Analysis of Copy Move Forgery Detection Process by Applying Fuzzy C Means Algorithm Based on Deep Learning in Digital Image Processing

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 2
Year of Publication : 2024
Authors : V. Parameswaran Nampoothiri, N. Sugitha
pdf
How to Cite?

V. Parameswaran Nampoothiri, N. Sugitha, "Analysis of Copy Move Forgery Detection Process by Applying Fuzzy C Means Algorithm Based on Deep Learning in Digital Image Processing," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 2, pp. 50-59, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I2P106

Abstract:

The popularity of digital photos has developed due to technological advancements in the digital environment. Image alteration has become more manageable thanks to powerful and user-friendly photo editing software programs. Therefore, there was a prerequisite to detect the forged part of the image efficiently. Hence, this work emphasizes passive forgery recognition on images tampered by the copy move method, better called Copy Move Forgery Detection (CMFD). Copy Move Forgery (CMF) was fundamentally concerned with covering or repeating one area in a picture by pasting certain regions of a similar picture. Initially, the input digital images were preprocessed through a Gaussian filter to blur the picture to decrease noise. After preprocessing, Multi-Kernel Fuzzy C-Means clustering (MKFCM) was performed to divide the images into numerous clusters to extract the features based on distinctive attributes using the SIFT method. Lastly, with the deep learning technique, the forged parts of the images were detected. The experimental analysis demonstrates that the method was efficient and robust in identifying the forged part of the digital picture, and the performance of the proposed strategy was established on numerous forged pictures.

Keywords:

Copy Move Forgery Detection, Deep Learning, Digital, Fuzzy C-Means clustering, Gaussian filter.

References:

[1] Shi Wenchang et al., “Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques,” China Communications, vol. 13, no. 1, pp. 139-149, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Badal Soni, Pradip K. Das, and Dalton Meitei Thounaojam, “CMFD: A Detailed Review of Block Based and Key Feature Based Techniques in Image Copy-Move Forgery Detection,” IET Image Processing, vol. 12, no. 2, pp. 167-178, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Rahul Dixit, and Ruchira Naskar, “Review, Analysis and Parameterisation of Techniques for Copy-Move Forgery Detection in Digital Images,” IET Image Processing, vol. 11, no. 9, pp. 746-759, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Anselmo Ferreira et al., “Behavior Knowledge Space-Based Fusion for Copy-Move Forgery Detection,” IEEE Transactions on Image Processing, vol. 25, no. 10, pp. 4729-4742, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mohsen Zandi, Ahmad Mahmoudi-Aznaveh, and Alireza Talebpour, “Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2499-2512, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Yan Wo et al., “Copy-Move Forgery Detection Based on Multi-Radius PCET,” IET Image Processing, vol. 11, no. 2, pp. 99-108, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Xiuli Bi, and Chi-Man Pun, “Fast Copy-Move Forgery Detection Using Local Bidirectional Coherency Error Refinement,” Pattern Recognition, vol. 81, pp. 161-175, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Xiuli Bi, and Pun Chi-Man, “Fast Reflective Offset-Guided Searching Method for Copy-Move Forgery Detection,” Information Sciences, vol. 418-419, pp. 531-545, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Devanshi Chauhan et al., “Survey on Keypoint Based Copy-Move Forgery Detection Methods on Image,” Procedia Computer Science, vol. 85, pp. 206-212, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Andrey Kuznetsov, and Vladislav Myasnikov, “A New Copy-Move Forgery Detection Algorithm Using Image Preprocessing Procedure,” Procedia Engineering, vol. 201, pp. 436-444, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Mona F. Mohamed Mursi, May M. Salama, and Mohamed H. Habeb, “An Improved SIFT-PCA-Based Copy-Move Image Forgery Detection Method,” International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), vol. 6, no. 3, pp. 23-28, 2017.
[Google Scholar]
[12] Mahmoud Emam et al., “A Robust Detection Algorithm for Image Copy-Move Forgery in Smooth Regions,” 2017 International Conference on Circuits, System and Simulation (ICCSS), London, UK, pp. 119-123, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[13] V. Thirunavukkarasu et al., “Nonintrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering,” Wireless Personal Communications, vol. 98, pp. 3039-3057, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Rahul Dixit, Ruchira Naskar, and Swati Mishra, “Blur-Invariant Copy-Move Forgery Detection Technique with Improved Detection Accuracy Utilising SWT-SVD,” IET Image Processing, vol. 11, no. 5, pp. 301-309, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Haodong Li et al., “Image Forgery Localization via Integrating Tampering Possibility Maps,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1240-1252, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Jen-Chun Lee, “Copy-Move Image Forgery Detection Based on Gabor Magnitude,” Journal of Visual Communication and Image Representation, vol. 31, pp. 320-334, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Sondos M. Fadl, and Noura A. Semary, “Robust Copy-Move Forgery Revealing in Digital Images Using Polar Coordinate System,” Neurocomputing, vol. 265, pp. 57-65, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Irene Amerini et al., “Copy-Move Forgery Detection and Localization by Means of Robust Clustering with J-Linkage,” Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva, “Copy-Move Forgery Detection Based on Patchmatch,” 2014 IEEE International Conference on Image Processing (ICIP), Paris, France, pp. 5312-5316, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva, “Efficient Dense-Field Copy-Move Forgery Detection,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2284-2297, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Xiang-Yang Wang et al., “A New Keypoint-Based Copy-Move Forgery Detection for Small Smooth Regions,” Multimedia Tools and Applications, vol. 76, pp. 23353-23382, 2017.
[CrossRef] [Google Scholar] [Publisher Link]