Image Authenticity Detection Based on the Local Features and Similarity Features


Abstract views: 37 / PDF downloads: 13

Authors

  • Mahin Malik Capital University of Science and Technology
  • Aqsa Ijaz University of Lahore
  • Maryam Malik University of Sargodha
  • Muhammad Awais Capital University of Science and Technology

Keywords:

Image Forgery, Local Features, Similarity Features, Geometric Transformation, Scale Invariant Feature Transform

Abstract

Picture is better than tons of words but in this era of modern technology, Forgery has become
very popular. Due to the use of digital editing tools it becomes very easy to manipulate someone’s personal
information. Mostly forgery has been done so accurately that it becomes tough to identify the parts where
forgery has attacked. Copy Move forgery detection is used to identify the local variants in image where
forgery has been attacked. The existing methods are used to check the authenticity of the images has
performed results on limited data sets or sets of images. We purpose a novel forensics technique that is used
to extract features from small regions or parts of images. Scale Invariant Feature Transform (SIFT) is a
feature detector and descriptor that is used to extract local features in the images. After detect the blobs or
corner point in the image, the next step is to extract different features using SIFT. These feature vectors of
the images are supposed to very different and invariant to rotation, blurring, noisy, and different geometric
transformations. The proposed method gives a good result at MICC_F220, MICC-F2000, and MIC
F8MULTI. Our algorithm is good at detecting very small forged parts in the foreground and background
of the image. Moreover, the proposed method improves the accuracy of the algorithm and gives good
satisfactory performance.

Downloads

Download data is not yet available.

Author Biographies

Mahin Malik, Capital University of Science and Technology

Department of Computer Science, Islamabad, Pakistan

Aqsa Ijaz, University of Lahore

Department of Computer Science, Sargodha, Pakistan

Maryam Malik, University of Sargodha

Department of Computer Science, Sargodha, Pakistan

Muhammad Awais, Capital University of Science and Technology

Department of Software Engineering, Islamabad, Pakistan

References

P. M. Raju, and M. S. Nair, “Copy-move forgery detection using binary discriminant features,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 2, pp. 165-178, 2022.

P. Niyishaka, and C. Bhagvati, “Copy-move forgery detection using image blobs and BRISK feature,” Multimedia Tools and Applications, vol. 79, no. 35-36, pp. 26045-26059, 2020.

K. B. Meena, and V. Tyagi, “A copy-move image forgery detection technique based on tetrolet transform,” Journal of Information Security and Applications, vol. 52, pp. 102481, 2020.

A. Dixit, and S. Bag, “Utilization of edge operators for localization of copy-move image forgery using WLD-HOG features with connected component labeling,” Multimedia Tools and Applications, vol. 79, pp. 26061-26097, 2020.

K. A. da Costa, J. P. Papa, L. A. Passos, D. Colombo, J. Del Ser, K. Muhammad, and V. H. C. de Albuquerque, “A critical literature survey and prospects on tampering and anomaly detection in image data,” Applied Soft Computing, vol. 97, pp. 106727, 2020.

H. Chen, X. Yang, and Y. Lyu, “Copy-move forgery detection based on keypoint clustering and similar neighborhood search algorithm,” IEEE Access, vol. 8, pp. 36863-36875, 2020.

F. M. Al_Azrak, A. Sedik, M. I. Dessowky, G. M. El Banby, A. A. Khalaf, A. S. Elkorany, and F. E. Abd. El-Samie, “An efficient method for image forgery detection based on trigonometric transforms and deep learning,” Multimedia Tools and Applications, vol. 79, pp. 18221-18243, 2020.

A. Pavlović, N. Glišović, A. Gavrovska, and I. Reljin, “Copy-move forgery detection based on multifractals,” Multimedia Tools and Applications, vol. 78, pp. 20655-20678, 2019.

Z. F. Elsharkawy, S. A. Abdelwahab, F. E. Abd El-Samie, M. Dessouky, and S. Elaraby, “New and efficient blind detection algorithm for digital image forgery using homomorphic image processing,” Multimedia Tools and Applications, vol. 78, pp. 21585-21611, 2019.

L. M. Dang, S. I. Hassan, S. Im, and H. Moon, “Face image manipulation detection based on a convolutional neural network,” Expert Systems with Applications, vol. 129, pp. 156-168, 2019.

K. Asghar, X. Sun, P. L. Rosin, M. Saddique, M. Hussain, and Z. Habib, “Edge–texture feature-based image forgery detection with cross-dataset evaluation,” Machine Vision and Applications, vol. 30, no. 7-8, pp. 1243-1262, 2019.

B. Yang, X. Sun, H. Guo, Z. Xia, and X. Chen, “A copy-move forgery detection method based on CMFD-SIFT,” Multimedia Tools and Applications, vol. 77, pp. 837-855, 2018.

J. A. Ojeniyi, B. O. Adedayo, I. Ismaila, and S. i. M. Abdulhamid, “Hybridized technique for copy-move forgery detection using discrete cosine transform and speeded-up robust feature techniques,” 2018.

H. A. Alberry, A. A. Hegazy, and G. I. Salama, “A fast SIFT based method for copy move forgery detection,” Future Computing and Informatics Journal, vol. 3, no. 2, pp. 159-165, 2018.

F. Yang, J. Li, W. Lu, and J. Weng, “Copy-move forgery detection based on hybrid features,” Engineering Applications of Artificial Intelligence, vol. 59, pp. 73-83, 2017.

X.-Y. Wang, S. Li, Y.-N. Liu, Y. Niu, H.-Y. Yang, and Z.-l. Zhou, “A new keypoint-based copy-move forgery detection for small smooth regions,” Multimedia Tools and Applications, vol. 76, pp. 23353-23382, 2017.

G. Jin, and X. Wan, “An improved method for SIFT-based copy–move forgery detection using non-maximum value suppression and optimized J-Linkage,” Signal Processing: Image Communication, vol. 57, pp. 113-125, 2017.

X. Bi, and C.-M. Pun, “Fast reflective offset-guided searching method for copy-move forgery detection,” Information Sciences, vol. 418, pp. 531-545, 2017.

Y. Zhu, X. Shen, and H. Chen, “Copy-move forgery detection based on scaled ORB,” Multimedia Tools and Applications, vol. 75, pp. 3221-3233, 2016.

B. Ustubioglu, G. Ulutas, M. Ulutas, and V. V. Nabiyev, “A new copy move forgery detection technique with automatic threshold determination,” AEU-International Journal of Electronics and Communications, vol. 70, no. 8, pp. 1076-1087, 2016.

S. Prasad, and B. Ramkumar, "Passive copy-move forgery detection using SIFT, HOG and SURF features." pp. 706-710.

A. V. Malviya, and S. A. Ladhake, “Pixel based image forensic technique for copy-move forgery detection using auto color correlogram,” Procedia Computer Science, vol. 79, pp. 383-390, 2016.

X. Bi, C.-M. Pun, and X.-C. Yuan, “Multi-level dense descriptor and hierarchical feature matching for copy–move forgery detection,” Information Sciences, vol. 345, pp. 226-242, 2016.

R. C. Pandey, R. Agrawal, S. K. Singh, and K. K. Shukla, "Passive copy move forgery detection using SURF, HOG and SIFT features." pp. 659-666.

J.-C. Lee, C.-P. Chang, and W.-K. Chen, “Detection of copy–move image forgery using histogram of orientated gradients,” Information Sciences, vol. 321, pp. 250-262, 2015.

M. Mishra, and F. Adhikary, “Digital image tamper detection techniques-a comprehensive study,” arXiv preprint arXiv:1306.6737, 2013.

Y. Li, “Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching,” Forensic science international, vol. 224, no. 1-3, pp. 59-67, 2013.

Y. Huang, W. Lu, W. Sun, and D. Long, “Improved DCT-based detection of copy-move forgery in images,” Forensic science international, vol. 206, no. 1-3, pp. 178-184, 2011.

M. Bashar, K. Noda, N. Ohnishi, and K. Mori, “Exploring duplicated regions in natural images,” IEEE Transactions on Image Processing, 2010.

S. Bayram, H. T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery." pp. 1053-1056.

A. C. Popescu, and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” 2004.

E. S. Khan, and E. A. Kulkarni, “An efficient method for detection of copy-move forgery using discrete wavelet transform,” International Journal on Computer Science and Engineering, vol. 2, no. 5, pp. 2010, 1801.

Downloads

Published

2024-03-14

How to Cite

Malik, M., Ijaz, A., Malik, M., & Awais, M. (2024). Image Authenticity Detection Based on the Local Features and Similarity Features . International Journal of Advanced Natural Sciences and Engineering Researches, 8(2), 615–628. Retrieved from https://as-proceeding.com/index.php/ijanser/article/view/1765

Conference Proceedings Volume

Section

Articles