ABSTRACT
Post-processing operations on a copy–move tampered image makes tampering detection a challenge. Most of the existing techniques are unable to address all the problems simultaneously. This paper presents a block-based technique, which addresses all these problems effectively. Here, at first, the approximate band coefficients are extracted using Contourlet Transform for further steps as it reduces the dimensionality as well as the effects of noise. Then Harris’ matrix is used to find the dominant direction of the block to counter the rotation. Finally, singular values of blocks are calculated using singular value decomposition, which works as a feature vector. The efficacy of the proposed algorithm has been verified through extensive simulations and comparisons with several other challenging copy–move image tampering detection techniques.
Disclosure statement
No potential conflict of interest was reported by the authors.
Notes on contributors
Surbhi Sharma received her B.Tech. degree in Electronics and Communication from Kurukshetra University, India in 2004 and M.Tech degree in Electronics and Communication Engineering from MMU University, Mullana, Haryana, India in 2010. She worked as an Assistant Professor in Electronics and Communication Engineering at National Institute of Technology, Kurukshetra and National Institute of Technology, Delhi. Now, she is a Ph.D. research scholar at National Institute of Technology, Kurukshetra and her research interests are image processing, computer vision and machine learning.
Umesh Ghanekar received his Ph.D. degree from National Institute of Technology, Kurukshetra. He is a Professor in the department of Electronics and Communication Engineering at National Institute of Technology, Kurukshetra and has teaching experience of more than 28 years. His research interests are communication engineering, Image processing, signal processing, optical communication, audio visual engineering.
ORCID
Surbhi Sharma http://orcid.org/0000-0002-8079-9486
Umesh Ghanekar http://orcid.org/0000-0002-2529-3984
Image notes
All images can be accessed through the following digital repositories:
Images in figures 1, 5, 7 and 8 are taken from http://lci.micc.unifi.it/labd/2015/01/copy-move-forgery-detection-and-localization/
Images in figure 4 is taken from https://blogs.mathworks.com/steve/2011/09/27/digital-image-processing-using-matlab-reading-image-files/
Images in figure 6 is taken from http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm/