116
Views
0
CrossRef citations to date
0
Altmetric
Articles

Dominating direction based an efficient copy–move image tampering detection technique

ORCID Icon & ORCID Icon
Pages 254-262 | Received 10 Mar 2017, Accepted 10 Jun 2017, Published online: 10 Jan 2018
 

ABSTRACT

Post-processing operations on a copy–move tampered image makes tampering detection a challenge. Most of the existing techniques are unable to address all the problems simultaneously. This paper presents a block-based technique, which addresses all these problems effectively. Here, at first, the approximate band coefficients are extracted using Contourlet Transform for further steps as it reduces the dimensionality as well as the effects of noise. Then Harris’ matrix is used to find the dominant direction of the block to counter the rotation. Finally, singular values of blocks are calculated using singular value decomposition, which works as a feature vector. The efficacy of the proposed algorithm has been verified through extensive simulations and comparisons with several other challenging copy–move image tampering detection techniques.

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes on contributors

Surbhi Sharma received her B.Tech. degree in Electronics and Communication from Kurukshetra University, India in 2004 and M.Tech degree in Electronics and Communication Engineering from MMU University, Mullana, Haryana, India in 2010. She worked as an Assistant Professor in Electronics and Communication Engineering at National Institute of Technology, Kurukshetra and National Institute of Technology, Delhi. Now, she is a Ph.D. research scholar at National Institute of Technology, Kurukshetra and her research interests are image processing, computer vision and machine learning.

Umesh Ghanekar received his Ph.D. degree from National Institute of Technology, Kurukshetra. He is a Professor in the department of Electronics and Communication Engineering at National Institute of Technology, Kurukshetra and has teaching experience of more than 28 years. His research interests are communication engineering, Image processing, signal processing, optical communication, audio visual engineering.

Image notes

All images can be accessed through the following digital repositories:

Images in figures 1, 5, 7 and 8 are taken from http://lci.micc.unifi.it/labd/2015/01/copy-move-forgery-detection-and-localization/

Images in figure 4 is taken from https://blogs.mathworks.com/steve/2011/09/27/digital-image-processing-using-matlab-reading-image-files/

Images in figure 6 is taken from http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.