Skip to main content

Detection of Image Forgery for Forensic Analytics

  • Conference paper
  • First Online:
Sustainable Advanced Computing

Abstract

Due to the technical revolution in digital image processing, different advanced image manipulation software has been used in recent years to produce new unrealistic images without leaving evidence of what is happening in the world, so it would be difficult to detect tampering visually. Digital image forgeries have many techniques, but it is still very difficult to identify copy-move forgery. Therefore, we use a robust algorithm in this paper to detect copy-move forgery based on the descriptor speed-up robust feature (SURF) as a key-point detection, high-pass filtering as a matching feature, nearest neighbor used as a clustering algorithm to divide the entire image. By swapping the matched feature points with the corresponding super pixel blocks, the doubtful regions are identified, and then, the corresponding blocks are combined on the basis of similar local color features (LCF). Finally, to obtain the suspected forged areas, morphological close operation was applied. The results of the study indicate that the proposed method achieves considerable output based on key-point detection compared to other forgery detection methods used in the current method in order to address the research challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shailaja Rani PB, Kumar A (2019) Digital image forgery detection techniques: a comprehensive review. In: International Conference on electronics communication and aerospace technology (ICECA), IEEE Conference record

    Google Scholar 

  2. Yang B, Xingming S, Guo H, Xia Z, Chen X (2018) A copy-move forgery detection method based on CMFD-SIFT 77:837–855

    Google Scholar 

  3. Riess C, de Carvalho TJ (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inf For Secur 8

    Google Scholar 

  4. Johnson MK, Farid H (2007) Detecting photographic composites of people. In: Proceedings of the 6th International workshop on digital watermarking

    Google Scholar 

  5. Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: ICPR 18th International conference on pattern recognition, vol 4. IEEE, New York

    Google Scholar 

  6. Bora PK, Gholap S (2008) Illuminant colour based image forensics. In: Proceedings of the IEEE Region 10 conference, pp 1–5

    Google Scholar 

  7. Xu B, Liu G, Dai Y (2014) Detecting image splicing using merged features in chroma space. Sci World J

    Google Scholar 

  8. Arun Vinodh C, MF Reshma P.D (2015) Image forgery detection using SVM classifier. In: IEEE Sponsored 2nd International conference on innovations in information embedded and communication systems

    Google Scholar 

  9. Shiva Kumar BL, Santosh (2010) Detecting copy move forgery in digital images: a survey and analysis of current methods. Global J Comput Sci Technol 10

    Google Scholar 

  10. Jothi lakshmi SL, Ranjith VG (2014) Automatic machine learning forgery detection based on SVM classifier. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3384–3388

    Google Scholar 

  11. Huang H-YH, Ciou A-J (2019) Copy-move forgery detection for image forensics using the super pixel segmentation and the Helmert transformation. EURASIP J Image Video Process

    Google Scholar 

  12. Sudiatmika IBK, Rahman F, Trisno S (2018) Image forgery detection using error level analysis and deep learning 17:653–659

    Google Scholar 

  13. Park C-S, Choeh JY (2017) Fast and robust copy-move forgery detection based on scale-space representation. Multimedia Tools Appl 77(13):16795–16811

    Google Scholar 

  14. Ghorbani M, Firouzmand M, Faraahi A (2011) DWT-DCT (QCD) based copy-move image forgery detection. In: 18th IEEE international conference on systems, signals, and image processing (IWSSIP), pp 1–4

    Google Scholar 

  15. Granty Regina Elwin J, Aditya TS, Madhu Shankar S (2010) Survey on passive methods of image tampering detection. In: IEEE international conference on communication and computational intelligence (INCOCCI), pp 431–436

    Google Scholar 

  16. Suykens JAK, De Bra Banter J, Lukas L, Vandewalle J (2002) Weighted least squares support vector machines: robustness and sparse approximation. Neuro Comput 48:85–105

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sri, C.G., Bano, S., Trinadh, V.B., Valluri, V.V., Thumati, H. (2022). Detection of Image Forgery for Forensic Analytics. In: Aurelia, S., Hiremath, S.S., Subramanian, K., Biswas, S.K. (eds) Sustainable Advanced Computing. Lecture Notes in Electrical Engineering, vol 840. Springer, Singapore. https://doi.org/10.1007/978-981-16-9012-9_26

Download citation

Publish with us

Policies and ethics