Image Forgery Analyse and Detection

International Journal of Computer Science and Engineering
© 2021 by SSRG - IJCSE Journal
Volume 8 Issue 8
Year of Publication : 2021
Authors : Alhussain Akoum, Samia Bahlak, Nagham Abou Daher

pdf
How to Cite?

Alhussain Akoum, Samia Bahlak, Nagham Abou Daher, "Image Forgery Analyse and Detection," SSRG International Journal of Computer Science and Engineering , vol. 8,  no. 8, pp. 8-12, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I8P102

Abstract:

The popularity of digital photography has risen in recent years, paving the opportunity for new and inventive ways to create photos. Several software programs are now available that may be used to edit images such that they like the original. In the case of any crime, images are used as authenticated proof, and if they do not remain real, it will pose a problem. In recent years, detecting these types of forgeries has become a big difficulty. It's difficult to tell whether a digital image is real or doctored. Finding tampering marks in a digital image is a difficult undertaking. A copy-move image forgery is used to hide an image object or to add more details to the image, resulting in forgery. In both circumstances, image reliability is jeopardized. Although this technology has numerous benefits; it can also be used as a deceptive technique to hide facts and evidences. In this article, we looked at many types of picture forgery and detection strategies; we concentrated mostly on copy move forgery and its detection technique.

Keywords:

Image forgery, Copy move, Detection Technique, Digital image, Tempering marks

References:

[1] M. Ali and M. Deriche, Signal Processing Image Communication, 39 (2015) 46–74.
[2] J. Fridrich, D. Soukal and J. Luk´aˇs, Detection of Copy-Move Forgery in Digital Images, International Journal, 3 (2003) 652–663.
[3] S.Khan, A. Kulkarni, An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform, IJCSE, 2(5) (2010) 1801-1806.
[4] Farid, A survey of image forgery detection, IEEE Signal Process.Mag. 26(2) (2009) 16-25.
[5] J. Fridrich, D. Soukal, and J. Luk´aˇs, Detection of copy-move forgery in digital images, in Proceedings of Digital Forensic ResearchWorkshop, Cleveland, Ohio, USA, August 2003.
[6] Popescu and H. Farid, Exposing digital forgeries by detecting duplicated image regions, Tech. Rep. TR2004-515, Dartmouth College, Hanover, NH, USA, 2004.
[7] Li, Q. Wu, D. Tu, and S. Sun, A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD, in Proceedings of IEEE International Conference on Multimedia and Expo (ICME ’07), (2007) 1750–1753, IEEE, Beijing, China.
[8] B.Mahdian and S. Saic, Detection of copy-move forgery using a method based on blur moment invariants, Forensic Science International, 171(2-3) (2007) 180–189.
[9] [9] J. Zhao and J. Guo, Passive forensics for copy-move image forgery using a method based on DCT and SVD, Forensic Science International, 233(1–3) (2013) 158–166.
[10] Lynch, F. Y. Shih, and H.-Y. M. Liao, An efficient expanding block
algorithm for image copy-move forgery detection, Information Sciences, 239 (2013) 253–265.
[11] L. Li, S. Li, H. Zhu, and X. Wu, Detecting copy-move forgery under affine transforms for image forensics, Computers and Electrical Engineering, 40(6) (2014) 1951–1962.
[12] C.-M. Pun and K.-C. Choi, Generalized integer transform based reversible watermarking algorithm using efficient location map encoding and adaptive thresholding, Computing, 96(10) (2014) 951-973.
[13] X.-C. Yuan and C.-M. Pun , A Geometric Invariant Digital Image Watermarking Based on Robust Feature Detector and Local Zernike Moments, Proceedings of the 9th International Conference Computer Graphics, Imaging and Visualization, Hsinchu, (2012).