Você está na página 1de 4

A SURVEY ON COPY MOVE FORGERY

DETECTION TECHNIQUES
J T Pramod#, Sreedhar Rajput #
#
ECE Department, MITS,
Madanapalle, A.P
1pramodjt@mits.ac.in

2sreedharrajput@gmail.com

Abstract— Digital images are a powerful tool of image. Image splicing is the process of adding two
communication medium now a days. Image authenticity different images to create a new image. Currently in
is very much important because it is going to be used in this paper we are discussing about detection of copy
many areas such as law firms, medical sciences, media move forgery.
etc. as a proof. But due to the advanced technologies
available now it’s very easy to manipulate the image
which is termed as forgery. Copy move forgery is the
II. COPY-MOVE FORGERY
type of image forgery in which one part of the image is Copy move forgery is the type of image forgery in
hidden by covering with some other part of the same which a part of the image is overridden by some
image. This copy move forgery detection is one of the another part of the same image. Here both the source
most progressive research topic now a days. Several and target part of the image are parts of the same
algorithms to detect this type of forgery have been
image. The example of copy move image forgery is
proposed. In this paper evaluation of the performance of
different techniques to detect copy move forgery is done
shown in the below figure.
by considering different metrics.

Index Terms—forgery, tool, progressive research,


metrics. (Key words)

I. INTRODUCTION
From past few decades images have become the
proof of occurrence of the events in life. Due to the Fig 1(a): Original Image Fig 1(b): Tampered Image
diversification of use of computers in different fields
of modern life has given a very much importance to In the above figures, fig (a) is the original image
the digital images. Low cost and great availabilities of and the fig (b) is the tampered image .in fig (b) the top
hardware and software tools made the image middle flower is covered by the greenery in the image.
operations such as creating, editing and manipulating Copy-Move forgery is performed with the intention to
the images more easy now a days. Hence to consider make an object “disappear” from the image by
the image as a proof or evidence is not justifiable. The covering it with a small block copied from another part
authenticity of digital images has now become of the same image. Since the copied segments come
volatile. This situation made it questionable the use from the same image, the color palette, noise
digital images as a proof in law, in forensic science, in components, dynamic range and the other properties
sports, in news and in business etc. Hence the will be compatible with the rest of the image, thus it is
detection of forgeries in digital images has become an very difficult for a human eye to detect. There are
emerging research topic now a days. Copy move many approaches are proposed to detect the copy
image forgery is the type of image forgery in which move forgery in digital images. One of the simplest
both the source and target regions are from the same approach is performing exhaustive search.
image, hence both the parts contains same values for In this approach the image is overlaid by its
properties such as brightness, illumination etc. the circularly shifted version and search for approximate
forgery detection in digital images are broadly matching parts of image is done. This method is
classified in to two types namely active approaches simple and more suitable for small images. For an
and passive approaches. Active approaches are digital image with dimensions (M x N) it will take (MN)2
image watermarking and signature analysis. steps to complete the testing. Hence this method is
Both these techniques require an external input to computationally expensive for medium and large
be verified. This method is not very much suited for dimensional images. Other technique used is
all types of images because there are so many images autocorrelation for copy move forgery. Since the
in internet available without any signature incurred in forged part of the image is also from the same image
it. Passive approaches are much suitable to these type there is a correlation between original and duplicated
of images because they doesn’t require any external regions. Although this method is simple practically it
input except input required to detect the forgery in fails in detection of copy move forgery.
images. There are three techniques widely used in
manipulating the digital image. They are image
retouching, image slicing and copy move forgery.
Image retouching doesn’t alter the major portion of the
III. BLOCK-BASED ALGORITHMS covariance matrix of a dataset to minimize the
redundancy and maximize the variance. The PCA is
Now other approach for detecting copy move
computed by determining the eigenvectors and
forgery is block matching procedure. Here in this
eigenvalues of the covariance matrix. The covariance
approach the image is divided into overlapping blocks
matrix is used to measure how much the dimensions
and each block is compared based on some of the
vary from the mean with respect to each other. The
features extracted from it with the remaining. The idea
covariance of two random variables (dimensions) is
here is to detect connected blocks that are copied and
their tendency to vary together as:
moved. The copied region would consist many
overlapping blocks. The distance between each 𝑐𝑜𝑣(𝑋; 𝑌) = 𝐸[𝐸[𝑋] − 𝑋] . 𝐸[𝐸[𝑌] − 𝑌] (1)
duplicated block pair would be same since each block
are moved with same amount of shift. The next step is Where E[X] and E[Y] denote the expected value of X
to extract the feature from each block. Here the and Y respectively.
duplicated block and source block will have almost
similar values of the features then the extracted KPCA (Kernel-PCA) proposed by Bashar et al.
features are vectorised and placed in a matrix. This Kang et al. Kernel PCA (KPCA) was derived from
matrix is lexicographically sorted and then the vectors PCA as a nonlinear feature extraction method,
with almost similar values are grouped together, Theoretically, KPCA may be viewed as a combination
which represents the copied and moved blocks in the of the following two procedures: the first procedure
image. This block matching procedure is explained as implicitly transforms the input space into a higher-
below. dimensional feature space, and the second one carries
out PCA in the feature space. By virtue of so-called
Input image kernel functions, KPCA is computationally tractable
compared to other nonlinear methods.
C. Intensity-based
Divide into The intensity based feature extraction approach
overlapping blocks used to perform the average of red, green and blue
components generally. Additionally dimensional
information of blocks (LUO) method is proposed by
Luo et al. Bravo-Solorio et al., proposed a method
Feature Extraction which calculate the entropy of a block as a
discriminating feature (BRAVO). Lin et al. (LIN)
computed the average grayscale intensities of a block
and its sub-blocks. Wang et al. used the mean
Lexicographical
intensities of circles with different radii around the
sorting
block center (CIRCLE).
D. Frequency based
Locating the copy Frequency based algorithms uses DCT, DWT and
move forgery FMT to perform feature extraction. They are
explained briefly below.
1) DCT: Fridrich et al., proposed the use of 256
Detection result coefficients of the discrete cosine transform (DCT) as
features [1]. , the Discrete Cosine Transform (DCT)
attempts to decorrelate the image data. After
Fig 2: Block matching procedure decorrelation each transform coefficient can be
encoded independently without losing the
The Feature Extraction methods using block-based Compression efficiency. Decorrelation, Energy
approach are mainly categorized in to four categories. Compaction, seperability and symmetry are the four
They are dimensionality reduction based, and distinct properties of the DCT that makes the feature
frequency domain-based, intensity-based and moment extraction more efficient. The 2-D DCT functions
based features. which can be applied to image are given by,
Forward transform:
A. Dimensionality reduction-based
𝑀−1 𝑁−1
Dimensionality reduction based methods uses PCA 2 (2𝑖 + 1)𝑚𝜋 (2𝑗 + 1)𝑛𝜋
𝑋(𝑚, 𝑛) = 𝑢(𝑚)𝑢(𝑛) ∑ ∑ 𝑥(𝑖, 𝑗)𝑐𝑜𝑠 𝑐𝑜𝑠 ,
𝑁 2𝑀 2𝑁
(Principle Component Analysis) and KPCA (Kernel- 𝑖=0 𝑗=0

PCA). Computed the singular values of a reduced- 𝑓𝑜𝑟 𝑚 = 0,1, … . , 𝑀 − 1, 𝑛 = 0,1, … . , 𝑁 − 1. (2)
rank approximation (SVD).

Inverse transform:
𝑀−1 𝑁−1
B. PCA and KPCA 2 (2𝑖 + 1)𝑚𝜋 (2𝑗 + 1)𝑛𝜋
𝑥(𝑖, 𝑗) = ∑ ∑ 𝑢(𝑚)𝑢(𝑛)𝑋(𝑚, 𝑛) cos 𝑐𝑜𝑠 ,
PCA is a method that projects a dataset to a new 𝑁 2𝑀 2𝑁
𝑚=0 𝑛=0
coordinate system by determining the eigenvectors 𝑓𝑜𝑟 𝑖 = 0,1, … . , 𝑀 − 1, 𝑗 = 0,1, … . , 𝑁 − 1. (3)
and eigenvalues of a matrix. It involves calculation of
Where X (m, n) are the DCT Coefficients and x(i,j) are same value even if the image is rotated to a particular
the image samples in block. Here we consider the angle.
image size as MxN.
The discrete cosine transform is calculated for each IV. KEY POINT-BASED ALGORITHMS
block and stored in a row of matrix which contains the Unlike block-based algorithms, key point-based
coordinates of the block starting point at the end of the methods rely on the identification and selection of
row. Then this matrix is sorted lexicographically and high-entropy image regions (i.e. the “key points”). A
the rows which are having same values are treated as feature vector is then extracted per key point.
copied regions and those blocks are highlighted as Consequently, fewer feature vectors are estimated,
forged parts. resulting in reduced computational complexity of
2) DWT: The coefficients of a discrete wavelet feature matching and post-processing. The lower
transform (DWT) using Haar-Wavelets were number of feature vectors dictates that post processing
proposed as features by Bashar et al. [3]the wavelet thresholds are also to be lower than that of block-based
transform gives the analysis of the data both in time as methods. A drawback of key point methods is that
well as frequency domains. The technique proposed copied regions are often only sparsely covered by
by Jing Zhang et al [9] works by applying DWT to matched key points. If the copied regions exhibit little
input image to yield a reduced dimension structure, it may happen that the region is completely
representation. Then the phase correlation is missed. We examined two different versions of key
computed to estimate the spatial offset between the point based feature vectors. One uses the SIFT
copied region and the pasted region. The copy-move features while the other uses the SURF features they
regions can then be located by the idea of pixel are denoted as SIFT and SURF, respectively [4][7].
matching, which is shifting the input image according Comparison of different algorithms based on feature
to the spatial offset and calculating the difference vector length is done in below table.
between image and its shifted version. SIFT: The SIFT approach, for image feature
generation, takes an image and transforms it into a
The DWT transform also reduces the
"large collection of local feature vectors" the f local
dimensionality of the image based on the scaling
features extracted through the following three stages,
factor we consider. This will gives a better
explained here shortly
performance in data compression. The DWT used to
project the image in to frequency domain and the sub- TABLE I
band which contains maximum information is selected
COMPARISON OF DIFFERENT ALGORITHMS
(most likely LL sub-band) and then these values are
stored in a matrix and that matrix is lexicographically Feature
GROUP Methods
sorted and the rows with similar values are get traced vector length
and the blocks of image corresponds to that rows are BLUR 24
considered as the forged parts of the image. Moments HU 5
ZERNIKE 12
3) FMT: Bayram et. al [8] suggested a method by PCA -
Dimensionality
applying Fourier Mellin Transform (FMT) on the SVD -
reduction
image block. They first obtained the Fourier transform KPCA 192
representation of each block, re-sampled the resulting LUO 7
magnitude values into log-polar coordinates. Then BRAVO 4
Intensity
they obtained a vector representation by projecting LIN 9
CIRCLE 8
log-polar values onto 1-D and used these
DCT 256
representations as our features.
Frequency DWT 256
E. Moment based FMT 45
SIFT 128
Key point
1) Blur invariant moments: These moments are SURF 64
proposed by Mahdian and Saic.[8] This method used
to identify the copied part even though it is blurred to Here by analyzing the fig (2) and fig (3) we notice
isolate the edge discontinuities. Generally, relation that the DCT and DWT methods have highest length
between the ideal image f and the observed image g is of feature vector followed by KPCA. The larger the
described as 𝑔 = 𝐷 (𝑓), where D is a degradation length of feature vector the more accurate detection
operator. In the case of a linear shift-invariant imaging capability the method have. But it has the time
system, D usually has a form of limitation since having larger feature vector length
𝑔 = 𝜏 (𝑓 ) ∗ ℎ + 𝑛 (4)
will take more time for detection.
where h is the point-spread function (PSF) of the
system, n is an additive random noise. We want to
define a function which again reproduces f from g.
That type of function is applied to each and every
block and the coefficients are stored in a matrix and
comparison of the so obtained values is done to find
out the copied and forged parts of the image.
2) Zernike moments: Ryu et al [9] proposed the
use of Zernike moments. These Zernike moments are
the rotation invariant moments which are having the
Comparison Chart
REFERENCES
[1] J. Fridrich, D. Soukal, and J. Lukas, “Detection of copymove
300 256 256 forgery in digital images,” Proceedings of the Digital
192 Forensic Research Workshop. Cleveland OH, USA, 2003.
200 [2] A.C.Popescu and H.Farid, “Exposing digital forgeries by
detecting duplicated image regions,” Dartmouth College,
100 24 Hanover, New Hampshire, USA: TR2004-515, 2004
5 12
[3] Qiong Tu Dan Sun Shaojie Li, Guohui Wu, “A sorted
0 neighborhood approach for detecting duplicated regions in
image forgeries based on dwt and svd,” ICME, 2007.
[4] “Detection of Region Duplication Forgery in Digital Images
Using SURF” B.L.Shivakumar and Lt. Dr. S.Santhosh Baboo
IJCSI International Journal of Computer Science Issues, Vol.
8, Issue 4, No 1, July 2011
[5] Rafael C. Gonzalez, Richard E. Woods, Steven
Fig (3): Chart comparison of different algorithms L.Eddins,“Digital Image Processing using
MATLAB”,Second Edition, Pearson Publications, 2004.
V. CONCLUSION [6] Sunil Kumar, P. K. Das, Shally. “Copy-Move Forgery
Detection in Digital Images: Progress and Challenges”
In this paper we reviewed several papers to know International Journal on Computer Science and Engineering
the recent development in the field of Copy-Move (IJCSE) February 2011.
digital image forgery detection. All the methods which [7] H. Huang, W. Guo, and Y. Zhang, “Detection of Copy-Move
Forgery in Digital Images Using SIFT Algorithm,” in
have been suggested draw strengths from different Pacific-Asia Workshop on Computational Intelligence and
transforms to make them robust against post Industrial Application, vol. 2, Dec. 2008, pp. 272–276.
processing and to reduce the number of logical blocks [8] J. Flusser, T. Suk, S. Saic, Image features invariant with
to compare. Different feature extraction techniques respect to blur, Pattern Recogn. 28 (1995) 1723–1732.
[9] Detection of Copy-Rotate-Move Forgery Using Zernike
which provides the detection capability of different Moments by Seung-Jin Ryu, Min-Jeong Lee, and Heung-
moves to hide the forgery are discussed. DCT, DWT Kyu Lee
and FMT are frequency domain feature extraction [10] Sevinc Bayram, Taha Sencar, and Nasir Memon, “An
techniques. In these methods feature extraction is done efficient and robust method for detecting copy-move
forgery,” in Proceedings of ICASSP 2009, 2009.
by using 2-D forward transforms and the feature [11] Jing Zhang,Zhanlei Feng,Yuting Su,” A New Approach for
vectors are calculated. The FMT algorithms works for Detecting Copy-Move Forgery in Digital Images” IEEE
the case of only slight rotation. Blur invariant ICCS 2008,pp 362-366.
moments and Zernike moments are the blur and
rotation invariant feature extraction techniques. The
above mentioned techniques are block matching
techniques. Also selection of block size poses
problem, Two Key point based methods are also
proposed, they are SIFT and SURF. Applied these
techniques on forged images and the results are
recorded for the purpose of evaluating which
technique works better for which type of image. These
different methods proposed diversify the process of
forgery detection in digital images. Sophisticated tools
and advanced manipulation techniques have made
forgery detection a challenging one. Digital image
forensic is still a growing area and lot of research
needed to be done.

Você também pode gostar