A Methodological Review on Copy-Move Forgery Detection for Image Forensics

A Methodological Review on Copy-Move Forgery Detection for Image Forensics

Resmi Sekhar (Lourdes Matha College of Science and Technology, Thiruvananthapuram, India) and R. S. Shaji (Noorul Islam University, Thuckalay, India)
Copyright: © 2014 |Pages: 16
DOI: 10.4018/ijdcf.2014100103
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Copy-Move forgery is the very prevalent form of image tampering. The powerful image processing tools available freely helps even the naive to tamper with images. A copy-move forgery is performed by copying a region in an image and pasting it in the same image most probably after applying some form of post-processing on the region like rotation, blurring, scaling, double JPEG compression etc. This makes it difficult to develop one common technique to detect copy-move forgery. As a result a considerable number of methods have been developed in view to detect different forms of copy-move forgeries. Those techniques can be classified generally as block based techniques and key- point based techniques. This paper presents an extensive survey on the very recent methods developed for copy-move forgery detection.
Article Preview

Copy Move Forgery Detection

Copy Move forgery is an easy form of image tampering. Figure 1 gives examples for Copy Move attack. In copy-move forgery, a region in the image is copied and pasted in some other part of the same image. As the source and the target regions are from the same image, the image features like noise, colour, illumination condition etc. will be same for the forged region and the rest of the image. This is the basis for all copy-move forgery detection algorithms. Some form of post-processing like rotation, scaling, blurring, noise addition, reflection, compression also are performed before the region is pasted. This makes the forgery detection more complex. So the important step in such a forgery detection technique would be extraction of features, which are invariant to the above said post-processing operations, from the image. A method that is robust to some form of post-processing may not be adequate to detect forgery with another type of post-processing. Figure 1 is an example of copy-move forgery. Figure 1 has been taken from the MICCF220 (Amerini, Ballan, Caldelli, & Sera, 2011) database.

Figure 1.

Image forged by copying and pasting the park lamp

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing