278
Views
1
CrossRef citations to date
0
Altmetric
Articles

Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators

ORCID Icon, ORCID Icon & ORCID Icon
Pages 330-345 | Received 17 Jan 2017, Accepted 08 Jul 2017, Published online: 19 Apr 2018

References

  • Singh R, Kaur M. Copy move tampering detection techniques: a review. Inter J Appl Eng Res. ISSN 0973-4562. 2016;11(5):3610–3615.
  • Chauhan D, Kasat D, Jain S, et al. Survey on keypoint based copy-move forgery detection methods on image. International conference on computational modeling and security (CMS 2016). Procedia Comput Sci. 2016;85:206–212. doi: 10.1016/j.procs.2016.05.213
  • Granty R, Aditya T, Madhu S. Survey on passive methods of image tampering detection. In: 2010 International Conference on Communication and Computational Intelligence (INCOCCI). Proceedings of a meeting held 2010 Dec 27–29; Erode, India. Institute of Electrical and Electronics Engineers (IEEE); 2010. p. 431–436.
  • Gupta A, Saxena N, Vasistha SK. Detecting copy move forgery using DCT. Inter J Sci Res Publ. 2013;3(5), ISSN 2250-3153.
  • Parashar N, Tiwari N. A survey of digital image tampering techniques. Inter J Signal Process, Image Process Pattern Recogn. 2015;8(10 ):91–96.
  • Chauhan N, Agarwal A. A survey on image tampering using various techniques. IOSR J Comput Eng (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727. 2017;19(3):97–101. Ver. II
  • Abd Warif NB, Abdul Wahab AW, Idna Idris a MY, et al. Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl. 2016;75:259–278. doi: 10.1016/j.jnca.2016.09.008
  • Singh R, Kaur M. Copy move tampering detection techniques: a review. Inter J Appl Eng Res. ISSN 0973-4562. 2016;11(5):3610–3615. © Research India Publications.
  • Huang Y, Lu W, Sun W, et al. Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int. 2011;206:178–184. doi: 10.1016/j.forsciint.2010.08.001
  • Sadeghi S, Jalab HA, Dadkhah S. Efficient copy-move forgery detection for digital images. World Acad Sci Eng Technol. 2012;71:543–546.
  • Li Y. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int. 2013;224:59–67. doi: 10.1016/j.forsciint.2012.10.031
  • Lee J-C, Chang C-P, Chen W-K. Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci (Ny). 2015;321:250–262. doi: 10.1016/j.ins.2015.03.009
  • Al-Qershi OM, Khoo BE. Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci. Int. 2013;231:284–295. doi: 10.1016/j.forsciint.2013.05.027
  • Pan X, Lyu S. Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur. 2010;5(4):852–867. doi: 10.1109/TIFS.2010.2078506
  • Amerini I, Ballan R, Caldelli R, et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Security. 2011;6(3):1099–1110. doi: 10.1109/TIFS.2011.2129512
  • Amerini I, Ballan R, Caldelli R, et al. Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process, Image Commun. 2013;28(6):659–669. doi: 10.1016/j.image.2013.03.006
  • Bo X, Junwen W, Guangjie L, and Yuewei D. Image copy-move forgery detection based on SURF. In Multimedia Information Networking and Security (MINES). Proceedings of a meeting held 2010 Nov 4–6; Nanjing, China. Institute of Electrical and Electronics Engineers (IEEE); 2010. p. 889–892.
  • Zhang G-q, Wang H-j. SURF-based detection of copy-move forgery in flat region. Int J Adv Comput Technol. 2012;4(17):521–529.
  • Yap PT, Jiang X, Kot AC. Two dimensional polar harmonic transforms for invariant image representation. IEEE Trans Pattern Anal Mach Intell. 2010;32:1259–1270. doi: 10.1109/TPAMI.2009.119
  • Hosny KM, Darwish MM. A kernel-based method for fast and accurate computation of PHT in polar coordinates. J Real Time Image Process. 2016: 1–13. doi;10.1007/s11554-016-0622-y. (Online first).
  • Xin Y, Pawlak M, Liao S. Accurate computation of Zernike moments in polar coordinates. IEEE Trans Image Process. 2007;16 (2):581–587. doi: 10.1109/TIP.2006.888346
  • Hosny KM, Shouman MA, Abdel-Salam HM. Fast computation of orthogonal Fourier-Mellin moments in polar coordinates. J Real Time Image Process. 2011;6(2):73–80. doi: 10.1007/s11554-009-0135-z
  • Travis D. Effective color displays. Theory and practice. Academic Press; 1991; ISBN 0-12-697690-2.
  • Gonzalez RC, Woods RE. Digital image processing. Reading (MA): Addison-Wesley; 1992; 716.
  • Ardizzone E, Bruno A, Mazzola G. Copy-Move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur. 2015;10:2084–2094. doi: 10.1109/TIFS.2015.2445742
  • Powers DM. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J Mach Learn Technol. 2011;2(1):37–C63.
  • Ryu S, Kirchner M, Lee M, et al. Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur. 2013;8(8):1355–1370. doi: 10.1109/TIFS.2013.2272377
  • Wang J, Liu G, Zhang Z, et al. Fast and robust forensics for image region-duplication forgery. Acta Autom Sin. 2010;35(12):1488–1495. doi: 10.3724/SP.J.1004.2009.01488
  • J. Fridrich, D. Soukal, and J. Luk´ǎs, Detection of copy-move forgery in digital images, in Proceedings of Digital Forensic Research Workshop, Aug. 2003.
  • Bashar M, Noda K, Ohnishi N, et al. Exploring duplicated regions in natural images. IEEE Trans Image Process. 2016. doi:10.1109/TIP.2010.2046599.
  • Deoli M, Joshi J. A fast and robust approach to detect copy-move forgery in digital images. Int J Comput Appl. 2016;137(5):29–33.
  • Khan S, Kulkarni A. An efficient method for detection of copy-move forgery using discrete wavelet transform. Inter J Comput Sci Eng. 2010;2(5):1801–1806.
  • Christlein V, Riess C, Jordan J, et al. An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur. 2012;7(6):1841–1854. doi: 10.1109/TIFS.2012.2218597
  • Martin D, Fowlkes C, Tal D, et al. A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. Proceedings of the 8th International Conference Computer Vision; 2001 July, Vol. 2, p. 416–423.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.