Digital Image Forgery and Techniques of Image Forgery Detection 1
Digital Image Forgery and Techniques of Image Forgery Detection 1
Abstract-Digital images are all around us-from our mobile phones to the pages of online websites. Digital
images are used in almost every field whether it is information forensic, journalism, criminal and forensic
investigations or medical fields and many more. Because of the large availability and popularity of user-friendly
image editing tools and software it become easy to alter the images but such modified images pose some serious
dangers or problems in some fields where the genuineness of image has a prime important and in such fields it
become very difficult to verify the authenticity and probity of digital images. Digital image forgery is the
process of tampering contents of an image that is changing the meaning of image without leaving any detectable
clues. In this paper, we present a review of various types of digital image forgery and forgery detection
techniques.
Index Terms- Digital Image Forensics, Image Forgery, Forgery Detection
1. INTRODUCTION
Digital image forgery deals with digital image. The process of creating fake image has been tremendously
simple with the introduction of powerful computer graphics editing software such as Adobe Photoshop, GIMP,
and Corel Paint Shop, some of which are available for free. There are many cases of digital image forgery. All
of these cases can be categorized into three major groups, based on the process involved in creating the fake
image. The groups are Image Retouching, Image Splicing, and Copy-Move Attack, Morphing.
Image Retouching can be considered to be the less harmful kind of digital image forgery. Image retouching
does not significantly change an image, but instead, enhances or reduces certain feature of an image. This
technique is popular among magazine photo editors. It can be said that almost all magazine cover would employ
this technique to enhance certain features of an image so that it is more attractive; ignoring the fact that such
enhancement is ethically wrong. Fig. 1.1 shows an original image of lady’s face whereas fig. 1.2 shows the
same face with enhanced effects applied to it.
Fig. 1.1 (a) Original image Fig. 1.1 (b) Enhanced image
Image Splicing:
This technique is more aggressive than image retouching. Image Splicing is a technique that involves a
composite of two or more images which are combined to create a fake image. Fig. 1.2 shows a base image. Fig.
1.3 shows shark inside sea. From Fig. 1.3 region occupied by shark is copied and it is pasted below the
helicopter in the base image. This copy-paste operation from one image into another image forms a spliced
image as shown in fig. 1.4.
Fig. 1.2 Base Image Fig. 1.3 Shark Image Fig1.4Base image with shark
pg. 18
www.ijtrs.com
www.ijtrs.org
Paper Id: IJTRS-V1-I4-011 Volume 1 Issue 4, July 2016
ISSN No.: 2454- 2024 (online)
Morphing: It is a special effect in motion pictures and animations that changes one image or shape into another
through a seamless transition. Most often it is used to depict one person turning into another through
technological means or as part of a fantasy or surreal sequence.
Fig. 1.7 (a) Original Fig. 1.7 (b) Forged Fig. 1.7 (c) Original
pg. 19
www.ijtrs.com
www.ijtrs.org
Paper Id: IJTRS-V1-I4-011 Volume 1 Issue 4, July 2016
ISSN No.: 2454- 2024 (online)
Passive method detects the duplicated objects in forged images without need of original image
watermark and depends on traces left on the image by different processing steps during image
manipulation. Passive approach also determines the amount and the location of forgery in the image.
Digital
Image Image
Watermarking Sign/Hash
Statistics Contents
code
3. LITERATURE SURVEY
I Amerini, et al. (2014) proposed a system which could evaluate the effectiveness of the attacking methods
from the side of perceptual image quality; a new version of a SIFT key point removal method based on a
perceptual metric. The author explained the criterion for the choice of the quality metric q(·) and then a
comparison between the proposed system and Counter-forensics of SIFT-based copy-move detection by means
of key point classification , both in terms of key point removal and in terms of final perceptual quality, is
presented. Author has demonstrated that the proposed method obtains the lowest possible impact on visual
quality with respect to the methods presented so far still achieving to remove a relevant number of key points.
Tu K. Huynh, et al.( 2015) presented a survey on Image Forgery Detection (IFD) techniques applied for
both Copy-Move and spliced images. The author has classified the algorithms on the basis of processing input
images with or without transformation before extracting the image features for the copy- move images. For
the spliced images, groups of detection techniques are based on image features or camera features.
Reducing the complexity, increasing the detection rates, researching faster algorithms or building the large
database to test is concluded.
Sushama Kishor Bhandare, et al.(2015) presented a review of the forensic methods for detecting globally and
locally applied contrast enhancement, cut-and-paste forgery, histogram equalization, and noise in the digital
image .Author has concluded that the techniques that are robust against the post processing operations and
anti forensic techniques need to be developed.
Nandini Singhal, et al. (2015) presented a review of techniques for pixel based forgery detection. Two
techniques presented in the paper are copy-move or cloning and fast-copy move detection. In copy-move or
cloning technique a part of the image is copied and pasted into another part of the image which has
limitation of only shifting of copied regions. In order to overcome this limitation another technique fast-
pg. 20
www.ijtrs.com
www.ijtrs.org
Paper Id: IJTRS-V1-I4-011 Volume 1 Issue 4, July 2016
ISSN No.: 2454- 2024 (online)
pg. 21
www.ijtrs.com
www.ijtrs.org
Paper Id: IJTRS-V1-I4-011 Volume 1 Issue 4, July 2016
ISSN No.: 2454- 2024 (online)
Dividing into
overlapping blocks
PCA,DCT,DWT,
Feature extraction FMT,SVD,SIFT,S
URF
Lexicographically
sorting
Locate forged
region
Detection result
Fig. 4.2 Block diagram of copy-move image forgery detection system
PCA: Principal Component analysis, DCT: Discrete Cosine transform, DWT: Discrete Wavelet transform,
SVD: Singular Value decomposition, SIFT: Scale Invariant Feature transform, SURF: Speeded up Robust
features.
Principle Component Analysis (PCA) is a candidate to extract the image features [9]. In the Dartmouth
Computer Science Technical Report of 2004, Alin C Popescu and Hany Farid used PCA to automatically detect
duplicated regions in a digital image. The technique works by first applying a principal component analysis to
small fixed-size image blocks to yield a reduced dimension representation. The representation is robust to minor
variations in the image due to additive noise or lossy compression. Duplicated regions are then detected by
lexicographically sorting all of the image blocks. The efficiency of the proposed technique on credible forgeries,
and its robustness and sensitivity to additive noise and lossy JPEG compression has been shown by the author.
The procedure to produce each feature vector is called principle component analysis in which values are
obtained by using the theorems of covariance matrix, eigenvectors and linear basis for each image block with
the initial conditions of zero-mean. Then a matrix S of block vectors quantized according to number of
quantization bins to reduce the mirror variations created. These quantization coefficients are then sorted
lexicographically and the duplicated regions has been detected by considering the offset of all pairs whose
distances in S less than a specific threshold. To obtain the efficient results, a duplication map is defined by
producing a zero image of the same size as original and assigning all pixels in a duplicated region to a
unique grayscale value. With the dimension of the PCA reduced representation and total number of image
pixels are Nt and N respectively, the algorithm has complexity of O(NtNLogN).
4.3. DCT, DWT
Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) are popular techniques to
transform an input image to the frequency domain before extracting the image features.
Jessica Fridrich, et.al [8] used quantized Discrete Cosine Transform (DCT).The feature vectors are vectors of
quantized DCT coefficients. The quality factor in JPEG compression determines the quantization step for
DCT transform coefficients which is called the user-specified parameter Q. The mutual positions are
considered in case of too many matching blocks having the same shift vector to define a specific block
pair. For the color images, the algorithm requires a color to grayscale conversion. It takes MNlog2(MN)
steps in exact match.
Discrete Wavelet Transform (DWT) is always the potential candidate for research on CMFD. In fact,
many proposed algorithms to detect Copy-Move regions using DWT coefficients. Nandini Singhal, et. al [4]
proposed a system using DWT to detect pixel-based forgery. A forged image is taken as an input image. DWT is
applied to the input image to yield LL1 sub-band. The LL1 sub-band is divided into sub-images. Then phase
correlation is calculated. The offset between the copy-move regions is also calculated. The copy-move region is
pg. 22
www.ijtrs.com
www.ijtrs.org
Paper Id: IJTRS-V1-I4-011 Volume 1 Issue 4, July 2016
ISSN No.: 2454- 2024 (online)
CONCLUSION
The paper surveys the different types of digital image forgery, approaches to detect digital forgery. Specifically
pixel-based forgery detection techniques are discussed. All the methods and approaches discussed in this paper
are able to detect forgery. But some algorithms are not effective in terms of detecting actual forged region. On
the other hand some algorithms have a very high time complexity. So, there is a need to develop efficient and
accurate image forgery detection algorithm, either by combining the existing techniques or by developing new
techniques.
REFERENCES
[1] I Amerini, F. Battisti, R. Caldelli, M. Carli, A. Costanzo, “Exploiting Perceptual Quality Issues In
Countering SIFT-Based Forensic Methods”, IEEE International Conference on Acoustic, Speech and Signal
Processing (ICASSP), p. 2664-2668, 2014.
[2] Tu K. Huynh, Thuong Le-Tien, KhoaV.Huynh, SyC.Nguyen, “A Survey on Image Forgery Detection
Techniques”,The 2015 IEEE RIVF International Conference on Computing & Communication
Technologies Research, Innovation, and Vision for Future (RIVF), p. 71-76, 2015.
[3] Sushama Kishor Bhandare, Nitin Krishnarao Bhil, “Digital Image Forensic”, International Journal of
Advance Research in Computer Science and Software Engineering, p. 839-842, 2015.
[4] Nandini Singhal, Savita Gandhani, “Analysis of Copy-move Forgery Image Forensics: A Review”,
International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.8, No.7, pp.265-
272, 2015.
[5] HarpreetKaur, KamaljitKaur, “A Brief Survey of Different Techniques for Detecting Copy-Move Forgery”,
International Journal of Advanced Research in Computer Science and Software Engineering Volume 5,
Issue 4, p. 875-882, 2015
[6] Mohammad FarukhHashmi, Avinash G. Keskar, “Image Forgery Authentication and Classification using
Hybridization of HMM and SVM Classifier”, International Journal of Security and Its Applications Vol. 9,
No. 4, pp. 125-140, 2015.
[7] Snigdha K. Mankar, Prof. Dr. Ajay A. Gurjar, “Image Forgery Types and Their Detection: A Review”,
International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5,
Issue 4, April 2015.
[8] Jessica Fridrich, David Soukal, and Jan Lukáš, “Detection of Copy Move Forgery in Digital Images”,
Digital Forensic Research Workshop, Cleveland, Ohio, USA, 2003
[9] Alin C Popescu and HanyFarid, “Exposing Digital Forgeries by Detecting Duplicated Image
Regions”, Dartmouth Computer Science Technical Report TR2004-515, USA, August 2004.
pg. 23
www.ijtrs.com
www.ijtrs.org
Paper Id: IJTRS-V1-I4-011 Volume 1 Issue 4, July 2016
ISSN No.: 2454- 2024 (online)
pg. 24
www.ijtrs.com
www.ijtrs.org
Paper Id: IJTRS-V1-I4-011 Volume 1 Issue 4, July 2016