DOI QR코드

DOI QR Code

A Survey on Passive Image Copy-Move Forgery Detection

  • Zhang, Zhi (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
  • Received : 2017.10.20
  • Accepted : 2017.12.26
  • Published : 2018.02.28

Abstract

With the rapid development of the science and technology, it has been becoming more and more convenient to obtain abundant information via the diverse multimedia medium. However, the contents of the multimedia are easily altered with different editing software, and the authenticity and the integrity of multimedia content are under threat. Forensics technology is developed to solve this problem. We focus on reviewing the blind image forensics technologies for copy-move forgery in this survey. Copy-move forgery is one of the most common manners to manipulate images that usually obscure the objects by flat regions or append the objects within the same image. In this paper, two classical models of copy-move forgery are reviewed, and two frameworks of copy-move forgery detection (CMFD) methods are summarized. Then, massive CMFD methods are mainly divided into two types to retrospect the development process of CMFD technologies, including block-based and keypoint-based. Besides, the performance evaluation criterions and the datasets created for evaluating the performance of CMFD methods are also collected in this review. At last, future research directions and conclusions are given to provide beneficial advice for researchers in this field.

Keywords

E1JBB0_2018_v14n1_6_f0001.png 이미지

Fig. 1. Actual event of Iranian missile: (a) genuine Iranian missile photo, (b) forged Iranian missilephoto published on BBC NEWS, and (c) forged Iranian missile photo with marked region-duplication.

E1JBB0_2018_v14n1_6_f0002.png 이미지

Fig. 2. Image forensics technologies classification.

E1JBB0_2018_v14n1_6_f0003.png 이미지

Fig. 3. Two models of copy-move forgery: (a) Luo’s model and (b) Liu’s model.

E1JBB0_2018_v14n1_6_f0004.png 이미지

Fig. 4. Two frameworks of CMFD methods: (a) framework of block-based CMFD and keypoint-basedCMFD and (b) framework of CMFD based on machine learning. Adapted from G. K. Birajdar and V. H.Mankar. Digital image forgery detection using passive techniques: a survey. Digital Investigation2013;10(3):226-245, with the permission of Elsevier [37].

E1JBB0_2018_v14n1_6_f0005.png 이미지

Fig. 5. A circular template in Cartesian space. Adapted from J. Zhong et al. A new block-based methodfor copy move forgery detection under image geometric transforms. Multimedia Tools and Applications2017;76(13):14887-14903, with the permission of Springer [68].

E1JBB0_2018_v14n1_6_f0006.png 이미지

Fig. 6. Example of the CoMoFoD dataset: (a) original image, (b) forged image, (c) forged image withimage blurring, and (d) ground truth map.

Table 1. Block-based CMFD methods comparison

E1JBB0_2018_v14n1_6_t0001.png 이미지

Table 1. (Continued)

E1JBB0_2018_v14n1_6_t0002.png 이미지

Table 1. (Continued)

E1JBB0_2018_v14n1_6_t0003.png 이미지

Table 2. Keypoint-based CMFD methods comparison

E1JBB0_2018_v14n1_6_t0004.png 이미지

Table 2. (Continued)

E1JBB0_2018_v14n1_6_t0005.png 이미지

Table 3. Dataset comparison

E1JBB0_2018_v14n1_6_t0006.png 이미지

References

  1. Photo Tampering throughout History [Online]. Available: http://pth.izitru.com/2008_07_01.html.
  2. D. Vaishnavi and T. S. Subashini, "A passive technique for image forgery detection using contrast context histogram features," International Journal of Electronic Security and Digital Forensics, vol. 7, no. 3, pp. 278-289, 2015. https://doi.org/10.1504/IJESDF.2015.070394
  3. H. Yao, S. Wang, X. Zhang, C. Qin, and J. Wang, "Detecting image splicing based on noise level inconsistency," Multimedia Tools and Applications, vol. 76, no. 10, pp. 12457-12479, 2017. https://doi.org/10.1007/s11042-016-3660-3
  4. B. Bayar and M. C. Stamm, "On the robustness of constrained convolutional neural networks to JPEG postcompression for image resampling detection," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, New Orleans, LA, USA, 2017, pp. 2152-2156.
  5. J. Chen, X. Kang, Y. Liu, and Z. J. Wang, "Median filtering forensics based on convolutional neural networks," IEEE Signal Processing Letters, vol. 22, no. 11, pp. 1849-1853, 2015. https://doi.org/10.1109/LSP.2015.2438008
  6. A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi, and M. Babaie-Zadeh, "Quantization-unaware double JPEG compression detection," Journal of Mathematical Imaging and Vision, vol. 54, no. 3, pp. 269-286, 2016. https://doi.org/10.1007/s10851-015-0602-z
  7. K. Asghar, Z. Habib, and M. Hussain, "Copy-move and splicing image forgery detection and localization techniques: a review," Australian Journal of Forensic Sciences, vol. 49, no. 3, pp. 281-307, 2017. https://doi.org/10.1080/00450618.2016.1153711
  8. D. M. Uliyan and M. A. F. Al-Husainy, "Detection of scaled region duplication image forgery using color based segmentation with LSB signature," International Journal of Advanced Computer Science and Applications, vol. 8, no. 5, pp. 126-132, 2017.
  9. H. Zhang, C. Wang, and X. Zhou, "Fragile watermarking based on LBP for blind tamper detection in images," Journal of Information Processing Systems, vol. 13, no. 2, pp. 385-399, 2017. https://doi.org/10.3745/JIPS.03.0070
  10. W. Luo, J. Huang, and G. Qiu, "Robust detection of region-duplication forgery in digital image," in Proceedings of the 18th International Conference on Pattern Recognition, Hong Kong, China, 2006, pp. 746-749.
  11. G. Liu, J. Wang, S. Lian, and Z. Wang, "A passive image authentication scheme for detecting region-duplication forgery with rotation," Journal of Network and Computer Applications, vol. 34, no. 5, pp. 1557-1565, 2011. https://doi.org/10.1016/j.jnca.2010.09.001
  12. F. Peng, Y. Y. Nie, and M. Long, "A complete passive blind image copy-move forensics scheme based on compound statistics features," Forensic Science International, vol. 212, no. 1-3, pp. e21-e25, 2011. https://doi.org/10.1016/j.forsciint.2011.06.011
  13. M. F. Hashmi, V. Anand, and A. G. Keskar, "Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform," AASRI Procedia, vol. 9, pp. 84-91, 2014. https://doi.org/10.1016/j.aasri.2014.09.015
  14. J. Fridrich, D. Soukal, and J. Lukas, "Detection of copy-move forgery in digital images," in Proceedings of the Digital Forensic Research Workshop, Cleveland, OH, USA, 2003, pp. 55-61.
  15. X. Pan and S. Lyu, "Region duplication detection using image feature matching," IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 857-867, 2010. https://doi.org/10.1109/TIFS.2010.2078506
  16. M. Hussain, G. Muhammad, S. Q. Saleh, A. M. Mirza, and G. Bebis, "Copy-move image forgery detection using multi-resolution weber descriptors," in Proceedings of the 8th International Conference on Signal Image Technology and Internet Based Systems, Naples, Italy, 2012, pp. 395-401.
  17. A. V. Malviya and S. A. Ladhake, "Region duplication detection using color histogram and moments in digital image," in Proceedings of the International Conference on Inventive Computation Technologies, Coimbatore, India, 2016, pp. 1-4.
  18. Y. Zhu, X. J. Shen, and H. P. Chen, "Covert copy-move forgery detection based on color LBP," Acta Automatica Sinica, vol. 43, no. 3, pp. 390-397, 2017.
  19. G. Li, Q. Wu, D. Tu, and S. Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proceedings of the IEEE International Conference on Multimedia and Expo, Beijing, China, 2007, pp. 1750-1753.
  20. B. Ustubioglu, G, Ulutas, M. Ulutas, and V. V. Nabiyev, "Improved copy-move forgery detection based on the CLDs and colour moments," The Imaging Science Journal, vol. 64, no. 4, pp. 215-225, 2016. https://doi.org/10.1080/13682199.2016.1162922
  21. J. Zhang, Z. Feng, and Y. Su, "A new approach for detecting copy-move forgery in digital images," in Proceedings of the 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, China, 2008, pp. 362-366.
  22. L. Li, S. Li, H. Zhu, S. C. Chu, J. F. Roddick, and J. S. Pan, "An efficient scheme for detecting copy-move forged images by local binary patterns," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 46-56, 2013.
  23. R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Susstrunk, "SLIC superpixels compared to state-of-theart superpixel methods," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 11, pp. 2274-2282, 2012. https://doi.org/10.1109/TPAMI.2012.120
  24. M. P. Bhavya Bhanu and M. N. Arun Kumar, "Copy-move forgery detection using segmentation," in Proceedings of the 11th International Conference on Intelligent Systems and Control, Coimbatore, India, 2017, pp. 224-228.
  25. S. Bayram, H. T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Taipei, Taiwan, 2009, pp. 1053-1056.
  26. S. Ketenci and G. Ulutas, "Copy-move forgery detection in images via 2D-Fourier transform," in Proceedings of the 36th International Conference on Telecommunications and Signal Processing, Rome, Italy, 2013, pp. 813-816.
  27. L. Li, S. Li, and J. Wang, "Copy-move forgery detection based on PHT," in Proceedings of the World Congress on Information and Communication Technologies, Trivandrum, India, 2012, pp. 1061-1065.
  28. X. Kang and S. Wei, "Identifying tampered regions using singular value decomposition in digital image forensics," in Proceedings of the International Conference on Computer Science and Software Engineering, Wuhan, China, 2008, pp. 926-930.
  29. S. J. Ryu, M. J. Lee, and H. K. Lee, "Detection of copy-rotate-move forgery using Zernike moments," in Proceedings of the 12th International Conference on Information Hiding, Calgary, AB, Canada, 2010, pp. 51-65.
  30. B. Xu, J. Wang, G. Liu, and Y. Dai, "Image copy-move forgery detection based on SURF," in Proceedings of the International Conference on Multimedia Information Networking and Security, Nanjing, China, 2010, pp. 889- 892.
  31. J. Zhao and J. Guo, "Passive forensics for region duplication image forgery using Harris feature points and annular average representation," Journal of Data Acquisition and Processing, vol. 30, no. 1, pp. 164-174, 2015.
  32. J. M. Guo, Y. F. Liu, and Z. J. Wu, "Duplication forgery detection using improved DAISY descriptor," Expert Systems with Applications, vol. 40, no. 2, pp. 707-714, 2013. https://doi.org/10.1016/j.eswa.2012.08.002
  33. H. J. Lin, C. W. Wang, and Y. T. Kao, "Fast copy-move forgery detection," WSEAS Transactions on Signal Processing, vol. 5, no. 5, pp. 188-197, 2009.
  34. Y. Li, "Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching," Forensic Science International, vol. 224, no. 1-3, pp. 59-67, 2013. https://doi.org/10.1016/j.forsciint.2012.10.031
  35. R. C. Gonzalez and R. E. Woods, "Morphological image processing," in Digital Image Processing (3rd ed.). Beijing, China: Publishing House of Electronics Industry, 2010, pp. 649-701.
  36. M. A. Fischler and R. C. Bolles, "Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography," Communications of the ACM, vol. 24, no. 6, pp. 381-395, 1981. https://doi.org/10.1145/358669.358692
  37. G. K. Birajdar and V. H. Mankar, "Digital image forgery detection using passive techniques: a survey," Digital Investigation, vol. 10, no. 3, pp. 226-245, 2013. https://doi.org/10.1016/j.diin.2013.04.007
  38. Y. Huang, W. Lu, W. Sun, and D. Long, "Improved DCT-based detection of copy-move forgery in images," Forensic Science International, vol. 206, no. 1-3, pp. 178-184, 2011. https://doi.org/10.1016/j.forsciint.2010.08.001
  39. T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah, and M. T. Mahmood, "Copy-move forgery detection technique for forensic analysis in digital images," Mathematical Problems in Engineering, vol. 2016, article no. 8713202, 2016.
  40. Y. Cao, T. Gao, L. Fan, and Q. Yang, "A robust detection algorithm for copy-move forgery in digital images," Forensic Science International, vol. 214, no. 1-3, pp. 33-43, 2012. https://doi.org/10.1016/j.forsciint.2011.07.015
  41. S. M. Fadl and N. A. Semary, "A proposed accelerated image copy-move forgery detection," in Proceedings of the IEEE Visual Communications and Image Processing Conference, Valletta, Malta, 2014, pp. 253-257.
  42. E. Mohebbian and M. Hariri, "Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images," in Proceedings of the 2nd International Conference on Knowledge-Based Engineering and Innovation, Tehran, Iran, 2015, pp. 436-440.
  43. S. Kumar, J. V. Desai, and S. Mukherjee, "Copy move forgery detection in contrast variant environment using binary DCT vectors," International Journal of Image, Graphics and Signal Processing, vol. 7, no. 6, pp. 38-44, 2015. https://doi.org/10.5815/ijigsp.2015.06.05
  44. M. H. Alkawaz, G. Sulong, T. Saba, and A. Rehman, "Detection of copy-move image forgery based on discrete cosine transform," Neural Computing and Applications, 2016. https://doi.org/10.1007/s00521-016-2663-3
  45. H. Wang, H. X. Wang, X. M. Sun, and Q. Qian, "A passive authentication scheme for copy-move forgery based on package clustering algorithm," Multimedia Tools and Applications, vol. 76, no. 10, pp. 12627-12644, 2017. https://doi.org/10.1007/s11042-016-3687-5
  46. J. Zhao and J. Guo, "Passive forensics for copy-move image forgery using a method based on DCT and SVD," Forensic Science International, vol. 233, no. 1-3, pp. 158-166, 2013. https://doi.org/10.1016/j.forsciint.2013.09.013
  47. M. Doyoddorj and K. H. Rhee, "Robust copy-move forgery detection based on dual-transform," in Proceedings of the 5th International Conference on Digital Forensics and Cyber Crime, Moscow, Russia, 2013, pp. 3-16.
  48. B. Ustubioglu, G. Ulutas, M. Ulutas, V. Nabiyev, and A. Ustubioglu, "LBP-DCT based copy move forgery detection algorithm," in Proceedings of the 30th International Symposium on Computer and Information Sciences, London, UK, 2015, pp. 127-136.
  49. A. Kashyap and S. D. Joshi, "Detection of copy-move forgery using wavelet decomposition," in Proceedings of the International Conference on Signal Processing and Communication, Noida, India, 2013, pp. 396-400.
  50. S. Mallat and S. Zhong, "Characterization of signals from multiscale edges," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, no. 7, pp. 710-732, 1992. https://doi.org/10.1109/34.142909
  51. G. Muhammad, M. Hussain, and G. Bebis, "Passive copy move image forgery detection using undecimated dyadic wavelet transform," Digital Investigation, vol. 9, no. 1, pp. 49-57, 2012. https://doi.org/10.1016/j.diin.2012.04.004
  52. C. S. Prakash and S. Maheshkar, "Copy-move forgery detection using DyWT," International Journal of Multimedia Data Engineering and Management, vol. 8, no. 2, pp. 1-9, 2017.
  53. R. Dixit, R. Naskar, and S. Mishra, "Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD," IET Image Processing, vol. 11, no. 5, pp. 301-309, 2017. https://doi.org/10.1049/iet-ipr.2016.0537
  54. G. P. Nason and B. W. Silverman, "The stationary wavelet transform and some statistical applications," in Wavelets and Statistics. New York, NY: Springer, 1995, pp. 281-299.
  55. A. N. Myna, M. G. Venkateshmurthy, and C. G. Patil, "Detection of region duplication forgery in digital images using wavelets and log-polar mapping," in Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, Sivakasi, India, 2007, pp. 371-377.
  56. S. Bravo-Solorio and A. K. Nandi, "Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling," in Proceedings of the 17th European Signal Processing Conference, Glasgow, UK, 2009, pp. 824-828.
  57. S. Bravo-Solorio and A. K. Nandi, "Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics," Signal Processing, vol. 91, no. 8, pp. 1759-1770, 2011. https://doi.org/10.1016/j.sigpro.2011.01.022
  58. Q. Wu, S. Wang, and X. Zhang, "Log-polar based scheme for revealing duplicated regions in digital images," IEEE Signal Processing Letters, vol. 18, no. 10, pp. 559-562, 2011. https://doi.org/10.1109/LSP.2011.2163507
  59. C. S. Park, C. Kim, J. Lee, and G. R. Kwon, "Rotation and scale invariant upsampled log-polar Fourier descriptor for copy-move forgery detection," Multimedia Tools and Applications, vol. 75, no. 23, pp. 16577-16595, 2016. https://doi.org/10.1007/s11042-016-3575-z
  60. Y. Yuan, Y. Zhang, S. Chen, and H. Wang, "Robust region duplication detection on log-polar domain using band limitation," Arabian Journal for Science and Engineering, vol. 42, no. 2, pp. 559-565, 2017. https://doi.org/10.1007/s13369-016-2268-2
  61. P. T. Yap, X. Jiang, and A. C. Kot, "Two-dimensional polar harmonic transforms for invariant image representation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 7, pp. 1259-1270, 2010. https://doi.org/10.1109/TPAMI.2009.119
  62. L. Li, S. Li, H. Zhu, and X. Wu, "Detecting copy-move forgery under affine transforms for image forensics," Computers & Electrical Engineering, vol. 40, no. 6, pp. 1951-1962, 2014. https://doi.org/10.1016/j.compeleceng.2013.11.034
  63. R. E. J. Granty and G. Kousalya, "Spectral-hashing-based image retrieval and copy-move forgery detection," Australian Journal of Forensic Sciences, vol. 48, no. 6, pp. 643-658, 2016. https://doi.org/10.1080/00450618.2015.1128966
  64. M. Emam, Q. Han, and X. Niu, "PCET based copy-move forgery detection in images under geometric transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, 2016. https://doi.org/10.1007/s11042-015-2872-2
  65. X. Bi, C. M. Pun, and X. C. Yuan, "Multi-level dense descriptor and hierarchical feature matching for copy- move forgery detection," Information Sciences, vol. 345, pp. 226-242, 2016. https://doi.org/10.1016/j.ins.2016.01.061
  66. Y. Wo, K. Yang, G. Han, H. Chen, and W. Wu, "Copy-move forgery detection based on multi-radius PCET," IET Image Processing, vol. 11, no. 2, pp. 99-108, 2017. https://doi.org/10.1049/iet-ipr.2016.0229
  67. J. Zhong, Y. Gan, J. Young, and P. Lin, "Copy move forgery image detection via discrete Radon and polar complex exponential transform-based moment invariant features," International Journal of Pattern Recognition and Artificial Intelligence, vol. 31, no. 2, article no. 1754005, 2017.
  68. J. Zhong, Y. Gan, J. Young, L. Huang, and P. Lin, "A new block-based method for copy move forgery detection under image geometric transforms," Multimedia Tools and Applications, vol. 76, no. 13, pp. 14887-14903, 2017. https://doi.org/10.1007/s11042-016-4201-9
  69. W. Li and N. Yu, "Rotation robust detection of copy-move forgery," in Proceedings of the IEEE International Conference on Image Processing, Hong Kong, China, 2010, pp. 2113-2116.
  70. J. Zhong and Y. Gan, "Detection of copy-move forgery using discrete analytical Fourier-Mellin transform," Nonlinear Dynamics, vol. 84, no. 1, pp. 189-202, 2016. https://doi.org/10.1007/s11071-015-2374-9
  71. H. Shao, T. Yu, M. Xu, and W. Cui, "Image region duplication detection based on circular window expansion and phase correlation," Forensic Science International, vol. 222, no. 1-3, pp. 71-82, 2012. https://doi.org/10.1016/j.forsciint.2012.05.002
  72. F. Yavuz, A. Bal, and H. Cukur, "An effective detection algorithm for region duplication forgery in digital images," in Proceedings of the Conference on Optical Pattern Recognition XXVII, Baltimore, MD, USA, 2016, pp. 1-7.
  73. S. Dadkhah, M. Koppen, H. A. Jalab, S. Sadeghi, A. A. Manaf, and D. M. Uliyan, "Electromagnetismlike mechanism descriptor with Fourier transform for a passive copy-move forgery detection in digital image forensics," in Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, Porto, Portugal, 2017, pp. 612-619.
  74. D. Y. Huang, C. N. Huang, W. C. Hu, and C. H. Chou, "Robustness of copy-move forgery detection under high JPEG compression artifacts," Multimedia Tools and Applications, vol. 76, no. 1, pp. 1509-1530, 2017. https://doi.org/10.1007/s11042-015-3152-x
  75. R. Davarzani, K. Yaghmaie, S. Mozaffari, and M. Tapak, "Copy-move forgery detection using multiresolution local binary patterns," Forensic Science International, vol. 231, no. 1-3, pp. 61-72, 2013. https://doi.org/10.1016/j.forsciint.2013.04.023
  76. D. M. Uliyan, H. A. Jalab, and A. W. A. Wahab, "Copy move image forgery detection using Hessian and center symmetric local binary pattern," in Proceedings of the IEEE Conference on Open Systems, Melaka, Malaysia, 2015, pp. 7-11.
  77. P. Yang, G. Yang, and D. Zhang, "Rotation invariant local binary pattern for blind detection of copy-move forgery with affine transform," in Proceedings of the 2nd International Conference on Cloud Computing and Security, Nanjing, China, 2016, pp. 404-416.
  78. D. Tralic, S. Grgic, X. Sun, and P. L. Rosin, "Combining cellular automata and local binary patterns for copymove forgery detection," Multimedia Tools and Applications, vol. 75, no. 24, pp. 16681-16903, 2016.
  79. A. Kuznetsov and V. Myasnikov, "A copy-move detection algorithm using binary gradient contours," in Proceedings of the 13th International Conference on Image Analysis and Recognition, Povoa de Varzim, Portugal, 2016, pp. 349-357.
  80. S. J. Ryu, M. Kirchner, M. J. Lee, and H. K. Lee, "Rotation invariant localization of duplicated image regions based on Zernike moments," IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1355- 1370, 2013. https://doi.org/10.1109/TIFS.2013.2272377
  81. O. M. Al-Qershi and B. E. Khoo, "Enhanced matching method for copy-move forgery detection by means of Zernike moments," in Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, Taipei, Taiwan, 2014, pp. 485-497.
  82. G. Lynch, F. Y. Shih, and H. Y. M. Liao, "An efficient expanding block algorithm for image copy-move forgery detection," Information Sciences, vol. 239, pp. 253-265, 2013. https://doi.org/10.1016/j.ins.2013.03.028
  83. L. T. Thuong, M. Luong, H. K. Tu, P. C. H. Long, and T. H. An, "Block based technique for detecting copy-move digital image forgeries: wavelet transform and Zernike moments," in Proceedings of the 2nd International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Las Pinas, Philippines, 2016, pp. 26-33.
  84. K. Mahmoud and A. Abu-Alrukab, "Copy-move forgery detection using Zernike and Pseudo Zernike moments," The International Arab Journal of Information Technology, vol. 13, no. 6A, pp. 930-937, 2016.
  85. B. Mahdian and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic Science International, vol. 171, no. 2-3, pp. 180-189, 2007. https://doi.org/10.1016/j.forsciint.2006.11.002
  86. J. Flusser and T. Suk, "Degraded image analysis: an invariant approach," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 6, pp. 590-603, 1998. https://doi.org/10.1109/34.683773
  87. Z. L. Du, X. L. Li, L. X. Jiao, and K. Shen, "Region duplication blind detection based on multiple feature combination," in Proceedings of the International Conference on Machine Learning and Cybernetics, Xi'an, China, 2012, pp. 17-21.
  88. M. B. Imamoglu, G. Ulutas, and M. Ulutas, "Detection of copy-move forgery using Krawtchouk moment," in Proceedings of the 8th International Conference on Electrical and Electronics Engineering, Bursa, Turkey, 2013, pp. 311-314.
  89. R. Kushol, M. S. Salekin, M. H. Kabir, and A. A. Khan, "Copy-move forgery detection using color space and moment invariants-based features," in Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, QLD, Australia, 2016, pp. 1-6.
  90. A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Department of Computer Science, Dartmouth College, Hanover, NH, Technical Report TR2004-515, 2004.
  91. P. Kakar and N. Sudha, "Exposing postprocessed copy-paste forgeries through transform-invariant features," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1018-1028, 2012. https://doi.org/10.1109/TIFS.2012.2188390
  92. A. V. Malviya and S. A. Ladhake, "Pixel based image forensic technique for copy-move forgery detection using Auto Color Correlogram," in Proceedings of the 7th International Conference on Communication, Computing and Virtualization, Mumbai, India, 2016, pp. 383-390.
  93. A. D. Warbhe, R. V. Dharaskar, and V. M. Thakare, "A scaling robust copy-paste tampering detection for digital image forensics," in Proceedings of the 7th International Conference on Communication, Computing and Virtualization, Mumbai, India, 2016, pp. 458-465.
  94. K. A. Vladimirovich and M. V. Valerievich, "A fast plain copy-move detection algorithm based on structural pattern and 2D Rabin-Karp rolling hash," in Proceedings of the 11th International Conference on Image Analysis and Recognition, Vilamoura, Portugal, 2014, pp. 461-468.
  95. A. Kuznetsov and V. Myasnikov, "Using efficient linear local features in the copy-move forgery detection task," in Proceedings of the International Conference on Analysis of Images, Social Networks and Texts, Yekaterinburg, Russia, 2016, pp. 305-313.
  96. A. Kashyap, M. Agarwal, and H. Gupta, "Detection of copy-move image forgery using SVD and cuckoo search algorithm," Apr. 3, 2017 [Online]. Available: https://arxiv.org/abs/1704.00631.
  97. C. Barnes, E. Shechtman, A. Finkelstein, and D. B. Goldman, "PatchMatch: a randomized correspondence algorithm for structural image editing," ACM Transactions on Graphics, vol. 28, no. 3, article no. 24, 2009.
  98. D. Cozzolino, G. Poggi, and L. Verdoliva, "Copy-move forgery detection based on PatchMatch," in Proceedings of the IEEE International Conference on Image Processing, Paris, France, 2014, pp. 5312-5316.
  99. D. Cozzolino, D. Gragnaniello, and L. Verdoliva, "Image forgery detection through residual-based local descriptors and block-matching," in Proceedings of the IEEE International Conference on Image Processing, Paris, France, 2014, pp. 5297-5301.
  100. D. Cozzolino, G. Poggi, and L. Verdoliva, "Efficient dense-field copy-move forgery detection," IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2284-2297, 2015. https://doi.org/10.1109/TIFS.2015.2455334
  101. M. Hussain, S. Q. Saleh, H. Aboalsamh, G. Muhammad, and G. Bebis, "Comparison between WLD and LBP descriptors for non-intrusive image forgery detection," in Proceedings of the IEEE International Symposium on Innovations in Intelligent Systems and Applications, Alberobello, Italy, 2014, pp. 197-204.
  102. G. Muhammad, M. H. Al-Hammadi, M. Hussain, and G. Bebis, "Image forgery detection using steerable pyramid transform and local binary pattern," Machine Vision and Applications, vol. 25, no. 4, pp. 985-995, 2014. https://doi.org/10.1007/s00138-013-0547-4
  103. Y. Rao and J. Ni, "A deep learning approach to detection of splicing and copy-move forgeries in images," in Proceedings of the IEEE International Workshop on Information Forensics and Security, Abu Dhabi, United Arab Emirates, 2016, pp. 1-6.
  104. G. Schaefer and M. Stich, "UCID: an uncompressed colour image database," in Proceedings of the Conference on Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, USA, 2004, pp. 472-480.
  105. National Geographic [Online]. Available: http://www.nationalgeographic.com/photography/.
  106. J. Deng, W. Dong, R. Socher, L. J. Li, K. Li, and F. F. Li, "ImageNet: a large-scale hierarchical image database," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 2009, pp. 248-255.
  107. Kodak Lossless True Color Image Suite [Online]. Available: http://r0k.us/graphics/kodak/.
  108. Database for object and concept recognition [Online]. Available: http://www.cs.washington.edu/research/imagedatabase/groundtruth/.
  109. T. T. Ng, S. F. Chang, J. Hsu, and M. Pepeljugoski, "Columbia photographic images and photorealistic computer graphics dataset," Columbia University, New York, NY, ADVENT Technical Report #205-2004-5, 2005.
  110. The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/.
  111. G. Griffin, A. Holub, and P. Perona, "Caltech-256 object category dataset," California Institute of Technology, Los Angeles, CA, USA, Technical Report 7694, 2007.
  112. M. Jaberi, G. Bebis, M. Hussain, and G. Muhammad, "Accurate and robust localization of duplicated region in copy-move image forgery," Machine Vision and Applications, vol. 25, no. 2, pp. 451-475, 2014. https://doi.org/10.1007/s00138-013-0522-0
  113. L. Yu, Q. Han, and X. Niu, "Feature point-based copy-move forgery detection: covering the non-textured areas," Multimedia Tools and Applications, vol. 75, no. 2, pp. 1159-1176, 2016. https://doi.org/10.1007/s11042-014-2362-y
  114. M. Emam, Q. Han, L. Yu, and H. Zhang, "A keypoint-based region duplication forgery detection algorithm," IEICE Transactions on Information and Systems, vol. E99-D, no. 9, pp. 2413-2416, 2016. https://doi.org/10.1587/transinf.2016EDL8024
  115. H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Proceedings of the IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China, 2008, pp. 272-276.
  116. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "Geometric tampering estimation by means of a SIFT-based forensic analysis," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Dallas, TX, USA, 2010, pp. 1702-1705.
  117. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A SIFT-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011. https://doi.org/10.1109/TIFS.2011.2129512
  118. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, "Copy-move forgery detection and localization by means of robust clustering with J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013. https://doi.org/10.1016/j.image.2013.03.006
  119. G. Jin and X. Wan, "An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage," Signal Processing: Image Communication, vol. 57, pp. 113-125, 2017. https://doi.org/10.1016/j.image.2017.05.010
  120. V. Anand, M. F. Hashmi, and A. G. Keskar, "A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods," in Proceedings of the 6th Asian Conference on Intelligent Information and Database Systems, Bangkok, Thailand, 2014, pp. 530-542.
  121. J. Gong and J. Guo, "Exposing region duplication through local geometrical color invariant features," Journal of Electronic Imaging, vol. 24, no. 3, article no. 033010, 2015.
  122. P. P. Panzade, C. S. Prakash, and S. Maheshkar, "Copy-move forgery detection by using HSV preprocessing and keypoint extraction," in Proceedings of the 4th International Conference on Parallel, Distributed and Grid Computing, Waknaghat, India, 2016, pp. 264-269.
  123. F. Zhao, W. Shi, B. Qin, and B. Liang, "Analysis of SIFT method based on swarm intelligent algorithms for copy-move forgery detection," in Proceedings of the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Zhangjiajie, China, 2016, pp. 478-490.
  124. W. Shi, F. Zhao, B. Qin, and B. Liang, "Improving image copy-move forgery detection with particle swarm optimization techniques," China Communications, vol. 13, no. 1, pp. 139-149, 2016. https://doi.org/10.1109/CC.2016.7405711
  125. R. K. Karsh, A. Das, G. L. Swetha, A. Medhi, R. H. Laskar, U. Arya, and R. K. Agarwal, "Copy-move forgery detection using ASIFT," in Proceedings of the 1st India International Conference on Information Processing, Delhi, India, 2016, pp. 1-5.
  126. A. R. H. Khayeat, X. Sun, and P. L. Rosin, "Improved DSIFT descriptor based copy-rotate-move forgery detection," in Proceedings of the 7th Pacific-Rim Symposium on Image and Video Technology, Auckland, New Zealand, 2015, pp. 642-655.
  127. J. Li, X. Li, B. Yang, and X. Sun, "Segmentation-based image copy-move forgery detection scheme," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, 2015. https://doi.org/10.1109/TIFS.2014.2381872
  128. N. B. A. Warif, A. W. A. Wahab, M. Y. I. Idris, R. Salleh, and F. Othman, "SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack," Journal of Visual Communication and Image Representation, vol. 46, pp. 219-232, 2017. https://doi.org/10.1016/j.jvcir.2017.04.004
  129. B. L. Shivakumar and S. S. Baboo, "Detection of region duplication forgery in digital images using SURF," International Journal of Computer Science Issues, vol. 8, no. 4, pp. 199-205, 2011.
  130. P. Mishra, N. Mishra, S. Sharma, and R. Patel, "Region duplication forgery detection technique based on SURF and HAC," The Scientific World Journal, vol. 2013, article no. 267691, 2013.
  131. E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, "Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes," Journal of Visual Communication and Image Representation, vol. 29, pp. 16-32, 2015. https://doi.org/10.1016/j.jvcir.2015.01.016
  132. B. Yang, X. Sun, X. Xin, W. Hu, and Y. Wu, "Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression," Journal of Electronic Imaging, vol. 24, no. 6, article no. 063016, 2015.
  133. L. Chen, W. Lu, J. Ni, W. Sun, and J. Huang, "Region duplication detection based on Harris corner points and step sector statistics," Journal of Visual Communication and Image Representation, vol. 24, no. 3, pp. 244-254, 2013. https://doi.org/10.1016/j.jvcir.2013.01.008
  134. J. Zhao and W. Zhao, "Passive forensics for region duplication image forgery based on Harris feature points and local binary patterns," Mathematical Problems in Engineering, vol. 2013, article no. 619564, 2013.
  135. X. Wang, G. He, C. Tang, Y. Han, and S. Wang, "Keypoints-based image passive forensics method for copymove attacks," International Journal of Pattern Recognition and Artificial Intelligence, vol. 30, no. 3, article no. 1655008, 2016.
  136. D. M. Uliyan, H. A. Jalab, A. W. A. Wahab, and S. Sadeghi, "Image region duplication forgery detection based on angular radial partitioning and Harris key-points," Symmetry, vol. 8, no. 7, article no. 62, 2016.
  137. E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-move forgery detection by matching triangles of keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084-2094, 2015. https://doi.org/10.1109/TIFS.2015.2445742
  138. R. C. Pandey, S. K. Singh, K. K. Shukla, and R. Agrawal, "Fast and robust passive copy-move forgery detection using SURF and SIFT image features," in Proceedings of the 9th International Conference on Industrial and Information Systems, Gwalior, India, 2014, pp. 1-6.
  139. S. Kumar, J. V. Desai, and S. Mukherjee, "A fast keypoint based hybrid method for copy move forgery detection," International Journal of Computing and Digital Systems, vol. 4, no. 2, pp. 91-99, 2015. https://doi.org/10.12785/ijcds/040203
  140. M. M. Isaac and M. Wilscy, "Copy-move forgery detection based on Harris corner points and BRISK," in Proceedings of the 3rd International Symposium on Women in Computing and Informatics, Kochi, India, 2015, pp. 394-399.
  141. R. C. Pandey, R. Agrawal, S. K. Singh, and K. K. Shukla, "Passive copy move forgery detection using SURF, HOG and SIFT features," in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications, Bhubaneswar, India, 2014, pp. 659-666.
  142. S. Prasad and B. Ramkumar, "Passive copy-move forgery detection using SIFT, HOG and SURF features," in Proceedings of the IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, Bangalore, India, 2016, pp. 706-710.
  143. M. Emam, Q. Han, and H. Zhang, "Two-stage keypoint detection scheme for region duplication forgery detection in digital images," Journal of Forensic Sciences, vol. 63, no. 1, pp. 102-111, 2018. https://doi.org/10.1111/1556-4029.13456
  144. F. Yang, J. Li, W. Lu, and J. Weng, "Copy-move forgery detection based on hybrid features," Engineering Applications of Artificial Intelligence, vol. 59, pp. 73-83, 2017. https://doi.org/10.1016/j.engappai.2016.12.022
  145. V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012. https://doi.org/10.1109/TIFS.2012.2218597
  146. D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, "CoMoFoD—new database for copy-move forgery detection," in Proceedings of the 55th International Symposium on ELMAR, Zadar, Croatia, 2013, pp. 49-54.
  147. G. Serra, "MICC-F600, MICC-F220, MICC-F2000, and MICC-F8multi," [Online]. Available: http://giuseppeserra.com/content/sift-based-forensic-method-copy-move-detection.
  148. National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science, "CASIA image tampering detection evaluation database (CASIA TIDE) v1.0, v2.0," [Online]. Available: http://forensics.idealtest.org.
  149. B. Wen, Y. Zhu, R. Subramanian, T. T. Ng, X. Shen, and S. Winkler, "COVERAGE-a novel database for copymove forgery detection," in Proceedings of the IEEE International Conference on Image Processing, Phoenix, AZ, USA, 2016, pp. 161-165.
  150. T. T. Ng and S. F. Chang, "A data set of authentic and spliced image blocks," Columbia University, New York, NY, ADVENT Technical Report #203-2004-3, 2004.
  151. D. Martin, C. Fowlkes, D. Tal, and J. Malik, "A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics," in Proceedings of the 8th IEEE International Conference on Computer Vision, Vancouver, Canada, 2001, pp. 416-423.
  152. R. Salakhutdinov and G. Hinton, "Deep Boltzmann machines," in Proceedings of the 12th International Conference on Artificial Intelligence and Statistics, Clearwater, FL, USA, 2009, pp. 448-455.
  153. A. Krizhevsky, I. Sutskever, and G. E. Hinton, "ImageNet classification with deep convolutional neural networks," in Proceedings of the 26th Annual Conference on Neural Information Processing Systems, Lake Tahoe, NV, USA, 2012, pp. 1097-1105.