Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 8713202, 13 pages
http://dx.doi.org/10.1155/2016/8713202
Research Article

Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images

1Department of Computer Engineering, University of Engineering and Technology, Taxila 47050, Pakistan
2Department of Software Engineering, University of Engineering and Technology, Taxila 47050, Pakistan
3Department of Computer Science, University of Engineering and Technology, Taxila 47050, Pakistan
4Department of Information Technology, Hazara University, Mansehra 21140, Pakistan
5School of Computer Science and Engineering, Korea University of Technology and Education, Cheonan 330-708, Republic of Korea

Received 1 December 2015; Revised 16 April 2016; Accepted 9 May 2016

Academic Editor: Haipeng Peng

Copyright © 2016 Toqeer Mahmood et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Krawetz, “A pictures worth digital image analysis and forensics,” Black Hat Briefings, 2007.
  2. S. Lian and Y. Zhang, “Multimedia forensics for detecting forgeries,” in Handbook of Information and Communication Security, pp. 809–828, Springer, New York, NY, USA, 2010. View at Google Scholar
  3. Y. Li, “Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching,” Forensic Science International, vol. 224, no. 1–3, pp. 59–67, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Farid, “Digital doctoring: how to tell the real from the fake,” Significance, vol. 3, no. 4, pp. 162–166, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. B. B. Zhu, M. D. Swanson, and A. H. Tewfik, “When seeing isn't believing [multimedia authentication technologies],” IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 40–49, 2004. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Farid, “Image forgery detection: a survey,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16–25, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann, Burlington, Mass, USA, 2007.
  8. M. A. Qureshi and M. Deriche, “A bibliography of pixel-based blind image forgery detection techniques,” Signal Processing: Image Communication, vol. 39, pp. 46–74, 2015. View at Publisher · View at Google Scholar
  9. T. Qazi, K. Hayat, S. U. Khan et al., “Survey on blind image forgery detection,” IET Image Processing, vol. 7, no. 7, pp. 660–670, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. T. Mahmood, T. Nawaz, R. Ashraf et al., “A survey on block based copy move image forgery detection techniques,” in Proceedings of the International Conference on Emerging Technologies (ICET '15), pp. 1–6, Peshawar, Pakistan, December 2015. View at Publisher · View at Google Scholar
  11. J. Fridrich, D. Soukal, and J. Lukáš, “Detection of copy-move forgery in digital images,” in Proceedings of Digital Forensic Research Workshop, Cleveland, Ohio, USA, August 2003.
  12. S. Bayram, H. T. Sencar, and N. Memon, “An efficient and robust method for detecting copy-move forgery,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 1053–1056, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Tech. Rep. TR2004-515, Dartmouth College, Hanover, NH, USA, 2004. View at Google Scholar
  14. Y. Huang, W. Lu, W. Sun, and D. Long, “Improved DCT-based detection of copy-move forgery in images,” Forensic Science International, vol. 206, no. 1–3, pp. 178–184, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. G. Li, Q. Wu, D. Tu, and S. Sun, “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD,” in Proceedings of IEEE International Conference on Multimedia and Expo (ICME '07), pp. 1750–1753, IEEE, Beijing, China, 2007.
  16. B. Mahdian and S. Saic, “Detection of copy-move forgery using a method based on blur moment invariants,” Forensic Science International, vol. 171, no. 2-3, pp. 180–189, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Zhao and J. Guo, “Passive forensics for copy-move image forgery using a method based on DCT and SVD,” Forensic Science International, vol. 233, no. 1–3, pp. 158–166, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Lynch, F. Y. Shih, and H.-Y. M. Liao, “An efficient expanding block algorithm for image copy-move forgery detection,” Information Sciences, vol. 239, pp. 253–265, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Li, S. Li, H. Zhu, S.-C. Chu, J. F. Roddick, and J.-S. Pan, “An efficient scheme for detecting copy-move forged images by local binary patterns,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 46–56, 2013. View at Google Scholar · View at Scopus
  20. M. Jaberi, G. Bebis, M. Hussain, and G. Muhammad, “Accurate and robust localization of duplicated region in copy-move image forgery,” Machine Vision and Applications, vol. 25, no. 2, pp. 451–475, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. L. Li, S. Li, H. Zhu, and X. Wu, “Detecting copy-move forgery under affine transforms for image forensics,” Computers and Electrical Engineering, vol. 40, no. 6, pp. 1951–1962, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Zandi, A. Mahmoudi-Aznaveh, and A. Mansouri, “Adaptive matching for copy-move Forgery detection,” in Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '14), pp. 119–124, Atlanta, Ga, USA, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. J.-C. Lee, C.-P. Chang, and W.-K. Chen, “Detection of copy-move image forgery using histogram of orientated gradients,” Information Sciences, vol. 321, pp. 250–262, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. M. Hussain, S. Qasem, G. Bebis, G. Muhammad, H. Aboalsamh, and H. Mathkour, “Evaluation of image forgery detection using multi-scale weber local descriptors,” International Journal on Artificial Intelligence Tools, vol. 24, no. 4, Article ID 1540016, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841–1854, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Bashar, K. Noda, N. Ohnishi, and K. Mori, “Exploring duplicated regions in natural images,” IEEE Transactions on Image Processing, 2010. View at Publisher · View at Google Scholar
  27. T.-J. Chin and D. Suter, “Incremental Kernel PCA for efficient non-linear feature extraction,” in Proceedings of the British Machine Vision Conference (BMVC '06), vol. 3, pp. 939–948, 2006.
  28. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, MIT Press, Cambridge, Mass, USA, 3rd edition, 2009. View at MathSciNet
  29. Columbia DVMM Research Lab: Columbia Image Splicing Detection Evaluation Dataset, 2004, http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm.
  30. G. Muhammad, M. H. Al-Hammadi, M. Hussain, and G. Bebis, “Image forgery detection using steerable pyramid transform and local binary pattern,” Machine Vision and Applications, vol. 25, no. 4, pp. 985–995, 2014. View at Publisher · View at Google Scholar · View at Scopus