclavenitish-220715141929-be03069b (1).pptx

A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniques
ijtsrd
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
sipij
 
DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW
DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAWDAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW
DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW
miorliam
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
journalBEEI
 

Similar to researchconclavenitish-220715141929-be03069b (1).pptx (20)

Image Forgery Detection Using Deep Neural Network
Image Forgery Detection Using Deep Neural NetworkImage Forgery Detection Using Deep Neural Network
Image Forgery Detection Using Deep Neural Network
 
Salient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdfSalient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdf
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering Detection
 
A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniques
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learning
 
20120140502012
2012014050201220120140502012
20120140502012
 
20120140502012
2012014050201220120140502012
20120140502012
 
ppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptxppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptx
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
 
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURESRECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
 
winter project
winter projectwinter project
winter project
 
ERROR LEVEL ANALYSIS IN IMAGE FORGERY DETECTION
ERROR LEVEL ANALYSIS IN IMAGE FORGERY DETECTIONERROR LEVEL ANALYSIS IN IMAGE FORGERY DETECTION
ERROR LEVEL ANALYSIS IN IMAGE FORGERY DETECTION
 
DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW
DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAWDAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW
DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 

More from NiharikaDubey17 (10)

Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
 
Circuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods PresentationCircuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods Presentation
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
ImageProcessing1-Introduction.ppt
ImageProcessing1-Introduction.pptImageProcessing1-Introduction.ppt
ImageProcessing1-Introduction.ppt
 
Basics Of Networking and routing.ppt
Basics Of Networking and routing.pptBasics Of Networking and routing.ppt
Basics Of Networking and routing.ppt
 
ch09.ppt
ch09.pptch09.ppt
ch09.ppt
 
Computer Science Proposal.pptx
Computer Science Proposal.pptxComputer Science Proposal.pptx
Computer Science Proposal.pptx
 
Computer Science Proposal Sample.pptx
Computer Science Proposal Sample.pptxComputer Science Proposal Sample.pptx
Computer Science Proposal Sample.pptx
 
234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSORINTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
TanishkaHira1
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
Compressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI ApplicationsCompressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI Applications
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSORINTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

researchconclavenitish-220715141929-be03069b (1).pptx

  • 1. Research Scholar’s Conclave presentation on Digital Image Forgery Detection using Salient Keypoint Selection Presented By: Nitish Kumar Ph.D. Scholar Dept. of Electronics and Communication Under the Guidance of: Dr. Toshanlal Meenpal
  • 2. Introduction • With the advancement of image editing techniques, authenticity and reliability of digital image has become very challenging. • Realistic visual effect can be achieved in such a way that forged images are visually indistinguishable from real ones. • Image forgery aims to deliver deceptive information through the image graphic content. • Image forensics verify the authenticity, ownership, and copyright of an image and detect changes to the original image. Fig.1 Example of a forged image
  • 3. Types of Image Forgery: Image Forgery Copy-move Forgery Image Splicing Forgery Image Inpainting Forgery Fig.2 Types of image forgery
  • 4. Clues of Image Forgery: Table I. Forgery detection clues for different forgery techniques Tampering Clues Copy-move Inpainting Splicing Region Duplication Yes Yes No Edge Anomaly (Sharp Edges) Yes No Yes Edge Anomaly (Blurred Edges) Yes No Yes Region Anomaly (JPEG Double Quantization) No Yes Yes Region Anomaly (Lighting inconsistency) No No Yes Region Anomaly (Camera trace inconsistency) No No Yes
  • 5. Proposed Copy-move Forgery Detection Fig.3 Framework of proposed salient keypoint-based copy-move image forgery detection
  • 6. Selection of Salient Keypoints • Salient keypoints are selected by ranking the keypoints based on 3 parameters. 1) Distinctiveness: How different the keypoint is from the rest of the keypoints in the image. 2) Detectability: How robustly the keypoints can be detected under viewpoint/lighting changes. 3) Repeatability: It refers to the ability of keypoints to remain invariant to various transformations. Fig.4 Visualization of reduction in number of keypoints
  • 7. Results and Discussion Fig.5 Comparison of number of keypoints for four different images of size 512 x 512. Fig.6 Detection of copy-move forgery on CoMoFoD dataset where a) original image, b) forged image c) detection result
  • 8. Cont.. Author Methods FPR Precision F1 Score Hashmi et. al DyWT and SIFT 10.00 88.89 85.00 Ojeniyi et al. DCT and SURF 6.36 93.86 95.45 Niyishaka et al. DoG and ORB - 90.09 86.24 Liu et. al CKN 7.27 93.16 96.03 Soni et al. SURF and 2NN 8.4 - - Proposed Salient SIFT and KAZE 3.6 96.22 94.87 Table II. Comparison of proposed method with existing techniques on the MICC-F220 dataset. Author Methods FPR Precision F1 Score Malviya et. al Auto colour correlogram 16 95.65 93.62 Soni et al. LBP-HP 7.40 - - Mahmood et al. SWT - 95.76 96.05 Niyishaka et. al Blob and BRISK 9 96.84 94.35 El Biach et al. Encoder-decoder - - 81.56 Proposed Salient SIFT and KAZE 6 97.90 95.73 Table III. Comparison of proposed method with existing techniques on the CoMoFoD dataset.
  • 9. Conclusion and Future Scope • In this work keypoint-based copy–move forgery detection has been proposed using SIFT and KAZE features. • Salient keypoints are selected for reduction in number of keypoints. • Proposed detection approach has been evaluated on CoMoFoD and MICC-F220 datasets and gives promising results under geometric transformations and common post-processing operations. • As a future work, detection of other image forgery approach can be proposed. • Robust detection algorithm can also be proposed which can detect any kind of image forgery.
  • 10. References 1Zheng L, Zhang Y , Thing VL. A survey on image tampering and its detection in real-world photos. J Visual Commun Image Represent. 2019;58:380–399. doi:10.1016/j.jvcir.2018.12.022. 2Hashmi MF, Anand V, Keskar AG. Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. Aasri Procedia. 2014; 9:84– 91. 3Niyishaka P, Bhagvati C. Digital image forensics technique for copy-move forgery detection using DOG and ORB. International conference on computer vision and graphics; 2018. p.472–483. 4 Niyishaka P, Bhagvati C. Copy-move forgery detection using image blobs and brisk feature. Multimedia ToolsAppl. 2020;79(35):26045–26059. doi:10.1007/s11042-020-09225-6. 5X. Niu, H. Han, S. Shan, and X. Chen, “Synrhythm: Learning a deep heart rate estimator from general to specific,” in 2018 24th International Conference on Pattern Recognition (ICPR), pp. 3580–3585, IEEE, (2018). 6 Mukherjee P, Lall B. Saliency and KAZE features assisted object segmentation. Image Vis Comput. 2017;61:82–97.Available from: https://www.sciencedirect.com/science/article/pii/S0262885617300537. 7Lowe DG. Object recognition from local scale-invariant features. Proceedings of the Seventh IEEE International Conference on Computer Vision; 1999. Vol. 2, p. 1150–1157. 8 Alcantarilla PF, Bartoli A, Davison AJ. KAZE features. In: Fitzgibbon A, Lazebnik S, Perona P, Sato Y , Schmid C, editors. Computer vision eccv 2012. Berlin (Heidelberg): Springer; 2012. p. 214–227.