Abstract
Due to the new development of image handling tool or software, copy–move attack is increasingly becoming a common practice and on the other hand, the detection of such type of attack from digital images has become the challenging and active research area. This paper presents the recent block and keypoints-based Copy–Move Forgery Detection (CMFD) techniques. In this paper, we cover the critical discussions of different blocks and keypoints-based CMFD techniques with their pros and cons. The paper also describes the different publicly available databases and performance evaluation measures. Some unsolved research issues in the field of copy–move forgery detection is identified and present in this paper.
Please note that the LNCS Editorial assumes that all authors have used the western naming convention, with given names preceding surnames. This determines the structure of the names in the running heads and the author index.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Luo, X.-Y., Wang, D.-S., Wang, P., Liu, F.-L.: A review on blind detection for image steganography. Signal Process. 88(9), 2138–2157 (2008)
Huo, Y., He, H., Chen, F.: A semi-fragile image watermarking algorithm with two-stage detection. Multimed. Tools Appl. 72(1), 123–149 (2014)
Piva, A.: An overview on image forensics. ISRN Signal Process. 2013 2013
Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)
Soni, B., Das, P.K., Thounaojam, D.M.: CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process. 12(11), 167–178 (2018)
Zhong, J., Gan, Y., Young, J., Huang, L., Lin, P.: A new block-based method for copy move forgery detection under image geometric transforms. Multimed. Tools Appl. 76(13), 14887–14903 (2017)
Wang, H., Wang, H.-X., Sun, X.-M., Qian, Q.: A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multimed. Tools Appl. 76(10), 12627–12644 (2017)
Lin, C.S., Chen, C.C., Chang, Y.C.: An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. In: International Conference on Intelligent Networking and Collaborative Systems, pp. 228–231 (2015)
Soni, B., Das, P.K., Thounaojam, D.M.: An efficient block phase correlation approach for cmfd system. In: Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J., (eds.) Progress in Computing, Analytics and Networking, pp. 41–49. Springer, Singapore (2018)
Dixit, R., Naskar, R., Mishra, S.: Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising swt-svd. IET Image Process. 11(5), 301–309 (2017)
Soni, B., Das, P.K., Thounaojam, D.M.: Copy-move tampering detection based on local binary pattern histogram fourier feature. In: International Conference on Computer and Communication Technology, ICCCT-2017, pp. 78–83. ACM, New York (2017)
Sekhar, R., Shaji, R.S.: An investigation on the use of mser and sift for image forgery detection (2017)
Yang, F., Li, J., Wei, L., Weng, J.: Copy-move forgery detection based on hybrid features. Eng. Appl. Artif. Intell. 59, 73–83 (2017)
Guo, J.-M., Liu, Y.-F., Zong-Jhe, W.: Duplication forgery detection using improved daisy descriptor. Expert Syst. Appl. 40(2), 707–714 (2013)
Liyang, Y., Han, Q., Niu, X.: Feature point-based copy-move forgery detection: covering the non-textured areas. Multimed. Tools Appl. 75(2), 1159–1176 (2016)
Warif, N.B.A., Wahab, A.W.A., Idris, M.Y.I., Salleh, R., Othman, F.: Sift-symmetry: a robust detection method for copy-move forgery with reflection attack. J. Vis. Commun. Image Represent. 46, 219–232 (2017)
Shahroudnejad, A., Rahmati, M.: Copy-move forgery detection in digital images using affine-sift. In: 2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS), pp. 1–5 (2016)
Soni, B., Das, P.K., Thounaojam, D.M.: multicmfd: fast and efficient system for multiple copy-move forgeries detection in image. In: Proceedings of the 2018 International Conference on Image and Graphics Processing, ICIGP 2018, pp. 53–58. ACM, New York (2018)
Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), pp. 422–426. IEEE (2013)
Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD new database for copy-move forgery detection. In: ELMAR, 2013 55th International Symposium, pp. 49–54. IEEE (2013)
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inform. Forensics Secur. 6(3), 1099–1110 (2011)
Soni, B., Das, P.K., Thounaojam, D.M.: Blur invariant block based copy-move forgery detection technique using fwht features. In: International Conference on Watermarking and Image Processing, ICWIP 2017, pp. 22–26, ACM, New York (2017)
Yang, B., Sun, X., Guo, H., **a, Z., Chen, X.: A copy-move forgery detection method based on cmfd-sift. Multimed. Tools Appl. 77(1), 837–855 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Soni, B., Das, P.K., Thounaojam, D.M., Biswas, D. (2020). Copy–Move Attack Detection from Digital Images: An Image Forensic Approach. In: Elçi, A., Sa, P., Modi, C., Olague, G., Sahoo, M., Bakshi, S. (eds) Smart Computing Paradigms: New Progresses and Challenges. Advances in Intelligent Systems and Computing, vol 766. Springer, Singapore. https://doi.org/10.1007/978-981-13-9683-0_8
Download citation
DOI: https://doi.org/10.1007/978-981-13-9683-0_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9682-3
Online ISBN: 978-981-13-9683-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)