Image Forgery Detection Based on Trigonometric Transforms

Document Type : Original Article

Authors

1 Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.

2 Engineering Department, Nuclear Research center, Atomic Energy Authority, Cairo, Egypt.

Abstract

Image forgery detection is the basic key to solve many problems, especially with regard to the social problems such as those in Facebook, and court cases. Copy-move forgery is the type of forgery where a part of the image is copied to other location of the same image to hide important information or duplicate certain objects in the original image which makes the viewer suffer from difficulties to detect the forged region. In this type of image forgery, it is easy to perform forgery, but more difficult to detect it, because the features on the copied parts are similar to those of other parts of the image. This paper presents a comparison study between different trigonometric transforms in 1D and 2D for detecting the forgery parts in the image. This comparison study is based on the completeness rate and the time of processing for the detection. This comparison concludes that the DFT in 1D or 2D implementation is the best choice to detect copy-move forgery compared to other trigonometric transforms. The proposed algorithm can also be used for active forgery detection because of its robustness to detect the manipulation of digital watermarked images or images with signatures.

Keywords


1] V. Nath, R. Gaharwar, and G. Gaharwar, "Comprehensive study of different
types image forgeries," international conference of Recent Advances Engineering
Science and Mangement, New Delhi, 30 August 2015.
[2] N. B. A. Warif, K. K. R. Choo , A. W. A. Wahab, S. Shamshirband, R. Ramli,
R. Salleh, and M. Y. I. Idris, "Copy-move forgery detection: Survey, challenges

 h: 0px; "> and future directions," Journal of Network and Computer Applications, vol. 75, pp.
259-278, 2016.
[3] A. J. Fridrich, A. J. Lukáš, and B. D. Soukal, "Detection of copy-move
forgery in digital images," in Proceedings of Digital Forensic Research Workshop,
2003.
[4] H. Farid and A. Popescu, "Exposing digital forgeries by detecting duplicated
image regions. Department Computer Science, Dartmouth College, Technology
Report TR2004-515," ed, 2004.
[5] G. Li, Q. Wu, S. Sun, and D. Tu, "A sorted neighborhood approach for
detecting duplicated regions in image forgeries based on DWT and SVD," in
Multimedia and Expo, 2007 IEEE International Conference on, 2007, pp. 1750-
1753.
[6] B. Mahdian and S. Saic, "Detection of copy–move forgery using a method
based on blur moment invariants," Forensic science international, vol. 171, pp.
180-189, 2007.
[7] G. Lynch, H.-Y. M. Liao, and F. Y. Shih, "An efficient expanding block
algorithm for image copy-move forgery detection," Information Sciences, vol. 239,
pp. 253-265, 2013.
[8] I. Amerini, G. Serra, A. Del Bimbo, R. Caldelli , and L. Ballan, "A sift-based
forensic method for copy–move attack detection and transformation recovery,"
IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1099-1110,
2011.
[9] M. Jaberi, G. Muhammad, M. Hussain, and G. Bebis, "Accurate and robust
localization of duplicated region in copy–move image forgery," Machine vision
and applications, vol. 25, pp. 451-475, 2014.
[10] L. Li, X. Wu, H. Zhu, and S. Li, "Detecting copy-move forgery under affine
transforms for image forensics," Computers & Electrical Engineering, vol. 40, pp.
1951-1962, 2014.
[11] M. Zandi, A. Mansouri, and A. Mahmoudi-Aznaveh, "Adaptive matching for
copy-move Forgery detection," in Information Forensics and Security (WIFS),
2014 IEEE International Workshop on, 2014, pp. 119-124.
[12] Y. Cao, Q. Yang, L. Fan, and T. Gao, "A robust detection algorithm for copymove forgery in digital images," Forensic science international, vol. 214, pp. 33-43,
2012.
[13] S. Winograd, "On Computing the Discrete Fourier Transform," Mathematics
of Computation, pp. 175-199, 1978.
[14] Z. M. Hafed and M. D. Levine, "Face recognition using the discrete cosine
transform," International Journal of Computer Vision, vol. 43, pp. 167-188, 2001.
[15] K. Amolins, P. Dare, and Y. Zhang, "Wavelet based image fusion
techniques—An introduction, review and comparison," ISPRS Journal of
Photogrammetry and Remote Sensing, vol. 62, pp. 249-263, 2007.
[16] D. T. Dang-Nguyen, G. Boato, V. Conotter, and C. Pasquini, "RAISE: a raw
images dataset for digital image forensics," in Proceedings of the 6th ACM
Multimedia Systems Conference, 2015, pp. 219-224.
[17] T. Acharya and C. Chakrabarti, "A survey on lifting-based discrete wavelet
transform architectures," Journal of VLSI signal processing systems for signal,
image and video technology, vol. 42, pp. 321-339, 2006.
[18] A. Fridrich, et al., Detection of Copy-move Forgery in Digital Images, 2003.
[19] Y. Huang, D. Long, W. Sun, and W. Lu, "Improved DCT-based detection of
copy-move forgery in images," Forensic science international, vol. 206, pp. 178-
184, 2011.
[20] A. Popescu and H. Farid, Exposing digital forgeries by detecting duplicated
image
regions, Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.