Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 267691, 8 pages
http://dx.doi.org/10.1155/2013/267691
Research Article

Region Duplication Forgery Detection Technique Based on SURF and HAC

1School of Information Technology, RGPV, Bhopal, Madhya Pradesh 462036, India
2University Institute of Technology, RGPV, Bhopal, Madhya Pradesh 462036, India

Received 16 August 2013; Accepted 17 September 2013

Academic Editors: H. Cheng, H.-E. Tseng, and Y. Zhang

Copyright © 2013 Parul Mishra et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Bayram, H. T. Sencar, and N. Memon, “A survey of copy-move forgery detection techniques,” in Proceedings of the IEEE Western New York Image Processing Workshop, pp. 538–542, September 2008.
  2. W. Luo, Z. Qu, F. Pan, and J. Huang, “A survey of passive technology for digital image forensics,” Frontiers of Computer Science in China, vol. 1, no. 2, pp. 166–179, 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Lyu and H. Farid, “How realistic is photorealistic?” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 845–850, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. J. A. Redi, W. Taktak, and J. Dugelay, “Digital image forensics: a booklet for beginners,” Multimedia Tools and Applications, vol. 51, no. 1, pp. 133–162, 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. H. Farid, “Image forgery detection,” IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16–25, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Sridevi, C. Mala, and S. Sanyam, “Comparative study of image forgery and copy-move techniques,” in Advances in Computer Science, Engineering & Applications, pp. 715–723, Springer, Berlin, Germany, 2012. View at Google Scholar
  7. H. Farid, “Seeing is not believing,” IEEE Spectrum, vol. 46, no. 8, pp. 44–51, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Nizza and P. J. Lyons, In an Iranian Image, A Missile Too Many. The Lede, News Blog, The New York Times, New York, NY, USA, 2008.
  9. S. D. Mahalakshmi, K. Vijayalakshmi, and S. Priyadharsini, “Digital image forgery detection and estimation by exploring basic image manipulations,” Digital Investigation, vol. 8, no. 3, pp. 215–225, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841–1854, 2012. View at Google Scholar
  11. A. J. Fridrich, B. D. Soukal, and A. J. Lukáš, “Detection of copy-move forgery in digital images,” in Proceedings of the Digital Forensic Research Workshop, Cleveland, Ohio, USA, August 2003.
  12. A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Tech. Rep. TR2004-515, Department of Computer Science, Dartmouth College, 2004. View at Google Scholar
  13. S. Bayram, H. T. Sencar, and N. Memon, “An efficient and robust method for detecting copy-move forgery,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 1053–1056, IEEE, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. B. Mahdian and S. Saic, “Detection of copy-move forgery using a method based on blur moment invariants,” Forensic Science International, vol. 171, no. 2, pp. 180–189, 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. S. J. Ryu, M. J. Lee, and H. K. Lee, “Detection of copy-rotate-move forgery using Zernike moments,” in Information Hiding, pp. 51–65, Springer, Berlin, Germany, 2010. View at Google Scholar
  16. G. Liu, J. Wang, S. Lian, and Z. Wang, “A passive image authentication scheme for detecting region-duplication forgery with rotation,” Journal of Network and Computer Applications, vol. 34, no. 5, pp. 1557–1565, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. G. Li, Q. Wu, D. Tu, and S. Sun, “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '07), pp. 1750–1753, IEEE, July 2007. View at Scopus
  18. Y. Li, “Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching,” Forensic Science International, vol. 224, pp. 159–367, 2012. View at Google Scholar
  19. S. Bravo-Solorio and A. K. Nandi, “Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics,” Signal Processing, vol. 91, no. 8, pp. 1759–1770, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, 2004. View at Publisher · View at Google Scholar · View at Scopus
  21. K. Mikolajczyk and C. Schmid, “A performance evaluation of local descriptors,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 10, pp. 1615–1630, 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Huang, W. Guo, and Y. Zhang, “Detection of copy-move forgery in digital images using sift algorithm,” in Proceedings of the Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA '08), vol. 2, pp. 272–276, IEEE, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. E. Ardizzone, A. Bruno, and G. Mazzola, “Detecting multiple copies in tampered images,” in Proceedings of the 17th IEEE International Conference on Image Processing (ICIP '10), pp. 2117–2120, IEEE, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. X. Pan and S. Lyu, “Region duplication detection using image feature matching,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 857–867, 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. I. Amerini, L. Ballan, R. Caldelli, A. del Bimbo, and G. Serra, “A SIFT-based forensic method for copy-move attack detection and transformation recovery,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099–1110, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. P. Kakar and N. Sudha, “Exposing postprocessed copy-paste forgeries through transform-invariant features,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1018–1028, 2012. View at Google Scholar
  27. I. Amerini, L. Ballan, R. Caldelli, A. del Bimbo, L. del Tongo, and G. Serra, “Copy-move forgery detection and localization by means of robust clustering with J-linkage,” Signal Processing, vol. 28, no. 6, pp. 659–669, 2013. View at Google Scholar
  28. D. Vázquez-Padín and F. Pérez-González, “Exposing original and duplicated regions using SIFT features and resampling traces,” in Digital Forensics and Watermarking, pp. 306–320, Springer, Berlin, Germany, 2012. View at Google Scholar
  29. L. N. Zhou, Y. B. Guo, and X. G. You, “Blind copy-paste detection using improved SIFT ring descriptor,” in Digital Forensics and Watermarking, pp. 257–267, Springer, Berlin, Germany, 2012. View at Google Scholar
  30. X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, “Image copy-move forgery detection based on SURF,” in Proceedings of the 2nd International Conference on Multimedia Information Networking and Security (MINES '10), pp. 889–892, IEEE, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  31. B. L. Shivakumar and S. S. Baboo, “Detection of region duplication forgery in digital images using SURF,” International Journal of Computer Science Issues, vol. 8, no. 4, p. 199, 2011. View at Google Scholar
  32. H. Bay, T. Tuytelaars, and L. van Gool, “Surf: speeded up robust features,” in Computer Vision-ECCV, 2006, pp. 404–417, Springer, Berlin, Germany, 2006. View at Google Scholar
  33. J. S. Beis and D. G. Lowe, “Shape indexing using approximate nearest-neighbour search in high-dimensional spaces,” in Proceedings of the 1997 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1000–1006, June 1997. View at Scopus
  34. T. Hastie, R. Tibshirani, and J. J. H. Friedman, The Elements of Statistical Learning, Volume 1, Springer, New York, NY, USA, 2001.
  35. http://www.micc.unifi.it/ballan/research/image-forensics/.