1 Introduction

Image has profound importance in our life. The Evolvement of computation and widespread use of hand-held devices make photography easier. But the abundance of various image-editing tools makes image forgery an easygoing even for the newbies. As photography editing [4] becomes a new normal, image forgery turns invasive and makes it difficult to judge the genuineness of the image. A single image may contain huge information as well as stating a factor describing an incident flawlessly in various spheres of life like newspaper reporting, judiciary, insurance claim, research result, etc. On the other hand, doctored image act to the contrary and jeopardized the innocence and importance of photography. In order to restore the faith of images, image forensics is a pressing need to deal with the image forgery and trace out tampered area of the subject image successfully.

Image forgery is broadly classified into three categories: i. Splicing ii. Copy Move Forgery iii. Image Retouching. In splicing [15, 18] a composite image is generated by copying a part of an image and pasted into another image. On the other hand, copy move forgery [6, 22] is an image manipulation process in which single or multiple areas of an image are moved into the other parts to hide or exaggerate objects present in the same image. This type of forgery has a higher degree of sophistication as the changes in the underlying statistics and entropy of the image is very little. These changes are also imperceptible to the human eyes. Figure 1 illustrates image duplication using copy-move forgery. Image retouching [22] is an image manipulation technique in which image properties or attributes are changed by some post processing technique. Therefore, to cope with this type of forgery, passive image forgery techniques become immensely popular and challenging. To unveil copy-move forgery in an efficient way, a novel method has been proposed.

Fig. 1
figure 1

Copy-Move Forgery Example, (a) Original Image (b) Forged Image

Image forensic technique is categorized into two ways: 1. Active Image forensics 2. Passive image forensics. In active image forensics [22], pre-set data like digital signature or digital watermark has been embedded into the image and extracted from the image at the time of requirement and further the watermark can be checked whether the image has undergone any manipulation or not. The main challenge lies in active image forensics is that watermark or digital signature must be inserted into the image at the time of image capturing.

But there are thousands of images which was taken earlier and no watermark was embedded into it. In this scenario, active forensics fail to judge the integrity and authenticity of the same. To prevail over this situation, passive forensics [15, 18], which requires no pre-employed data, has been engineered for image forgery detection. In passive image forensics (also known as blind image forensics), the underlying anomalies and statistics of the subject image are investigated and tampered region is localized. In view of its unparalleled advantage, passive forensics become a much-coveted research area among scientific communities.

Owing to the might and efficiency of the blind image forensics technique, the authors proposed a passive forensics scheme that aims to bring out copy move forgery using block-based technique. In this approach, stationary wavelet transform (SWT) is utilized with discrete cosine transform (DCT) along with singular value decomposition (SVD) in order to extract DC coefficients and most significant singular values from the image. Later on, these features are exploited to detect copy move forged region from the subject image. The proposed algorithm reduces the feature vector size significantly by choosing salient but reduced number of features from each block while preserve robustness against any post-processing attack.

The primary contributions of this proposed research work are as follows. First, various issues and limitations in copy move forgery detection techniques are hashed out and to surmount the problem, a new hybrid but substantially reduced feature-based image forensic method has been proposed proosed. In order to produce the coveted feature vectors, SWT, DCT and SVD transformations are applied. Due to shift invariant property of SWT, energy compaction nature of DCT and high stability of SVD; the extracted features exhibit a greater degree of robustness despite low number of feature vectors. It’s worth mentioning that only three feature vectors are extracted per block which successfully localizes the forged area and using such a reduced number of feature vectors is the first of the kind. Second, the proposed algorithm can detect forged region successfully irrespective of its number i.e. single or multi forged area as well as irrespective of the size of the forged area specially if the area is small, can be detected successfully. Third, from various experimental results and comparative analyses display the robustness and accuracy of the proposed scheme is sufficiently good.

The reaming part of this paper is structured as follows. Section 2 introduces the state of art techniques for copy move forgery techniques. Section 3 gives an overview of various transformation techniques applied in this paper in the preliminary section. Section 4 describes the details of the proposed work and the algorithmic approach. Experimental results and performance evaluation along with robustness and comparative analysis are described in section 5. Finally, the conclusion of the proposed scheme is drawn in section-6.

2 State of the art

The copy-move forgery detection methods [28] are mainly categorized as (a) Block based technique and (b) Keypoint based technique. In block-based technique [10], an image is partitioned into overlapping or non-overlapping blocks which are further exploited to extract features and analysis, and after that identical features are used to find the forged area. Key point based [16] approaches scanned the high entropy regions of an image in order to extract feature vectors from these areas only. These feature vectors have gone through proper processing for identification of duplicate regions. Keypoint based approaches have the advantage of taking less processing time but with a shortfall of less accuracy. On the other hand, block-based approaches are more time consuming but have the greater accuracy rate. A brief description of various forgery detection techniques is presented here.

It has been stated that copy-move forgery detection process widely used block-based technique. In order to detect forged region in an image, Fridrich et al. [10] pioneered the block-based method using two approaches, named exact match and robust match. Exact match used exact pixel value from the images to form feature vectors, which suffers from lossy compression. While robust match used quantized DCT based feature vector collecting approach, which overcomes the lossy image compression problem. In Alkawaz et al. [1], the author proposed a solution by following same features used by Fridrich et al. [10] but with.

8 × 8 block size. Both the algorithms have limitations of high computational complexity. Later on, Popescu and Fraid [9], proposed a feature extraction method from block using principal component analysis (PCA) coefficients to achieve robustness. Xiao Bing Kang and Wei [13] proposed an SVD based technique to extract singular values from the image. For similarity matching and filtering process, the author utilized Euclidian distance and Chebyshev distance. The technique displayed robustness under post processing attacks like compression, Gaussian blurring and Bayram et al. [3] also gave a feature extraction process using SVD. This method reduced the computational complexity required for matching after lexicographical sorting. This proposed method proved its robustness against noise distortion, lossy JPEG compression and Gaussian blur. Zhang et al. Zhang et al. [15] used DWT to extract sub-bands from the forged image. The Proposed method uses phase correlation to test similarity. In Zhao and Guo [30], utilized DCT and SVD transformation accordingly to extract most significant feature vectors from the image to achieve robustness. In Hayat and Qazi [12], implement DWT-DCT based forgery detection technique. This process extracted approximation band by applying DWT on image thereafter DCT is applied to extracted overlapping block of approximation subband. Zandi et al. [29] proposed a solution using adaptive similarity threshold. This method successfully detects forged regions applying thresholds proportional to standard deviation. In Lee et al. [14], designed a technique using Histogram Oriented Gradients (HOG) for copy move forgery detection. The method depends upon the statistical feature for overlapping blocks. The experiment results show effectiveness against some post-processing operation as well as robustness against slight rotation attack. Mahmood et al. [17] proposed a very effective approach by using SWT which has shift invariant property and reduce the dimensions by deploying DCT. This technique extracted only six feature vectors which demonstrates good result under various post processing attacks. Singh et al. [23] devised a DCT-SVD based technique for feature vector extraction and further support vector machine classifier is employed for classification and K- means clustering is employed to localize copy move forged area. Meena and Tyagi [19] designed a tetrolet based CMFD algorithm for feature extraction and used the filter outlier technique to detect tampered regions with robustness and accuracy. Dixit et al. [8] devised a blur invariant forgery detection technique utilizing SWT-SVD. A colour-based segmentation technique is used to attain blur invariant. Soni et al. [24] suggested a SURF (Speeded Up Robust Feature) and MSER based image forensics which is geometric transformation invariant. Recently Al-Qershi and Khoo [2] designed a k-means clustering -based forgery detection algorithm. Nonetheless, it’s a challenge for the scientific community and researchers to find a solution to trade- off between robustness and time complexity to produce optimum results. To surpass this challenge, in this paper authors proposed an effective and robust image forensics technique that utilizes SWT, DCT, and SVD techniques which successfully defends the principal cause of image forensic technique.

3 Preliminaries

The proposed technique in this paper requires the basic knowhow for the concepts of DCT, SWT, and SVD. The details of these techniques are given below.

3.1 Discrete cosine transform (DCT)

DCT [21] is a mathematical technique by which an image can be transformed from spatial to transform domains by generating DCT coefficients. DCT has enormous applications in various science and engineering domain (like JPEG, MPEG etc.). The most significant attribute of DCT is, it has energy compaction property that signifies the salient information of a signal is stored in lower frequency band which further can be exploited to compress any multimedia file. As most of the salient features are intact, the quality of data still maintained. This makes it worthy in scientific application where trade- off between dimension reduction and quality maintenance is crucial. For M × N pixels block of image: where (x, y) represents image coordinates in the spatial domain and (r, s) represents coordinates in transform domain such that x, y ∈ [0....M − 1] r, s∈ [0....N − 1].

$$ {\displaystyle \begin{array}{c}H\left(r,s\right)=\sum \limits_{x=0}^{M-1}\sum \limits_{y=0}^{N-1}h\left(x,y\right)\left[\alpha (r)\right]\;\left[\alpha (s)\right]\mathit{\cos}\left[\frac{\left(2x+1\right) r\pi}{2M}\right]\cos \left[\frac{\left(2y+1\right) s\pi}{2N}\right]\\ {}\begin{array}{c} where\kern24.25em \\ {}\alpha (r)=\sqrt{\frac{1}{M}}\; if\;r=0,\sqrt{\frac{2}{M}}\kern0.24em if\;r=1,2,..\dots M-1\\ {}\alpha (s)=\sqrt{\frac{1}{N}}\kern0.24em if\;s=0,\sqrt{\frac{2}{N}}\kern0.24em if\;s=1,2,..\dots N-1\end{array}\end{array}} $$
(1)

3.2 Singular value decomposition (SVD)

SVD [5] is an immensely popular matrix factorization technique with its wide range of application areas in image processing. SVD refactors the image into three matrices, using which various algebraic and geometric features can be extracted easily. SVD features in the form of a matrix. Let A be a matrix of an image with A ∈ Rm × n of rank r, which has m rows and n columns (m × n). Using SVD the image can be factorized into U, S, and V, and is represented as

$$ A={USV}^T $$
(2)

where, U represents a m × m orthogonal matrix contains orthonormal Eigenvectors of AAT which can be represented as U ∈ Rn × n, S is a m × n diagonal matrix contains the diagonal matrix of the singular values, which represents square roots of Eigenvalues of AAT, and V represents n × n orthogonal matrix contains the orthonormal Eigenvectors of ATA which can be represented as V ∈ Rm × m.

$$ \mathrm{U}=\left[{u}_1\ {u}_2\cdots {u}_{\mathrm{n}}\right] $$
(3)

where, column vectors ui form an orthonormal set and i = 1, 2, 3...m and matrix V depicts an n × n orthogonal matrix

$$ V=\left[\begin{array}{l}{v_1}^T\\ {}{v_2}^T\\ {}\vdots \\ {}{v_n}^T\end{array}\right] $$
(4)

where, column vectors from vi from an orthonormal set and i = 1,2,3,. .. n.

$$ A=\left[{u}_1{u}_2\cdots {u}_{\mathrm{n}}\right]\left[\begin{array}{c}{\sigma}_1\kern0.5em 0\cdots \kern0.5em 0\\ {}0\kern0.75em {\sigma}_2\cdots 0\\ {}\vdots \vdots \ddots \vdots \\ {}0\kern1em 0\kern0.5em \cdots {\sigma}_n\end{array}\right]\left[\begin{array}{c}{v_1}^T\\ {}{v_2}^T\\ {}\vdots \\ {}{v_n}^T\end{array}\right] $$
(5)

The singular value of SVD is consistent and can represent an image with lesser dimension. From several experiments, it has been observed that larger singular values can represent the significant features of an image and smaller ones has less significant features. In Eq. (5), σ1, σ2....σn are singular values, constitutes square roots of Eigenvalues forming the diagonal of S. The singular values in the matrix A arranged in a descending order i.e. σ1 > σ2 > …>σn. Analyzing the attributes, SVD successfully used for dimension reduction as well as maintains its energy substantially. It also has less computational complexities compare to other transformation technique. Considering the quality attributes of SVD, proposed technique equipped with it and utilized to extract quality feature vectors from AC coefficients.

3.3 Stationary wavelet transformation (SWT)

Wavelet transformation has huge potential application in various image processing operations. But the wavelet transforms suffer from the decimation of coefficients in each stage of decomposition which leads to shift variance problem. Due to the shift variance property, even a little change in the image makes a huge impact on the Discrete Wavelet Transform (DWT) coefficients. This phenomenon may bring set back in forgery investigation as it generates different feature vectors from the same copy moved area due to shift variance by post processing attack. Hence, to overcome this lacuna, SWT has been introduced. SWT [720, 25] has shift invariant property, which exhibits greater degree of pattern recognition, edge detection, and feature extraction capacities, which are further exploited by the investigator for copy, move forgery detection. SWT coefficients are obtained in a similar fashion of DWT decomposed by low pass l[x] and high pass filter h[x] illustrated in Fig. 2. Lowpass filter l[x] generates LL and LH sub bands, on the other hand, filter h[x] produced HL and HH sub bands. But, unlike DWT no decimation operation is performed on it hence, all the sub bands contain same size of the original image Ii. Hence, an image of sizeN × M, N × Mwhere E = 1, 2, 3……, N and F = 1, 2, 3….,M. The sub image LH, HL, HH, and LL denote horizontal, vertical, diagonal and approximation sub-band of equal size respectively got by the image of size N × M the SWT decomposition at ith level is expressed from Eqs. (6)–(9). After obtaining the aforementioned sub-bands, approximation LL sub-band has been chosen for feature extraction in order to form feature vectors, which are further utilized to find copy move forgery. It’s worth mentioning that the feature extracted from approximation sub-band has not only reduced dimensions but provides greater saliency which leads to higher withstanding capacity against various post-processing attacks.

Fig. 2
figure 2

Decomposition Process of an image through SWT

$$ L{H}_{i+1}\left(E,F\right)=\sum \limits_{x=-\infty}^{+\infty}\sum \limits_{y=-\infty}^{+\infty }{l}_x^i{h}_x^iL{L}_i\left(E+x,F+y\right) $$
(6)
$$ H{H}_{i+1}\left(E,F\right)=\sum \limits_{x=-\infty}^{+\infty}\sum \limits_{y=-\infty}^{+\infty }{h}_x^i{h}_y^iL{L}_i\left(E+x,F+y\right) $$
(7)
$$ L{L}_{i+1}\left(E,F\right)=\sum \limits_{x=-\infty}^{+\infty}\sum \limits_{y=-\infty}^{+\infty }{l}_x^i{l}_y^iL{L}_i\left(E+x,F+y\right) $$
(8)
$$ H{L}_{i+1}\left(E,F\right)=\sum \limits_{x=-\infty}^{+\infty}\sum \limits_{y=-\infty}^{+\infty }{h}_x^i{l}_y^iL{L}_i\left(E+x,F+y\right) $$
(9)

where E = 1,2,3……, N and F = 1,2,3…., M. The sub image LH, HL, HH, and LL denote horizontal, vertical, diagonal and approximation sub-band of equal size respectively generated from image of size N × M.

4 Proposed work

The procedure proposed in this research work detects and localize copy-move forged area in digital images using hybrid features and utilizing only three feature vectors in order to reduce the computational overhead. This approach utilizes of SWT, DCT, and SVD for the feature extraction process from the pre-processed image. After conversion of colour image, applying the SWT decomposition on the luminance channel (Y). Then, the approximation band is selected from four sub-bands (approximation, horizontal, diagonal, vertical) for block-based CMF detection method. The reason for adopting SWT is, it has impressive localization and shift invariance properties in both spectral and spatial domains [20]. DCT is employed to each overlapping block on approximation band to select salient features and to reduce the feature dimensionality. The reason behind picking the DC coefficient of a transformed block is, it contains significant information. This feature has been exploited and used as a first feature of a block as DCT concentrates information in lower spatial frequency domain. Further, SVD is deployed on each transformed block to extract the second feature on the next four AC coefficients through a zigzag scan on the transformed block. To obtain the second feature of the block, the first diagonal value of the singular matrix has been selected. The third feature is the first diagonal value of the singular matrix, which is obtained by applying the SVD on zigzag scanned next sixteen AC coefficients of transformed block. These three feature vectors are extracted from each block and considered for further process of CMF detection and localization. The algorithmic details are described in section 5.1.

4.1 Algorithmic steps

The essence of various steps involved in detecting and localization of copy-move forgery is described in this section. Figure 3 shows the overview of the entire algorithm. Input: I-Colour image or grayscale image of size M × N. Output: BI- Binary image.

  • Step 1: Convert I into Y using the using below formula if I colour image else mark I as Y.

Fig. 3
figure 3

Workflow of the proposed Algorithm

$$ Y=\left(\frac{77}{256}\right)R+\left(\frac{150}{256}\right)G+\left(\frac{29}{256}\right)B $$
(10)
  • Step 2: Apply SWT decomposition on Y gives four sub bands: - approximation, horizontal, diagonal, vertical.

  • Step 3: Divide approximation band into b × b size overlapping blocks and generate t = (M − b + 1) × (N − b + 1) blocks.

$$ {F}_m=\left[\begin{array}{c}{f}_1^1{f}_2^1{f}_3^1{x}^1{y}^1\\ {}{f}_1^2{f}_2^2{f}_3^2{x}^2{y}^2\\ {}..\dots \dots \dots \dots \dots \\ {}..\dots \dots \dots \dots \dots \\ {}{f}_1^t{f}_2^t{f}_3^t{x}^t{y}^t\end{array}\right] $$
(11)
  • Step 4: For each block Bi apply Feature Extraction algorithm which gives three features and (x, y) top left spatial location of block Bi, let it call \( {f}_1^i,{f}_2^i,{f}_3^i,{x}_i,{y}_i \)and construct feature matrix Fm of size t × 5 and each row represents ith block’s feature extracted from block Bi where (1 ≤ i ≤ t). Depicted at Fig. 4.

  • Step 5: Apply column normalization by formula giving in Eq. (12) on first, second and third column of feature matrix Fm get converted into Fm. In Eq. (12), Xmin, Xmax and X represents minimum, maximum and real value of corresponding column. For each value it transforms to the new value X in range of [0, 1].

Fig. 4
figure 4

Feature extraction process from a block

$$ {X}^{\prime }=\frac{X-{X}_{\mathrm{min}}}{X_{\mathrm{max}}-{X}_{\mathrm{min}}} $$
(12)
  • Step 6: Apply lexicographical sorting on Fm to obtain the transformed matrix Fs.

  • Step7: Apply Similarity Matching algorithm for each consecutive row pair of matrix Fs and find x and y coordinates of matching block pair’s (Bk, Bl). Store the results obtained from Similarity Matching algorithm in another matrix Os. Detail is illustrated in Fig. 5.

  • Step 8: For each row Os consist two blocks top left corner x and y coordinates, let it say (Bk, Bl). Generate the binary image BI of size M × N by labeling the pixels corresponding to both block pairs (Bk, Bl) with:

    $$ {B_i}^{\left({x}_g,{y}_h\right)}=\left\{1\right\}\forall {x}_i\le {x}_g<{x}_{i+b}\ \mathrm{and}\kern0.5em {y}_i\le {y}_g<{y}_{i+b} $$
Fig. 5
figure 5

Feature Similarity Algorithm Process

where xi top left x coordinate of block B and yi: top left corner of y coordinate of block BiBi.

  • Step 9: Apply Morphological opening operation on BI with structural element sphere of radius b if suspicious regions in mapped binary image BI.

  • Step10: Output BI as result.

4.2 Feature extraction

Input:Bf Block of size b × b. (x, y): coordinate of top left corner block.

Output: Feature f1, f2, f3 and block left corner location (x, y).

  • Step1: Apply DCT on Bf gives BDCTBDCT of same size.

  • Step 2: Follow zigzag scan on BDCT and extract initial twenty one values for further, naming it DC, AC1, AC2, AC3,AC20.

  • Step 3: Create matrix M4 of size 2 × 2 and matrix M16 of size 4 × 4.

$$ {M}_4=\left[\begin{array}{c}A{C}_1\;A{C}_2\\ {}A{C}_3\;A{C}_4\end{array}\right]{M}_{16}=\left[\begin{array}{c}A{C}_5\kern0.24em A{C}_6\kern0.24em A{C}_7\kern0.24em A{C}_8\\ {}A{C}_9\;A{C}_{10}\;A{C}_{11}\;A{C}_{12}\\ {}A{C}_{13}\;A{C}_{14}\;A{C}_{15}\;A{C}_{16}\\ {}A{C}_{17}\;A{C}_{18}\;A{C}_{19}\;A{C}_{20}\end{array}\right] $$
(13)
  • Step 4: Apply SVD on M4 and M16 gives U4, V4, S4, U4, S4, V4and U16, V16, S16 matrices respectively.

  • Step 5: Declare outputs DC as f1, S4(1, 1) as f2 and S16 (1, 1) as f3, top left of x-coordinate and y coordinate of block Bf as x and y.

4.3 Similarity matching

Input: Ki- ith Feature row of 1 × 5. Kj-jt h Feature row of 1 × 5, i ≠ j and j = i + 1. Db-Block distance threshold,

Sb-Similarity threshold. Output: xi, yi, xj, yj - x and y coordinates of matching pairs.

  • Step 1: Compute block distance using Eq. (14):

$$ {d}_b=\sqrt{{\left({K}_{\left(i,4\right)}-{K}_{\left(\mathrm{j},4\right)}\right)}^2+{\left({K}_{\left(i,4\right)}-{K}_{\left(\mathrm{j},4\right)}\right)}^2} $$
(14)
  • Step 2: If db > Db then go to Step 3 else go to Step 6.

  • Step 3: Compute similarity between feature using Eq. (15):

$$ {S}_b=\sqrt{\sum \limits_{g=1}^3{\left({K}_{\left(\mathrm{i},\mathrm{g}\right)}-{K}_{\left(\mathrm{j},\mathrm{g}\right)}\right)}^2} $$
(15)
  • Step 4: If sb < Sb then go to step 5 else go to Step 6.

  • Step 5: Declare outputs K(i,4) as xi, K(i,5) as yi, K(j,4) as xj and K(j,4) as yj.

  • Step 6: Abort.

5 Experimental results and discussion

This segment is devoted to discussing various experiments performed on the proposed algorithm. To assess the robustness and exhibit the effectiveness of the developed solution for CMF, CoMoFD [27] image database has been utilized as well as forgery on natural image was created by the authors, comprising both the forged images with its ground truth. CoMoFD comprises 200 images of size 512 × 512 pixels. The experiments were accomplished on Intel® Core™ i-54,210 U CPU @ 1.70GHz processor with 4GB RAM running MATLAB 2018b.In order to measure the performance of the proposed forgery detection and localization some images have been forged and created ground truth of the same. To check the result, authors forged images with irregular and regular shaped tampered regions. To evaluate the robustness of the proposed technique, some post processing operation was employed on it.

Section 5.1 states the parameter set up for the proposed method. Section 5.2 and 5.3 demonstrate the performance evaluation metrics and simulation results respectively. Section 5.4 describes the effectiveness test. Testing of robustness and comparisons has been illustrated in sections 5.5 and 5.6 respectively.

5.1 Parameter setup

In section 4.1 and 4.2, b describes block size. In the similarity matching algorithm, Db and Sb were used for block distance threshold and block feature similarity threshold respectively.

In the experiments, these parameters were set to b = 8, Db = 40, and Sb = 0.000001. Various experiments were carried out using these parameters for the proposed method. The morphological opening operation is used as optional for images because sometimes image may not need post- processing. Morphological opening operation suggested using if suspicious regions found in the mapped binary image. The structural element used in the proposed method is sphere to reduce FPR.

5.2 Performance evaluation metrics

The proposed algorithm’s performance is analyzed in this paper using various metrics at pixel level [26] are computed by the following mathematical Eqs. (17), (18), (19), (20), and (21).

  • True Positive (TP): Actually, altered detected pixels.

  • True Negative (TN): Actually, original pixel detected.

  • False Negative (FN): Pixels detected as original but that are actually altered

  • False Positive (FP): Pixels detected as altered but that are actually original

  1. 3.1.1

    Forgery Detection Accuracy (ACC): This metric is used to determine the extent correct localization of forged pixels. Higher accuracy value (close to 1) indicates that the method has the capability to differentiate the altered and unaltered pixels of an image.

$$ \mathrm{ACC}=\frac{\mathrm{TP}+\mathrm{TN}}{\mathrm{TP}+\mathrm{TN}+\mathrm{FN}+\mathrm{FP}} $$
(16)
  1. 3.1.2

    False Positive Rate (FPR) [31]: This metric depicts the rate of detecting the unaltered image pixels as forged is entitled as false positive rate. Lower value of FPR (close to zero) is favored.

$$ FPR=\frac{FP}{FP+ TN} $$
(17)
  1. 3.1.3

    Precision [31]: Precision indicates the correctness of the detected portion of an image. The higher value (close to 1) implies greater degree of correctly classification of localized block.

$$ Precision=\frac{TP}{TP+ FP} $$
(18)
  1. 3.1.4

    Recall [31]: Recall implies the magnitude of rightly identification of forged blocks in an image. A higher value (close to 1) indicates the most of the actual forged blocks are identified as forged.

$$ Recall=\frac{TP}{TP+ FN} $$
(19)
  1. 3.1.5

    F1-measure: F1- measure demonstrates harmonic mean of precision and recall. It is used to strike a balance between precision and recall specially when there is large number of true negatives. The value of F1-Measure lies between 0 and 1 and the higher value of it indicates higher precision of tampered region and proper discern between original and forged region.

$$ F1- Measure=2\times \frac{Precision\times Recall}{Precision+ Recall} $$
(20)

5.3 Simulation results

Experiments were conducted on various natural images of different size 512 × 512, 1024 × 1024. Simulations were done on these images which are forged using GIMP2.10.12 (GNU Image Manipulation Program). Three of some reproduced images tampering localization results are displayed in Fig. 6(d)-(f) on applying the proposed method. Fig. 6(a)-(c) shows the altered images of “Tree”, “Grass” and “Pole” of size 512 × 512, 512 × 512, and 1024× 1024 using the GIMP editing tool. Fig. 6(d)-(f) shows the localization results obtained by employing the proposed CMFD scheme on the tampered images of “Tree”, “Grass” and “Pole” respectively. Fig. 6(d) is an image of duplicate tree shows accuracy = 0.9899 and FPR = 0, Fig. 6(e) shows the localization result on irregular shaped tampered area with accuracy = 0.9965 and FPR = 0 and Fig. 6(f) localization result with accuracy = 0.9988 and FPR = 0.0001, however, “pole” image is the size of 1024 × 1024.The localization achieved when no morphological opening operation was applied, shows effective results with only three feature vector size even when the size of the image increased. Image “Tree” displays the forgery with the large irregular area; image “grass” shows the forgery with the small irregular area, and image “pole” shows the forgery with the regular shaped area.

Fig. 6
figure 6

Localization results on regular shaped region images

5.3.1 Effectiveness and accuracy results

In order to check the effectiveness and accuracy of the proposed algorithm, various experiments were done on translation tampering from CoMoFoD [27] dataset images. In translation operation, the copied region easily moves from one to another location of the image.

It is important in block-based forgery detection method to evaluate the performance on regular shaped, irregular shaped and multiple duplicated regions because it impacts the accuracy as well as false positive rate. In this part, three experiment results are carried out without any post-processing operation on tampered image. The first experiment is done to visualize the results of a regular-shaped copied region forgery. In Fig. 7(a-c) upper row showing the forged image of the regular shaped region whereas bottom row Fig. 7(d-f) showing duplicate regions with their accuracy and false positive rate.

Fig. 7
figure 7

Localization results on regular shaped region tampered images

The second experiment was performed on irregular shaped copied region fraud images to check the impact of the developed algorithm. The experimental results are shown in three different irregular shaped regions. Figure 8(a)-(f) shows tampered images and forgery localization respectively with their accuracy and false positive rate.

Fig. 8
figure 8

Localization results on irregular shaped region tampered images

The third experiment is done on multiple tampered regions. This type of forgery localization is one of the core issues in CMFD algorithm. The detection results are shown in three different images. Figure 9(a)-(c) displays the tampered images when a copied region is pasted in multiple places in the same image whereas Fig. 9(d)-(f) illustrates the results of forgery detection with their accuracy and false positive rate.

Fig. 9
figure 9

Localization results on multiple cloning tampered images

Final experiment conducted on all forty-plain copy-move forged images of CoMoFoD dataset. The average accuracy, FPR, precision, recall, and F1-measure achieved under plain copy move forgery are 0.9890, 0.0066, 0.9100, 0.8175, and 0.8442 respectively achieved in CoMoFoD dataset images that contains 40 images. This balanced performance at pixel level shows the effectiveness and reliability of proposed method.

5.3.2 Robustness analysis

The copy move forgery usually follows by post-processing operation [11]. The objective of these attacks is to make it hard to find out the doctored locations. Therefore, it is necessary to evaluate the resistance of the developed algorithm against post-processing operation. In this section, experiments are carried out on image “tree”, “Grass”, “pole” and CoMoFoD dataset. The proposed algorithm can resist various post-processing attacks including mean filtering, histogram equalization, image sharpening, Gaussian blurring, and median filtering. The Tables 1, 2, 3 and 4 portray the detailed analysis of effectiveness against these attacks on “tree”, “grass” and “pole” test images.

Table 1 Performance evaluation on mean filtering operation
Table 2 Performance evaluation on Histogram equalization
Table 3 Performance Evaluation on Image Sharpening Operation
Table 4 Performance evaluation on Gaussian blurring operation

Results displayed from Tables 1, 2, 3 and 4 represent that the proposed solution has the ability to perform efficiently even when the tampered image suffers excessive blurring, sharpening or other operations. It is found that the developed solution is competent enough in detecting and localizing the altered regions significantly with low false positive rate and greater accuracy rate and. Thus, the proposed CMFD method is found to be robust against the attacks mentioned in Tables 1, 2, 3 and 4.

The next experiment conducted on the CoMoFoD dataset. The CoMoFoD dataset contains forged images with six types of post-processing attacks. In this study, the evolved algorithm tested on four attacks. The visual results further show that the proposed solution exhibits impressive forgery localization even after these post-processing operations were applied.

The brightness change operations were applied in the range [0,1] in the CoMoFoD dataset. Hence, CoMoFoD dataset contains tampered images after applying brightness with ranges ([0.01, 0.95], [0.01, 0.9)] and [0.01, 0.8]). Figure 10(a)-(c) is showing the tampered image with different parameters and Fig. 10(d)-(f) showing the localizing results on applying the proposed solution. Thus, the proposed method is robust enough against brightness change operation even when more brightness is applied in the forged image. The next experiments on colour reduction attacked images reproduced using a uniform quantization process. The values of intensity went through this process. It carried out for a uniform decrease in channels of an image. The operation carried out on all fraud images. It reduces from 256 to 128, 256 to 64 and 256 to 32 this reduction process outcome low-quality fraud images as the number of bits required to represent a channel has reduced. Fig. 11(a)-(c) displays the manipulated images with degradation parameters. Figure 11(d)-(f) shows the tracing outcome on these images when the developed algorithm applied. The visual results show the robustness against colour reduction even when the tampered images are unnoticeable degradation vis-à-vis the original image.

Fig. 10
figure 10

Localization results for brightness change operation

Fig. 11
figure 11

Localization results on colour reduction operation

The effectiveness of the proposed algorithm further examined on contrast adjustment attack from the images CoMoFoD dataset. Figure 12(a-c) show the manipulated image after applying the contrast adjustment operation. Figure 12(d-f) unfolding the fraud pixels on applying the proposed algorithm along with their accuracy and false positive rate. The accuracy and false positive rate need to be close to 1 and approximately to zero respectively. Hence, visual results in Fig. 12(d-f) depicts that the proposed solution has an impressive capability to localize duplicate region even when the high contrast adjustment operation was applied. In the last experiment, we indexed the efficiency against blurred image of the CoMoFoD dataset. These images were generated using three kernel-averaging filters (3 × 3, 5 × 5, and 7 × 7). Figure 13(a)-(c) show noticeable tampered image after applying blurring filters along with their parameter. Figure 13(d)-(f) showing the efficiency of the proposed algorithm, even filter size increases. Thus, unfolding forge pixel outcomes are confirming that the developed CMFD algorithm has the ability to stand against image blurring operation. Thus, results shown in Fig. 13 portray the robustness of the proposed technique even the high parameter is applied for post-processing operations with high accuracy nearest to 1 and very low false positive rate nearest to zero. The strength of these features against the above conventional post processing operation has shown in Fig. 14. The analysis of twenty-seven images on colour reduction, contrast adjustment, brightness change and image blurring show that the proposed method with three features

Fig. 12
figure 12

Localization results on contrast adjustment operation

Fig. 13
figure 13

Localization results on image blurring operation

Fig. 14
figure 14

Average accuracy, FPR, precision, recall and F1-measure of 27 images under (a) contrast adjustment (b) color reduction (c) brightness change(d) image blurring post-processing operations

5.3.3 Comparison analysis

Experiment’s result outlined in section 6.3, elaborate that the developed solution is an impressive approach for tracing and localization of copy move forgery with an accuracy rate exceeding 90% for images of the CoMFoD dataset. This section finally compares with existing related schemes: DCT (Exact match) Fridrich et al. [10], DCT (Robust match) Fridrich et al. [10], SVD-based Kang and Wei [13], DCT &SVD- based Zhao and Guo [30], SWT & DCT -based Mahmood et al. [17]. To testify, along with examining the proposed scheme, the experiments carried out over 35 forged images of the CoMoFoD dataset operated through translation. The dataset contains forged images that were altered after copy-move forgery through different post-processing techniques, for instance, contrast adjustment, brightness change, colour reduction, blurring, and with different parameters. Suppose an image has undergone blurring operation of filter size 3 × 3, 5 × 5 and 7 × 7 then we have 3 forged images. The comparison results are shown on four post-processing operation with three parameters for each operation. So, Tables 5, 6, 7, 8 and 9) contains the results obtained on 420 images. In this section, the comparison results are given on average of the selected images for each post-processing operation colour reduction, contrast adjustment, brightness change, blurring in Tables 5, 6, 7, 8 and 9. For comparison analysis, the morphological opening operation has operated on all images.

Table 5 Performance Evaluation on Median Filtering Operation
Table 6 Comparison Results on Colour Reduction Operation
Table 7 Comparison results on Image Blurring operation
Table 8 Comparison results on brightness change operation
Table 9 Comparison results on contrast adjustment operation

The comparison parameters used in Tables 5, 6, 7, 8 and 9, are false-positive rate and forgery detection accuracy. Higher accuracy and lower false positive rate show an impressive scheme. In the case of colour reduction, Table 6 is showing the results obtained on applying the proposed scheme, where the colour reduction process reduces the intensity from 256 to 128, 256 to 64 and 256 to 64 for reproducing the image. The outcome portray that the developed scheme gives satisfactory accuracy even when the higher intensity parameter is used for colour reduction operation. The proposed scheme has a lower false-positive rate in comparison to other schemes. In the case of blurring, Table 7 depicts that average accuracy surpasses other schemes and, average false positive rates are low than other schemes in all averaging filters for blurring operation. Table 8 represents the similar comparison results on brightness change operation with the following change in brightness with ranges: ([0.01, 0.95], [0.01, 0.9] and [0.01, 0.8]). Results demonstrate that the proposed technique has an average accuracy of 98% in all ranges while comparing without methods with a low average false positive rate than other methods.

Results presented in the Table 9 represents that proposed method having average accuracy of 98% when the images have tampered through contrast adjustment operation with ranges: ([0.01, 0.95], [0.01, 0.9] and [0.01, 0.8]). The results also depict that it performed better than other methods, even when the contrast adjustment range is [0.01, 0.8]. Table 8, it observed that the developed technique performed satisfactorily than the other techniques even when pre-processing parameter increased to wipe out traces of forgery. One surplus issue in CMFD methods is the computational power required allied along with block features matching. The Table 10 demonstrates a comparison of the proposed method with other relevant methods. The lexicographical sorting of feature a matrix is a major concern Feature matrix rows indicate the entire name of blocks, and the columns of the matrix mark it as the size of the feature with the top left corner spatial location of the block. The feature number in proposed methods are 3-dimensional, while in other methods Fridrich et al. (Exact match) Fridrich et al. (Robust match) [10], Xiao Bing KANG et al. Kang and Wei [13], Zhao et al. Zhao and Guo [30], Mahmood et al. [17] are 64 dimensional, 64-dimensional, k- dimensional (k ≤ 20), 16-dimensional and 6-dimensional respectively. As shown in the table, the feature dimension in the proposed method is evidently smaller than other methods. Another common limitation in feature matching process is searching for nearest feature comparison and matching for similar blocks to probe and detect forged region, which is tedious and time consuming. It influences significantly on computational complexity in the feature-matching step. In the proposed method after lexicographical sorting consecutive features, matching is required to obtain matching block pair. Proposed approach reduces the computational overhead to obtain the matching block pairs. Nonetheless, the proposed method gives better detection proficiency.

Table 10 Comparison of computational complexity in terms of feature dimensions

6 Conclusion

Copy move forgery detection becomes a dire need in present scenario. In this paper a passive forensics scheme has been proposed which is potent enough to detect any kind of CMF successfully with negligible false positive results. As it has been found that most of the conventional CMFD scheme lack of either robustness or efficiency, our proposed scheme established a proper trade-off between these two coveted properties. To attain the objective, DCT and SVD transformation are employed accordingly to select DC and most significant singular value components from the overlapping blocks. This approach ensures a smaller number of feature vectors, which carries most significant information of an image, has been selected. As a result, the computational overhead of CMFD has been reduced significantly. Therefore, the proposed scheme not only computationally efficient but also possess great withstanding capability against many types of post processing attacks like Gaussian blurring, histogram equalization, sharpening, mean and median filtering, colour reduction, brightness change, contrast adjustment, image blurring, etc. Experiment results and comparative analysis exhibits the efficiency, robustness, and accuracy of the proposed method under various hostile situation and keep false positive results at bay.