Research Article

Copy-Move Forgery Detection using DCT and SIFT

by  Amanpreet Kaur, Richa Sharma
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Issue 7
Published: May 2013
Authors: Amanpreet Kaur, Richa Sharma
10.5120/11977-7847
PDF

Amanpreet Kaur, Richa Sharma . Copy-Move Forgery Detection using DCT and SIFT. International Journal of Computer Applications. 70, 7 (May 2013), 30-34. DOI=10.5120/11977-7847

                        @article{ 10.5120/11977-7847,
                        author  = { Amanpreet Kaur,Richa Sharma },
                        title   = { Copy-Move Forgery Detection using DCT and SIFT },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 70 },
                        number  = { 7 },
                        pages   = { 30-34 },
                        doi     = { 10.5120/11977-7847 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Amanpreet Kaur
                        %A Richa Sharma
                        %T Copy-Move Forgery Detection using DCT and SIFT%T 
                        %J International Journal of Computer Applications
                        %V 70
                        %N 7
                        %P 30-34
                        %R 10.5120/11977-7847
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital images are the most prevalent way to spread a message. So the authenticity of images is very essential. But due to advancement of the technology the editing of images has become very effortless. Copy-move forgery is most basic technique to alter an image. In this one part of image is copied, called as snippet, and pasted within same image and most likely post-processing it. Considerable number of algorithms is proposed to detect different post-processing on snippet of image. In this paper novel approach is proposed to detect combination of different post-processing operations by single method. It is analyzed that block-based features method DCT is robust to Gaussian noise and JPEG compression, secondly the keypoint-based feature method SIFT is robust to rotation and scaling. Thus by combining SIFT and DCT we are able to detect forgery under post-processing operations of rotation, scaling, Gaussian noise, and JPEG compression and thus the efficiency to detect forgery improves.

References
  • Redi Judith, Taktak Wiem, Dugelay Jean-Luc, "Digital image forensics: a booklet for beginners," Multimedia Tools and Applications, vol. 51, no. 1, pp. 133-162, 2011.
  • J. Fridrich, D. Soukal, and J. Lukas. "Detection of Copy-Move Forgery in digital Images" Proceedings of Digital Forensic Research Workshop, 2003.
  • A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Technical Report TR2004-515, Dartmouth College, 2004.
  • W . Luo, J. Huang, and G. Qiu, "Robust Detection of Region Duplication Forgery in Digital Image," in Proceedings of the 18th International Conference on Pattern Recognition, vol. 4, pp. 746-749, 2006.
  • G. Li, Q. Wu, D. Tu, and S. J. Sun, "A sorted neighbourhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proceedings of IEEE ICME, Beijing, China, 2007.
  • D. G. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 2, no. 60, pp. 91-110, 2004.
  • I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, "A SIFT-based Forensic Method for Copy-Move Attack Detection and Transformation Recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011.
  • V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An Evaluation of Popular Copy-Move Forgery Detection Approaches," IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1841-1854, 2012.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Digital image forensics copy-move forgery keypoint-based and block-based methods SIFT and DCT

Powered by PhDFocusTM