Browse > Article
http://dx.doi.org/10.5370/JEET.2015.10.4.1886

Block and Fuzzy Techniques Based Forensic Tool for Detection and Classification of Image Forgery  

Hashmi, Mohammad Farukh (Dept. of Electronic and Communication Engineering)
Keskar, Avinash G. (Dept. of Electronic and Communication Engineering)
Publication Information
Journal of Electrical Engineering and Technology / v.10, no.4, 2015 , pp. 1886-1898 More about this Journal
Abstract
In today’s era of advanced technological developments, the threats to the authenticity and integrity of digital images, in a nutshell, the threats to the Image Forensics Research communities have also increased proportionately. This happened as even for the ‘non-expert’ forgers, the availability of image processing tools has become a cakewalk. This image forgery poses a great problem for judicial authorities in any context of trade and commerce. Block matching based image cloning detection system is widely researched over the last 2-3 decades but this was discouraged by higher computational complexity and more time requirement at the algorithm level. Thus, for reducing time need, various dimension reduction techniques have been employed. Since a single technique cannot cope up with all the transformations like addition of noise, blurring, intensity variation, etc. we employ multiple techniques to a single image. In this paper, we have used Fuzzy logic approach for decision making and getting a global response of all the techniques, since their individual outputs depend on various parameters. Experimental results have given enthusiastic elicitations as regards various transformations to the digital image. Hence this paper proposes Fuzzy based cloning detection and classification system. Experimental results have shown that our detection system achieves classification accuracy of 94.12%. Detection accuracy (DAR) while in case of 81×81 sized copied portion the maximum accuracy achieved is 99.17% as regards subjection to transformations like Blurring, Intensity Variation and Gaussian Noise Addition.
Keywords
Image forensics; Cloning detection; Fuzzy logic; Blurring; Intensity variation; Gaussian noise addition;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Mahdian, Babak, and Stanislav Saic. “Blind authentication usingperiodic properties of interpolation.” IEEE Transactions onInformation Forensics and Security, vol., no. 3, pp. 529-538, 2008.
2 Amerini, Irene, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra. “A sift-based forensic method for copy-move attack detection and transformation recovery”, IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011.   DOI   ScienceOn
3 CASIA Tampering Detection Dataset V1.0, 2009.
4 Huang, Yanping, Wei Lu, Wei Sun, and Dongyang Long. “Improved DCT-based detection of copy-move forgery in images.” Forensic science international, vol. 206, no. 1, pp. 178-184, 2011.   DOI   ScienceOn
5 Hashmi, Mohammad F., Aaditya R. Hambarde and Avinash G. Keskar “Image Authentication Based on HMM and SVM Classifier”, Engineering Letters, vol. 22, no. 4, pp. 183-193, 2014.
6 Li, Yuenan. “Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching.” Forensic science inter-national, vol. 224, no. 1, pp. 59-67, 2013.   DOI   ScienceOn
7 Akbarpour Sekeh, Mohammad, Mohd Aizaini Maarof, Mohd Foad Rohani, and Babak Mahdian. “Efficient image duplicated region detection model using sequential block clustering.” Digital Investigation, vol. 10, no. 1, pp. 73-84, 2013.   DOI   ScienceOn
8 Lynch, Gavin, Frank Y. Shih, and Hong-Yuan Mark Liao. “An efficient expanding block algorithm for image copy-move forgery detection.” Information Sciences, vol. 239, pp. 253-265, 2013.   DOI   ScienceOn
9 Zhao, Jie, and JichangGuo. “Passive forensics for copy-move image forgery using a method based on DCT and SVD.” Forensic science international, vol. 233, no. 1, pp. 158-166, 2013.   DOI   ScienceOn
10 Ketenci, Seniha, and Guzin Ulutas. “Copy-move forgery detection in images via 2D-Fourier Transform.” In Proceedings of 36th IEEE International Conference on Telecommunications and Signal Processing (TSP-2013), pp. 813-816, 2013.
11 Farid, Hany. “Exposing digital forgeries from JPEG ghosts.” IEEETransactions on Information Forensics and Security, vol. 4, no. 1, pp. 154-160, 2009.   DOI   ScienceOn
12 Li, Weihai, Yuan Yuan, and Nenghai Yu. “Passive detection ofdoctored JPEG image via block artifact grid extraction.” SignalProcessing, vol. 89, no. 9, pp. 1821-1829, September 2009.
13 Bianchi, T., De Rosa, A., Piva, A., “Improved DCT coefficientanalysis for forgery localization in JPEG images” In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-2011), pp. 2444-2447, May 2011.
14 Popescu, Alin C., and Hany Farid. “Exposing digital forgeries by detecting duplicated image regions.” Dept. Comput.Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.
15 Li, Guohui, Qiong Wu, Dan Tu, and Shaojie Sun. “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD.” In Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 1750-1753, 2007.
16 Huang, Yanping, Wei Lu, Wei Sun, and Dongyang Long. “Improved DCT-based detection of copy-move forgery in images.” Forensic science international, vol. 206, no. 1, pp.178-184, 2011.   DOI   ScienceOn
17 Wang, Yang, Kaitlyn Gurule, Jacqueline Wise, and Jun Zheng. “Wavelet based region duplication forgery detection.” In Proceedings of Ninth International Conference on Information Technology: New Generations (ITNG-2012), pp. 30-35, 2012.
18 Fridrich, A. Jessica, B. David Soukal, and A. Jan Lukáš. “Detection of copy-move forgery in digital images.” In Proceedings of IEEE Digital Forensic Research Workshop, Cleveland, OH, USA, pp. 55-61, August 2003.
19 Wu Qiong, Shao-Jie SUN, Wei ZHU, Guo-Hui LI, Dan TU, Chao-Sheng HE, “A blind forensic algorithm for detecting doctored image region by application of exemplar-based image completion.” Acta Automatica Silica, vol. 35, no. 3, pp. 239-243, March 2009.   DOI
20 Cao, Yanjun, TiegangGao, Li Fan, and Qunting Yang. “A robust detection algorithm for copy-move forgery in digital images.” Forensic science international, vol. 214, no. 1, pp. 33-43, 2012.   DOI   ScienceOn
21 Muhammad, Ghulam, Muhammad Hussain, and George Bebis. “Passive copy move image forgery detection using undecimated dyadic wavelet transform.” Digital Investigation, vol. 9, no. 1, pp. 49-57, 2012.   DOI   ScienceOn
22 Mahdian, Babak, and StanislavSaic. “A bibliography on blind methods for identifying image forgery.” Signal Processing: Image Communication, vol.25, no. vol. 6, pp.389-399, 2010.   DOI   ScienceOn
23 Murali, S., Govindraj B. Chittapur, and Basavaraj S. Anami. “Comparison and analysis of photo image forgery detection techniques.” arXiv preprint arXiv: 1302.3119, 2013.
24 Barni, Mauro, and Andrea Costanzo. “A fuzzy approach to deal with uncertainty in image forensics.” Signal Processing: Image Communication, vol. 27, no. 9, pp. 998-1010, 2012.   DOI   ScienceOn
25 Qazi, Tanzeela, Khizar Hayat, Samee U. Khan, Sajjad A. Madani, Imran A. Khan, Joanna Kołodziej, Hongxiang Li, Weiyao Lin, Kin Choong Yow, and CZ. Xu. “Survey on blind image forgery detection.” IET Image Processing, vol. 7, no. 7, pp. 660-670, 2013.   DOI
26 Al-Qershi, Osamah M., and Bee EeKhoo. “Passive detection of copy-move forgery in digital images: State-of-the-art.” Forensic science international, vol. 231, no. 1, pp. 284-295, 2013.   DOI   ScienceOn
27 Cozzolino, Davide, Francesco Gargiulo, Carlo Sansone, and Luisa Verdoliva. “Multiple classifier systems for image forgery detection.” In Proceedings of Image Analysis and Processing (ICIAP -2013), pp. 259-268, Springer Berlin Heidelberg, 2013.
28 Christlein, Vincent, Christian Riess, Johannes Jordan, and E. Angelopoulou. “An evaluation of popular copy-move forgery detection approaches.” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.   DOI   ScienceOn
29 Ketenci, Seniha, Guzin Ulutas, and Mustafa Ulutas. “Detection of duplicated regions in images using 1D-Fourier transform.” In Proceedings of International Conference on Systems, Signals and Image Processing (IWSSIP-2014), vol. 2, pp. 171-174, 2014.
30 Stamm, Matthew C., and KJ Ray Liu. “Forensic detection of image manipulation using statistical intrinsic fingerprints.” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 492-506, 2010.   DOI   ScienceOn