Analysis of Digital Image Forgery Detection Using Adaptive Over-Segmentation Based On Feature Point Extraction and Matching
Analysis of Digital Image Forgery Detection Using Adaptive Over-Segmentation Based On Feature Point Extraction and Matching
checking other for other blocks. When the features are properties such as noise, color and texture dont change
extracted and matched then we get to know which regions and make the recognition process troublesome.
the host image has been forged.
B. Image Forgery using Splicing
These methods are common in use for forgery detection,
but they are having following drawbacks: 1) there is very Image splicing uses cut-and-paste systems from one or a
high computational complexity as there is division of lot of pictures to make another pretend image. once
image into overlapped regions. 2) To deal with the conjunction is performed exactly, the borders between the
geometrical transformation of the forgery area is difficult. spliced regions will visually be unbearable. Splicing,
3) There is a low recall rate due to host image division in however, disturbs the high order Fourier statistics. These
regular blocks. insights will so be utilized as a locality of identifying
phony. Figure 2, demonstrates an honest sample of image
To address the shortcomings of the prevailing methods, we conjunction during which images the photographs the
tend to propose a unique copy-move forgery detection images of the shark and also the eggbeater ar unified into
scheme exploitation adaptive over-segmentation and have one picture.
purpose matching during this paper. The adaptive Over-
Segmentation algorithm is projected to adaptively divide
the host image into non-overlapping and irregular blocks.
Then the feature points are extracted from every block and
matched with every other to seek out the tagged feature
points which might approximately indicate the suspected
forgery regions. And finally the tagged feature points are
processed and also the morphological operation is applied
to get the detected forgery regions.
Fig 1. (a) original Image (i) ; (b) copy Image (ii);
2. TYPES OF DIGITAL IMAGE FORGERY (c) forged image
Now days fake images have become more in society. C. Image Resampling
Tampering images are common for making controversies.
For example, it can be used for sensational news, spread To make associate astounding fake image, some elite
political news and rumors. As the quality of pictures regions got to undergo geometric transformations like
suffers, it's necessary to plot techniques so as to verify rotation, scaling, stretching, skewing, flipping and then
their genuineness and trait of pictures. forth. The interpolation step plays a vital role within the
resampling method and introduces non-negligible applied
Picture sterilization is characterized as adding, changing, mathematics changes. Resampling introduces specific
or deleting some vital options from a picture while not periodic correlations into the image. These correlations
exploit any obvious trace. There are totally different are often utilized to acknowledge phony caused by
techniques used for formation a picture. Taking under resampling. In Figure three, the image on the left is that the
consideration the ways wont to create cast pictures, digital original image whereas the one on the proper is that the
image forgery are often isolated into 3 primary cast image obtained by rotation and scaling it.
classifications: Copy-Move forgery, Image splice, and
Image resampling.
A. Copy-Move Forgery
In copy move forgery, in original image some part of the
image with any size is copies and pasted in that only in
some area of image it can be show in figure1. As the copied Fig 2. (a) The real image (b) final result of image
part originated from the same image, its essential retouching
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1569
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
3.1 Detecting Duplicated Image Irene Amerini et al. (2011) proposed a method to support
image forgery detection based on SIFT algorithm. Thus, the
A technique that works by 1st applying principal element algorithm is used to detect the regions which are
analysis to little mounted - size image blocks to yield a duplicated and determine the geometric transformation
reduced dimension illustration was planned by Alin C applied to perform such tampering. But, the main
Popescu et al. (2004). Whereas performing arts the on top drawbacks of this technique, it is unable to detect the
of technique we are able to realize some duplicate pictures image with uniform texture and salient keypoints.
(noises). Then the duplicate regions are detected by
lexicographically (the follow of aggregation 3.6 Exposing Transform-invariant Features
dictionaries).Sorting the whole image blocks. This can be
terribly wonderful and actual appropriate technique to Pravin Kakar et al. (2012) has proposed a method based
yield a reduced dimension illustration. Its sensitive to jpeg on transforming-invariant features. These got y utilizing
lossy compression and additionally it's additive to noise. the features from MPEG-7 image signature devices.This
method achieved good results, accuracy and extremely low
3.2 Fast Copy-Move Forgery Detection false positives. Thus, these features are invariant to
common image processing operations. This method cannot
A methodology to discover copy- move forgery by detect regions which have undergone affine
dividing the image into overlapping blocks of equal size, transformations and/or multiply copied.
extracting feature for every block and representing it as a
vector and typing all the extracted feature vectors 4. PROPOSED METHOD
victimization the base sort, was planned by Hwei-jen
sculpture et.al (2009). Base type dramatically reduces the For the forgery detection process lot of importance is
time complexness and also the adopted options enhance given from the past years. In this paper adaptive over
the aptitude of resisting of varied attacks like JPEG segmentation and feature point matching methods are
compression and mathematician noise. Each potency and used to detect the forgery region. The overall overview of
high detection rates are incontestable. this method is explained in the Fig.1.
Forgery (| | | | | |)
Region
Input Blocks (IB)
Block Feature
Extraction
{
Labeled Feature
Points (LFP)
Where S means the initial size of the superpixels; M N
indicates the size of the host image; and P LF means the
Adaptive Block percentage of the low-frequency distribution
Block Feature (BF) feature matching
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1571
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
The proposed Adaptive Over-Segmentation method can D. Forgery Region Extraction Algorithm
divide the host image into blocks with adaptive initial sizes After gathering the LFP (labeled feature points) then we
according to the given host images, with which each image have to locate the forgery region. The extracted LFP
can be determined to be an appropriate block initial size to regions are taken as the forgery regions. To get the more
enhance the forgery detection results. accuracy of the forgery region forgery region algorithm is
used. The LFP region is replaced with the small super
B. Block Feature Extraction Algorithm pixels to get the suspected regions (SR). The superpixels
are segmented from the host image. To get the more
In the adaptive over segmentation the host image is precision and recall rates the LFP of the super pixels that
divided into image blocks after that the block features are are neighbors of the suspected regions (SR) are also
extracted from the image blocks by using the block feature measured.
extraction algorithm. The image block content is mainly
affected by these feature extraction and these features are
non-resistance to the various image transformation
techniques. So in this method the feature points are
extracted from the each image block as block features and
these are not affected by image scaling, rotation, and JPEG
compression. The main feature point extraction methods Input : Label Feature
Output: Detected
which are used in this proposed method are SIFT and Points (LFP)
Forgery Regions
SURF. Compared to the previous techniques this method is
robust. When the experiment results are compared SIFT
will give better performance compared to the other feature Small super-pixels Morphology
extraction methods. So in this every block will contain the Replacement Processing
irregular block region information and the extracted SIFT
feature points.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1572
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
5. EXPERIMENTAL RESULTS
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1573
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
Fig 8: Adaptive over segmentation Fig 12: Analysis of F1 Measure (a) JPEG Compression,
(b) Rotation, (c) Noise Scale and (d) Median filter.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1574
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
6. CONCLUSION
This work proposes for Image forgery detection using To detect the forgery regions more accurately, and the
adaptive over segmentation and feature point matching. In forgery region extraction algorithm, which replaces the
forgery detection method proposes block based and key feature points with small super pixels as feature blocks
points integrates scheme, first the proposed adaptive over and then merges the neigh boring blocks that have similar
segmentation algorithm segments the host image into non local color features into the feature blocks to generate the
overlapping and irregular blocks adaptively. Then, the merged regions.
feature points are extracted from each block as block
features, and the block features are matched with one
another to locate the labeled feature points; this procedure
can approximately indicate the suspected forgery regions.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1575
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
[8] A. E. Dirik, S. Bayram, H. T. Sencar, And N. Memon, Mr. U.SATHISH KUMAR is currently
"New Features To Identify Computer Generated Images," working as assistant professor in
In Image Processing, 2007. Icip 2007. Ieee International Acharya Nagarjuna University from
Conference On, 2007, Pp. Iv-433-Iv-436. last 3 years. Currently he is pursuing
[9] M. Kharrazi, H. T. Sencar, And N. Memon, "Blind Source his Ph.D degree. His research interest
Camera Identification," In Image Processing, 2004. Icip'04. includes in Computer Science and
2004 International Conference On, 2004, Pp. 709-712. Engineering in Data mining, image
processing and Soft computing.
[10] M.-J. Tsai And G.-H. Wu, "Using Image Features To
Identify Camera Sources," In Acoustics, Speech And Signal
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1576