Abstract
Image forgery detection is the basic key to solve many problems, especially social problems such as those in Facebook, and court cases. The common form of image forgery is the copy-move forgery, in which a section of the image is copied and pasted in another location within the same image. In this type of image forgery, it is easy to perform forgery, but more difficult to detect it, because the features of the copied parts are similar to those of the other parts of the image. This paper presents an approach for copy-move forgery detection based on block processing and feature extraction from the transforms of the blocks. In addition, a Convolutional Neural Network (CNN) is used for forgery detection. The feature extraction is implemented with serial pairs of convolution and pooling layers, and then classification between the original and tampered images is performed with and without transforms. A comparison study between different trigonometric transforms in 1D and 2D is presented for detecting the tampered parts in the image. This comparison study is based on the completeness rate for the detection. This comparison ensures that the DFT in 1D or 2D implementations is the best choice to detect copy-move forgery compared to other trigonometric transforms. In addition, the paper presents a comparison study between ten cases using the CNN learning technique to detect the manipulated image. The basic idea is to use a CNN to detect and extract features. The proposed CNN approach can also be used for active forgery detection because of its robustness to detect the manipulation of digital watermarked images or images with signatures.
Similar content being viewed by others
References
Acharya T, Chakrabarti C (2006) A survey on lifting-based discrete wavelet transform architectures. Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology 42:321–339
Amerini I, Serra G, Del Bimbo A, Caldelli R, Ballan L (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6:1099–1110
Amolins K, Dare P, Zhang Y (2007) Wavelet based image fusion techniques—an introduction, review and comparison. ISPRS J Photogramm Remote Sens 62:249–263
Cao Y, Yang Q, Fan L, Gao T (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214:33–43
Dang-Nguyen DT, Boato G, Conotter V, Pasquini C (2015) RAISE: a raw images dataset for digital image forensics. In Proceedings of the 6th ACM multimedia systems conference, pp. 219–224
Farid H, Popescu A (2004) Exposing digital forgeries by detecting duplicated image regions. Department Computer Science, Dartmouth College, Technology Report TR2004–515
Fridrich AJ, Lukáš AJ, Soukal BD (2003) Detection of copy-move forgery in digital images. In Proceedings of digital forensic research workshop
Fridrich A et al (2003) Detection of copy-move forgery in digital images
Graps A (1995) An introduction to wavelets. IEEE Comput Sci Eng 2:50–61
Hafed ZM, Levine MD (2001) Face recognition using the discrete cosine transform. Int J Comput Vis 43:167–188
Huang Y, Long D, Sun W, Lu W (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206:178–184
Huh J-H (2018) Big data analysis for personalized health activities: machine learning processing for automatic keyword extraction approach. Symmetry 10(4):93
Jaberi M, Muhammad G, Hussain M, Bebis G (2014) Accurate and robust localization of duplicated region in copy–move image forgery. Mach Vis Appl 25:451–475
Jung S-H, Huh J-H (2019) A novel on transmission line tower big data analysis model using altered K-means and ADQL. Sustainability 11(13):3499
Kim P (2017) Matlab deep learning. With Machine Learning, Neural Networks and Artificial Intelligence
Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. ar**v preprint ar**v:1412.6980
LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324
Li G, Wu Q, Sun S, Tu D (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In Multimedia and expo, 2007 IEEE international conference on, pp. 1750–1753
Li L, Wu X, Zhu H, Li S (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40:1951–1962
Litjens G et al (2017) A survey on deep learning in medical image analysis. Med Image Anal 42:60–88
Lynch G, Liao H-YM, Shih FY (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265
Mahdian B, Saic S (2007) Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci Int 171:180–189
Nath V, Gaharwar R, Gaharwar G (2015) Comprehensive study of different types image forgeries. International Conference of Recent Advances Engineering Science and Management, New Delhi
Nishanth K, Karthik G (2015) Identification of diabetic maculopathy stages using fundus images. J Mol Image Dynamic
Patil SS, Khade BS, Dhongde JD, Patil NP, Patil AN (2014) Digital image forgery detection using basic manipulations in Facebook. Int J Sci Technol Res 3:356–359
Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions, Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004–515
Ranzato MA, Huang FJ, Boureau YL, LeCun Y (2007). Unsupervised learning of invariant feature hierarchies with applications to object recognition. In Computer vision and pattern recognition, 2007. CVPR'07. IEEE conference on (pp. 1–8). IEEE.
Schmidhuber J (2015) Deep learning in neural networks: An overview. Neural Netw 61:85–117
Seo Y-S, Huh J-H (2019) Automatic emotion-based music classification for supporting intelligent IoT applications. Electronics 8(2):164
Shen D, Wu G, Suk H-I (2017) Deep learning in medical image analysis. Annu Rev Biomed Eng 19:221–248
Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15(1):1929–1958
Wang Z-Q, Tan K, Wang D (2019) Deep learning based phase reconstruction for speaker separation: a trigonometric perspective. In: ICASSP 2019–2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, p. 71–75
Warif NBA, Choo KKR, Wahab AWA, Shamshirband S, Ramli R, Salleh R, Idris MYI (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259–278
Winograd S (1978) On computing the discrete Fourier transform. Math Comput:175–199
Zandi M, Mansouri A, Mahmoudi-Aznaveh A (2014) Adaptive matching for copy-move forgery detection. In Information forensics and security (WIFS), 2014 IEEE international workshop on, pp. 119–124
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Al_Azrak, F.M., Sedik, A., Dessowky, M.I. et al. An efficient method for image forgery detection based on trigonometric transforms and deep learning. Multimed Tools Appl 79, 18221–18243 (2020). https://doi.org/10.1007/s11042-019-08162-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08162-3