Passive Techniquesof Digital Image Forgery Detection Developmentsand Challenges
Passive Techniquesof Digital Image Forgery Detection Developmentsand Challenges
net/publication/320703095
CITATIONS READS
20 8,392
2 authors:
All content following this page was uploaded by Santoshini Panda on 08 November 2018.
Abstract. Photographs and images play an important role in our life but, in this
technology era, equipped with powerful, low cost and easy to use photo editing tools,
people often forge photographs. This practice has posed a question mark on the
trustworthiness of images. Because carefully edited and forged images are very hard
to be distinguished from their genuine and original copies therefore, forgery detection
and separation of the forged images from the innocent ones has become a challenging
issue for image analysts. Image forgery detection procedures are generally classified
into two broad categories; the active and the passive detection techniques. This paper
presents a state of the art review of different passive forgery detection techniques
those are proposed by different authors over time.
1. Introduction
Today, photo editing has become a common practice among people because of the
easy to use and freely available image editing tools. Though, all edited images are not
forged but some of those are. When forged images are available in huge numbers, it is
important to detect and separate the genuine copies from the forged lots. Image
forgery detection methods are generally classified into two categories, the active
detection methods and/ or the passive methods. The active methods are generally
termed as authentication techniques and are based on digital signatures or watermarks.
The major drawback of active image authentication is, for verification of the
authenticity of an image, a watermark or a digital signature need to be embedded into
an image at the time of capture or immediately after the image is captured [1]. Passive
forgery detection is an alternative to active authentication which requires no active
information available for the purpose of authentication. These techniques detect
forgery analyzing the image statistics in the absence of watermarks as well as the
original image for comparison.
The passive forgery detection techniques have evolved through several phases
from the non-robust methods to highly robust techniques. The non-robust techniques
fail to detect forgery when the forged image has been subjected to lossy compression,
blurring, rotation, scaling noise attacks etc. On the other hand, the robust methods
succeed in detecting forgeries even if the tampered image is subjected to one or more
of these above mentioned post processing operations. This and the following sub-
section present a brief record of the evolution of the passive detection methods.
Jessica Fridrich, David Soukal and Jan Lukas [9] give the idea about efficient
detection method. First one is an exhaustive search method where an image and its
circularly shifted version are compared for matched parts. Though this is an effective
method the computational complexity of this method is very high it impractical for
making it impossible for practical use even for medium-sized images. The second
method suggested by the authors is the autocorrelation method where the forgery is
localized by the peaks corresponding to the cloned and the original parts in an image.
The Authors also suggested an overlapping block matching method that involves
vectorization and lexicographic sorting. In this method, a square block of b×b pixels
slides through an image one pixel at a time to give (M-B+1) (N-B+1) blocks. These
blocks are matched to locate the clones. The steps of block based exact match are
given in figure 4.
S.Murali et al. [10] in their paper suggested a DCT based method for detecting
forgery in a JPEG compressed image and a standard deviation based edge detection
method. Zhouchen Lin [11] have proposed a robust method based on double
quantization (DQ) effect and have applied a trained SVM (Support Vector machines)
to take tampering decision. According to the authors DQ effect shows periodic peaks
and valleys in the histogram of DCT coefficients and hence can be applied for
tampering detection. Ruchita Singh, Ashish Oberoi and Nishi Goel [12] have used a
DCT and SIFT based method for feature extraction and forgery detection. Zimba and
Xingming [13] proposed two similar algorithms based on PCA and DWT. The
method proposed by Popescu [14] divides an N×N image into K=(N-b+1)2
overlapping. Each block is reshaped into b2 long row vectors and inserted into a K×b2
feature matrix. To improve the time complexity, DWT is applied to the blocks and
hence, the size of the feature vectors is reduced. They also proposed a method [15]
based on principal component analysis and Eigen value decomposition (PCA-EVD)
that reduces the dimension of the feature vectors and improves the computation time.
Babak Mahdian and Stanidlav Saic [16] proposed a blur invariant method that
successfully detects clones even if the cloned regions are blurred and noisy. Zaho
Junhong [17] presented an LLE (Locally Linear Embedding) - a non-liner dimension
reduction technique that detects copy-move forgery as well as fused edges. Sam T.
Roweis et al [18] have also used LLE for tamper localization. Ramandeep Kaur [19]
has used Local binary pattern (LBP) - a texture descriptor for feature extraction and
have used similarity criterion and Euclidean distance threshold for detection of clones.
PCA based robust technique proposed by Popescu and Farid [24] efficiently detects
duplicated region with an computational cost in the order of O(NlogN) but is sensitive
to noise or lossy compression. In paper [25], Amtullah et al. have used a faster and
robust to noise speeded up robust feature (SURF) – a rotation and scale invariant key
point detector and descriptor based algorithm. To identify the duplicated regions, the
authors of [26] have combined KD-tree with SURF. A K-dimensional tree or KD-tree
is a binary tree with nodes as k-dimensional points and is common technique in
nearest neighborhood search. A KD-tree with N-nodes needs Olog2N search
operations. Prerna.C et al. [27] also used KD-tree with SHIFT and RANSAC
(Random Sample Consensus) algorithms. RANSAC algorithm has been used to find
out the unreliable key points. This technique is robust to additive noise and JPEG
compression. There are many more publications [28], [29] on KD-tree based methods
but all are not included here. Authors of [30], [31] have detected clones based on
SIFT algorithm where they have extracted the SIFT descriptors and then matched
those to identify the forgery. The SIFT (scale invariant features transform) algorithm
works in four steps such as, the scale space extrema (SSE) detection, the key-point
localization, orientation assignment and key-point description. This method is claimed
to be robust against noise attack, JPEG compression, rotation and scaling.
W. Luo, J. Huang and G.Qiu [7] in their paper introduced a seven feature based
method that is robust against noise, blur attacks and lossy compression. Najah
Muhammad et al. [32] have used multi-scale segmentation and denoising based
efficient technique for clone detection. This method is claimed to be robust against
noise and blurring attacks. In the paper hybrid copy-move forgery detection technique
using regional similarity indices [33], the authors developed a forgery detection using
local fractal dimension for image segmentation and estimating SSIM (Structural
Similarity Index Measure) between each block pair in each segmented region to
localize the forged regions. S.Bayram et al. [34] have suggested a FMT (Fourier-
Mellin transform) based robust to noise, blur, rotation, scaling and JPEG compression
method. They have used counting bloom filters (CBF) instead of lexicographic sorting
for computation time improvement. Solario et al. [35] have suggested a one
dimensional descriptor invariant to reflection and rotation based on log polar co-
ordinates. In this method, the pixels of overlapping blocks are represented in log polar
co-ordinates and summed along the angle to obtain the descriptor.
3.3 Comparison of Different Forgery Detection Methods
A comparison of various important forgery detection techniques evolved from time to
time is given in the table 1 below.
References:
[1] Haouzia A., Noumeir R.: Methods for image authentication: a survey.
Multimedia Tools and Applications, 39(1), pp.1–46, (2008).
[2] Mishra M., Adhikary M.C.: Digital Image Tamper Detection Techniques - A
Comprehensive Study. International Journal of Computer Science and
Business Informatics, 2(1), pp.1-12, (2013).
[3] Kaur H., Kaur K.: A Brief Survey of Different Techniques for Detecting
Copy-Move Forgery. International Journal of Advanced Research in
Computer Science and Software Engineering, 5(4), pp. 875-882, (2015).
[4] Shah H., Shinde p., and Kukreja J.: Retouching Detection and Steganalysis.
International Journal of Engineering Innovation & Research, 2(6), pp. 487-
490, (2013).
[5] Gupta A., Saxena N., and Vasistha S.K.: Detecting Copy-Move Forgery
Using DCT. International Journal of Scientific and Research Publications,
3(5), pp. 1-4, (2013).
[6] Mishra M., Adhikary M. C.: Detection of Clones in Digital Images.
International Journal of Computer Science and Business Informatics, 9(1),
pp. 91-102, (2014).
[7] Luo, W., Huang, J., and Qiu, G.: Robust detection of region-duplication
forgery in digital image. In: Proceedings of 18th International Conference on
Pattern Recognition IEEE, vol. 4, pp.746-749, ( 2006).
[8] Mishra M., Adhikary M.C.: Robust detection of Intensity Variant Clones in
Forged and JPEG compressed Images. ANVESA, 9(1), pp. 48-60, (2014).
[9] Fridrich, J., Soukal, D., and Lukas, J.: Detection of copy-move forgery in
digital images. In Proceedings of Digital Forensic Research Workshop,
(2003)
[10] Murali S., Govindraj B., Chittapur, Prabhakara H. S., and Basavaraj S.
Anami.: comparison and analysis of photo image Forgery detection
techniques. IJCA, 2 (6), pp. 45-56, (2012).
[11] Zhouchen L.: Fast, automatic and fine-grained tampered JPEG image
detection via DCT coefficient analysis. Pattern Recognition, 42(11), pp.
2492-2501, (2009).
[12] Singh R., Oberoi A., and Goel N.: Copy-Move Forgery Detection on Digital
Images. International Journal of Computer Applications, 98 (9), (2014).
[13] Zimba M., and Xingming S.: DWT-PCA (EVD) based copy-move image
forgery detection. International Journal of Digital Content Technology and
its Application, 5 (1), pp. 251–258, (2011).
[14] Popescu A.C., and Farid H.: Exposing digital forgeries by detecting traces of
resampling. IEEE Transactions on Signal Processing, 53 (2), pp. 758-767,
(2005).
[15] Zimba M., Xingming S.: Fast and robust image cloning detection using block
characteristics of DWT coefficients. International Journal of Digital Content
Technology and its Application, 5(7), pp. 359–367, (2011).
[16] Mahdian B., and Saic S.: Detection of copy–move forgery using a method
based on blur moment invariants. Forensic Science International, 171(2), pp.
180-189, (2007).
[17] Junhong, Z.: Detection of Copy-Move Forgery Based on one Improved LLE
Method. In: Advanced Computer Control (ICACC) IEEE, vol. 4, pp.547-
550, (2010).
[18] Roweis S.T., Saul L.K.: Nonlinear dimensionality reduction by locally linear
embedding. Science, 290(5500), pp. 2323 -2326, (2000).
[19] Kaur R.: Copy-Move Forgery Detection Utilizing Local Binary Patterns.
International Journal of Emerging Technologies in Computational and
Applied Sciences, 7(3), pp.290-294, (2013).
[20] Muhammad, N., Muhammad, H., Muhammad, G., and Bebis, G.: Copy-
Move Forgery Detection using Dyadic Wavelet Transform. In: Computer
Graphics, Imaging and Visualization (CGIV), Eighth International
Conference on IEEE, pp.103-108 (2011).
[21] Wang, X., Zhang, X., Li, Z., and Wang, S.: A DWT-DCT based passive
forensics method for copy-move attacks. In: 2011 Third International
Conference on Multimedia Information Networking and Security, IEEE,
pp.304-308, (2011).
[22] Zhang, J., Feng, Z., and Su, Y.: A New Approach for Detecting Copy-Move
Forgery in Digital Images. In: Communication Systems, 11th IEEE Singapore
International Conference on IEEE, pp.362-366, (2008).
[23] Li, G., Wu, Q., Tu, D., and Sun, S.: A Sorted Neighbourhood Approach for
Detecting Duplicated Regions in Image Forgeries based on DWT and SVD.
In IEEE International Conference on Multimedia and Expo, pp.1750-1753,
(2007)
[24] Popescu A, Farid H.: Exposing digital forgeries by detecting duplicated
image regions. Technical Report TR2004-515, Department of Computer
Science, Dartmouth College, pp.1-1, (2004)
[25] Amtullah S., and Koul A.: Passive Image Forensic Method To Detect Copy-
Move Forgery In Digital Images. IOSR-JCE, 16(2), pp.96-104, (2014).
[26] Shivakumar B.L., and Baboo L.D.S.S.: Detection of Region Duplication
Forgery in Digital Images Using SURF. International Journal of Computer
Science Issues, 8(4), (2011).
[27] Prerna C., Percy G. J., Angaline S., and Thanga B. I.: A key-point based
copy-move forgery detection. International journal of advanced information
science and technology (IJAIST), 12(12), pp.175-180, (2013).
[28] Sagawa, R., Masuda, T., and Ikeuchi, K.: Effective nearest neighbor search
for aligning and merging range images, In: 3-D Digital Imaging and
Modeling, Fourth International Conference on IEEE, (2003) 54-61
[29] Bentley J.L.: Multidimensional binary search trees used for associative
searching. Communications of the ACM, 18(9), pp. 509-517, (1975).
[30] Huang, H., Guo, W., and Zhang, Y.: Detection of Copy-Move Forgery in
Digital Images Using SIFT Algorithm. In: Computational Intelligence and
Industrial Application, Pacific-Asia Workshop on IEEE, vol. 2, pp.272-276,
(2008)
[31] Lowe D.G.: Distinctive Image features from Scale-Invariant Key points.
International Journal of Computer Vision, 60(2), pp. 91-110, (2004).
[32] Muhammad, N., Hussain, M., Muhammad, G., and Bebis, G.: A Non-
Intrusive Method for Copy-Move Forgery Detection, In: International
Symposium on Visual Computing. Springer Berlin Heidelberg, pp.516-525,
(2011).
[33] Oommen R.S., and Jayamohan M.: A Hybrid Copy-Move Forgery Detection
Technique Using Regional Similarity Indices. International Journal of
Computer Science and Information Technology (IJCSIT), 7(4), pp.127-134,
(2015).
[34] Bayram, S., Sencar, T., and Memon, N.: An Efficient and Robust Method
For Detecting Copy-Move Forgery. In: IEEE International Conference on
Acoustics, Speech and Signal Processing, pp.1053-1056, (2009).
[35] Solorio, S. B., and Nandi, A.K.: Passive forensic method for detecting
duplicated regions affected by reflection, rotation and scaling. In: Signal
Processing Conference, 17th European, IEEE, pp.824–828, (2009).