Browse > Article
http://dx.doi.org/10.3745/JIPS.02.0078

A Survey on Passive Image Copy-Move Forgery Detection  

Zhang, Zhi (School of Mechanical, Electrical and Information Engineering, Shandong University)
Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University)
Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
Publication Information
Journal of Information Processing Systems / v.14, no.1, 2018 , pp. 6-31 More about this Journal
Abstract
With the rapid development of the science and technology, it has been becoming more and more convenient to obtain abundant information via the diverse multimedia medium. However, the contents of the multimedia are easily altered with different editing software, and the authenticity and the integrity of multimedia content are under threat. Forensics technology is developed to solve this problem. We focus on reviewing the blind image forensics technologies for copy-move forgery in this survey. Copy-move forgery is one of the most common manners to manipulate images that usually obscure the objects by flat regions or append the objects within the same image. In this paper, two classical models of copy-move forgery are reviewed, and two frameworks of copy-move forgery detection (CMFD) methods are summarized. Then, massive CMFD methods are mainly divided into two types to retrospect the development process of CMFD technologies, including block-based and keypoint-based. Besides, the performance evaluation criterions and the datasets created for evaluating the performance of CMFD methods are also collected in this review. At last, future research directions and conclusions are given to provide beneficial advice for researchers in this field.
Keywords
Copy-Move Forgery Detection (CMFD); Image Forensics; Image Tamper Detection; Passive Forgery Detection;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. A. Vladimirovich and M. V. Valerievich, "A fast plain copy-move detection algorithm based on structural pattern and 2D Rabin-Karp rolling hash," in Proceedings of the 11th International Conference on Image Analysis and Recognition, Vilamoura, Portugal, 2014, pp. 461-468.
2 A. Kuznetsov and V. Myasnikov, "Using efficient linear local features in the copy-move forgery detection task," in Proceedings of the International Conference on Analysis of Images, Social Networks and Texts, Yekaterinburg, Russia, 2016, pp. 305-313.
3 A. Kashyap, M. Agarwal, and H. Gupta, "Detection of copy-move image forgery using SVD and cuckoo search algorithm," Apr. 3, 2017 [Online]. Available: https://arxiv.org/abs/1704.00631.
4 C. Barnes, E. Shechtman, A. Finkelstein, and D. B. Goldman, "PatchMatch: a randomized correspondence algorithm for structural image editing," ACM Transactions on Graphics, vol. 28, no. 3, article no. 24, 2009.
5 D. Cozzolino, G. Poggi, and L. Verdoliva, "Copy-move forgery detection based on PatchMatch," in Proceedings of the IEEE International Conference on Image Processing, Paris, France, 2014, pp. 5312-5316.
6 D. Cozzolino, D. Gragnaniello, and L. Verdoliva, "Image forgery detection through residual-based local descriptors and block-matching," in Proceedings of the IEEE International Conference on Image Processing, Paris, France, 2014, pp. 5297-5301.
7 D. Cozzolino, G. Poggi, and L. Verdoliva, "Efficient dense-field copy-move forgery detection," IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2284-2297, 2015.   DOI
8 G. Serra, "MICC-F600, MICC-F220, MICC-F2000, and MICC-F8multi," [Online]. Available: http://giuseppeserra.com/content/sift-based-forensic-method-copy-move-detection.
9 National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science, "CASIA image tampering detection evaluation database (CASIA TIDE) v1.0, v2.0," [Online]. Available: http://forensics.idealtest.org.
10 B. Wen, Y. Zhu, R. Subramanian, T. T. Ng, X. Shen, and S. Winkler, "COVERAGE-a novel database for copymove forgery detection," in Proceedings of the IEEE International Conference on Image Processing, Phoenix, AZ, USA, 2016, pp. 161-165.
11 T. T. Ng and S. F. Chang, "A data set of authentic and spliced image blocks," Columbia University, New York, NY, ADVENT Technical Report #203-2004-3, 2004.
12 D. Martin, C. Fowlkes, D. Tal, and J. Malik, "A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics," in Proceedings of the 8th IEEE International Conference on Computer Vision, Vancouver, Canada, 2001, pp. 416-423.
13 R. Salakhutdinov and G. Hinton, "Deep Boltzmann machines," in Proceedings of the 12th International Conference on Artificial Intelligence and Statistics, Clearwater, FL, USA, 2009, pp. 448-455.
14 Y. Yuan, Y. Zhang, S. Chen, and H. Wang, "Robust region duplication detection on log-polar domain using band limitation," Arabian Journal for Science and Engineering, vol. 42, no. 2, pp. 559-565, 2017.   DOI
15 J. Zhong and Y. Gan, "Detection of copy-move forgery using discrete analytical Fourier-Mellin transform," Nonlinear Dynamics, vol. 84, no. 1, pp. 189-202, 2016.   DOI
16 H. Shao, T. Yu, M. Xu, and W. Cui, "Image region duplication detection based on circular window expansion and phase correlation," Forensic Science International, vol. 222, no. 1-3, pp. 71-82, 2012.   DOI
17 F. Yavuz, A. Bal, and H. Cukur, "An effective detection algorithm for region duplication forgery in digital images," in Proceedings of the Conference on Optical Pattern Recognition XXVII, Baltimore, MD, USA, 2016, pp. 1-7.
18 M. Hussain, S. Q. Saleh, H. Aboalsamh, G. Muhammad, and G. Bebis, "Comparison between WLD and LBP descriptors for non-intrusive image forgery detection," in Proceedings of the IEEE International Symposium on Innovations in Intelligent Systems and Applications, Alberobello, Italy, 2014, pp. 197-204.
19 L. Li, S. Li, H. Zhu, and X. Wu, "Detecting copy-move forgery under affine transforms for image forensics," Computers & Electrical Engineering, vol. 40, no. 6, pp. 1951-1962, 2014.   DOI
20 R. E. J. Granty and G. Kousalya, "Spectral-hashing-based image retrieval and copy-move forgery detection," Australian Journal of Forensic Sciences, vol. 48, no. 6, pp. 643-658, 2016.   DOI
21 M. Emam, Q. Han, and X. Niu, "PCET based copy-move forgery detection in images under geometric transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, 2016.   DOI
22 X. Bi, C. M. Pun, and X. C. Yuan, "Multi-level dense descriptor and hierarchical feature matching for copy- move forgery detection," Information Sciences, vol. 345, pp. 226-242, 2016.   DOI
23 Y. Wo, K. Yang, G. Han, H. Chen, and W. Wu, "Copy-move forgery detection based on multi-radius PCET," IET Image Processing, vol. 11, no. 2, pp. 99-108, 2017.   DOI
24 S. Dadkhah, M. Koppen, H. A. Jalab, S. Sadeghi, A. A. Manaf, and D. M. Uliyan, "Electromagnetismlike mechanism descriptor with Fourier transform for a passive copy-move forgery detection in digital image forensics," in Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, Porto, Portugal, 2017, pp. 612-619.
25 D. Y. Huang, C. N. Huang, W. C. Hu, and C. H. Chou, "Robustness of copy-move forgery detection under high JPEG compression artifacts," Multimedia Tools and Applications, vol. 76, no. 1, pp. 1509-1530, 2017.   DOI
26 R. Davarzani, K. Yaghmaie, S. Mozaffari, and M. Tapak, "Copy-move forgery detection using multiresolution local binary patterns," Forensic Science International, vol. 231, no. 1-3, pp. 61-72, 2013.   DOI
27 D. M. Uliyan, H. A. Jalab, and A. W. A. Wahab, "Copy move image forgery detection using Hessian and center symmetric local binary pattern," in Proceedings of the IEEE Conference on Open Systems, Melaka, Malaysia, 2015, pp. 7-11.
28 P. Yang, G. Yang, and D. Zhang, "Rotation invariant local binary pattern for blind detection of copy-move forgery with affine transform," in Proceedings of the 2nd International Conference on Cloud Computing and Security, Nanjing, China, 2016, pp. 404-416.
29 S. Ketenci and G. Ulutas, "Copy-move forgery detection in images via 2D-Fourier transform," in Proceedings of the 36th International Conference on Telecommunications and Signal Processing, Rome, Italy, 2013, pp. 813-816.
30 J. Zhong, Y. Gan, J. Young, and P. Lin, "Copy move forgery image detection via discrete Radon and polar complex exponential transform-based moment invariant features," International Journal of Pattern Recognition and Artificial Intelligence, vol. 31, no. 2, article no. 1754005, 2017.
31 J. Zhong, Y. Gan, J. Young, L. Huang, and P. Lin, "A new block-based method for copy move forgery detection under image geometric transforms," Multimedia Tools and Applications, vol. 76, no. 13, pp. 14887-14903, 2017.   DOI
32 W. Li and N. Yu, "Rotation robust detection of copy-move forgery," in Proceedings of the IEEE International Conference on Image Processing, Hong Kong, China, 2010, pp. 2113-2116.
33 P. T. Yap, X. Jiang, and A. C. Kot, "Two-dimensional polar harmonic transforms for invariant image representation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 7, pp. 1259-1270, 2010.   DOI
34 V. Anand, M. F. Hashmi, and A. G. Keskar, "A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods," in Proceedings of the 6th Asian Conference on Intelligent Information and Database Systems, Bangkok, Thailand, 2014, pp. 530-542.
35 J. Gong and J. Guo, "Exposing region duplication through local geometrical color invariant features," Journal of Electronic Imaging, vol. 24, no. 3, article no. 033010, 2015.
36 P. P. Panzade, C. S. Prakash, and S. Maheshkar, "Copy-move forgery detection by using HSV preprocessing and keypoint extraction," in Proceedings of the 4th International Conference on Parallel, Distributed and Grid Computing, Waknaghat, India, 2016, pp. 264-269.
37 F. Zhao, W. Shi, B. Qin, and B. Liang, "Analysis of SIFT method based on swarm intelligent algorithms for copy-move forgery detection," in Proceedings of the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Zhangjiajie, China, 2016, pp. 478-490.
38 W. Shi, F. Zhao, B. Qin, and B. Liang, "Improving image copy-move forgery detection with particle swarm optimization techniques," China Communications, vol. 13, no. 1, pp. 139-149, 2016.   DOI
39 R. K. Karsh, A. Das, G. L. Swetha, A. Medhi, R. H. Laskar, U. Arya, and R. K. Agarwal, "Copy-move forgery detection using ASIFT," in Proceedings of the 1st India International Conference on Information Processing, Delhi, India, 2016, pp. 1-5.
40 A. R. H. Khayeat, X. Sun, and P. L. Rosin, "Improved DSIFT descriptor based copy-rotate-move forgery detection," in Proceedings of the 7th Pacific-Rim Symposium on Image and Video Technology, Auckland, New Zealand, 2015, pp. 642-655.
41 J. Li, X. Li, B. Yang, and X. Sun, "Segmentation-based image copy-move forgery detection scheme," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, 2015.   DOI
42 L. Li, S. Li, and J. Wang, "Copy-move forgery detection based on PHT," in Proceedings of the World Congress on Information and Communication Technologies, Trivandrum, India, 2012, pp. 1061-1065.
43 X. Kang and S. Wei, "Identifying tampered regions using singular value decomposition in digital image forensics," in Proceedings of the International Conference on Computer Science and Software Engineering, Wuhan, China, 2008, pp. 926-930.
44 S. J. Ryu, M. J. Lee, and H. K. Lee, "Detection of copy-rotate-move forgery using Zernike moments," in Proceedings of the 12th International Conference on Information Hiding, Calgary, AB, Canada, 2010, pp. 51-65.
45 B. Xu, J. Wang, G. Liu, and Y. Dai, "Image copy-move forgery detection based on SURF," in Proceedings of the International Conference on Multimedia Information Networking and Security, Nanjing, China, 2010, pp. 889- 892.
46 J. Zhao and J. Guo, "Passive forensics for region duplication image forgery using Harris feature points and annular average representation," Journal of Data Acquisition and Processing, vol. 30, no. 1, pp. 164-174, 2015.
47 J. M. Guo, Y. F. Liu, and Z. J. Wu, "Duplication forgery detection using improved DAISY descriptor," Expert Systems with Applications, vol. 40, no. 2, pp. 707-714, 2013.   DOI
48 H. J. Lin, C. W. Wang, and Y. T. Kao, "Fast copy-move forgery detection," WSEAS Transactions on Signal Processing, vol. 5, no. 5, pp. 188-197, 2009.
49 Y. Li, "Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching," Forensic Science International, vol. 224, no. 1-3, pp. 59-67, 2013.   DOI
50 A. Krizhevsky, I. Sutskever, and G. E. Hinton, "ImageNet classification with deep convolutional neural networks," in Proceedings of the 26th Annual Conference on Neural Information Processing Systems, Lake Tahoe, NV, USA, 2012, pp. 1097-1105.
51 D. Tralic, S. Grgic, X. Sun, and P. L. Rosin, "Combining cellular automata and local binary patterns for copymove forgery detection," Multimedia Tools and Applications, vol. 75, no. 24, pp. 16681-16903, 2016.
52 J. Flusser and T. Suk, "Degraded image analysis: an invariant approach," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 6, pp. 590-603, 1998.   DOI
53 Z. L. Du, X. L. Li, L. X. Jiao, and K. Shen, "Region duplication blind detection based on multiple feature combination," in Proceedings of the International Conference on Machine Learning and Cybernetics, Xi'an, China, 2012, pp. 17-21.
54 M. B. Imamoglu, G. Ulutas, and M. Ulutas, "Detection of copy-move forgery using Krawtchouk moment," in Proceedings of the 8th International Conference on Electrical and Electronics Engineering, Bursa, Turkey, 2013, pp. 311-314.
55 R. Kushol, M. S. Salekin, M. H. Kabir, and A. A. Khan, "Copy-move forgery detection using color space and moment invariants-based features," in Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, QLD, Australia, 2016, pp. 1-6.
56 A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Department of Computer Science, Dartmouth College, Hanover, NH, Technical Report TR2004-515, 2004.
57 P. Kakar and N. Sudha, "Exposing postprocessed copy-paste forgeries through transform-invariant features," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1018-1028, 2012.   DOI
58 A. V. Malviya and S. A. Ladhake, "Pixel based image forensic technique for copy-move forgery detection using Auto Color Correlogram," in Proceedings of the 7th International Conference on Communication, Computing and Virtualization, Mumbai, India, 2016, pp. 383-390.
59 A. D. Warbhe, R. V. Dharaskar, and V. M. Thakare, "A scaling robust copy-paste tampering detection for digital image forensics," in Proceedings of the 7th International Conference on Communication, Computing and Virtualization, Mumbai, India, 2016, pp. 458-465.
60 A. Kuznetsov and V. Myasnikov, "A copy-move detection algorithm using binary gradient contours," in Proceedings of the 13th International Conference on Image Analysis and Recognition, Povoa de Varzim, Portugal, 2016, pp. 349-357.
61 S. J. Ryu, M. Kirchner, M. J. Lee, and H. K. Lee, "Rotation invariant localization of duplicated image regions based on Zernike moments," IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1355- 1370, 2013.   DOI
62 O. M. Al-Qershi and B. E. Khoo, "Enhanced matching method for copy-move forgery detection by means of Zernike moments," in Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, Taipei, Taiwan, 2014, pp. 485-497.
63 G. Lynch, F. Y. Shih, and H. Y. M. Liao, "An efficient expanding block algorithm for image copy-move forgery detection," Information Sciences, vol. 239, pp. 253-265, 2013.   DOI
64 L. T. Thuong, M. Luong, H. K. Tu, P. C. H. Long, and T. H. An, "Block based technique for detecting copy-move digital image forgeries: wavelet transform and Zernike moments," in Proceedings of the 2nd International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Las Pinas, Philippines, 2016, pp. 26-33.
65 K. Mahmoud and A. Abu-Alrukab, "Copy-move forgery detection using Zernike and Pseudo Zernike moments," The International Arab Journal of Information Technology, vol. 13, no. 6A, pp. 930-937, 2016.
66 B. Mahdian and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic Science International, vol. 171, no. 2-3, pp. 180-189, 2007.   DOI
67 Photo Tampering throughout History [Online]. Available: http://pth.izitru.com/2008_07_01.html.
68 D. Vaishnavi and T. S. Subashini, "A passive technique for image forgery detection using contrast context histogram features," International Journal of Electronic Security and Digital Forensics, vol. 7, no. 3, pp. 278-289, 2015.   DOI
69 H. Yao, S. Wang, X. Zhang, C. Qin, and J. Wang, "Detecting image splicing based on noise level inconsistency," Multimedia Tools and Applications, vol. 76, no. 10, pp. 12457-12479, 2017.   DOI
70 B. Bayar and M. C. Stamm, "On the robustness of constrained convolutional neural networks to JPEG postcompression for image resampling detection," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, New Orleans, LA, USA, 2017, pp. 2152-2156.
71 J. Chen, X. Kang, Y. Liu, and Z. J. Wang, "Median filtering forensics based on convolutional neural networks," IEEE Signal Processing Letters, vol. 22, no. 11, pp. 1849-1853, 2015.   DOI
72 A. Taimori, F. Razzazi, A. Behrad, A. Ahmadi, and M. Babaie-Zadeh, "Quantization-unaware double JPEG compression detection," Journal of Mathematical Imaging and Vision, vol. 54, no. 3, pp. 269-286, 2016.   DOI
73 K. Asghar, Z. Habib, and M. Hussain, "Copy-move and splicing image forgery detection and localization techniques: a review," Australian Journal of Forensic Sciences, vol. 49, no. 3, pp. 281-307, 2017.   DOI
74 R. C. Gonzalez and R. E. Woods, "Morphological image processing," in Digital Image Processing (3rd ed.). Beijing, China: Publishing House of Electronics Industry, 2010, pp. 649-701.
75 D. M. Uliyan and M. A. F. Al-Husainy, "Detection of scaled region duplication image forgery using color based segmentation with LSB signature," International Journal of Advanced Computer Science and Applications, vol. 8, no. 5, pp. 126-132, 2017.
76 N. B. A. Warif, A. W. A. Wahab, M. Y. I. Idris, R. Salleh, and F. Othman, "SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack," Journal of Visual Communication and Image Representation, vol. 46, pp. 219-232, 2017.   DOI
77 B. L. Shivakumar and S. S. Baboo, "Detection of region duplication forgery in digital images using SURF," International Journal of Computer Science Issues, vol. 8, no. 4, pp. 199-205, 2011.
78 P. Mishra, N. Mishra, S. Sharma, and R. Patel, "Region duplication forgery detection technique based on SURF and HAC," The Scientific World Journal, vol. 2013, article no. 267691, 2013.
79 E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, "Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes," Journal of Visual Communication and Image Representation, vol. 29, pp. 16-32, 2015.   DOI
80 B. Yang, X. Sun, X. Xin, W. Hu, and Y. Wu, "Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression," Journal of Electronic Imaging, vol. 24, no. 6, article no. 063016, 2015.
81 L. Chen, W. Lu, J. Ni, W. Sun, and J. Huang, "Region duplication detection based on Harris corner points and step sector statistics," Journal of Visual Communication and Image Representation, vol. 24, no. 3, pp. 244-254, 2013.   DOI
82 J. Zhao and W. Zhao, "Passive forensics for region duplication image forgery based on Harris feature points and local binary patterns," Mathematical Problems in Engineering, vol. 2013, article no. 619564, 2013.
83 M. A. Fischler and R. C. Bolles, "Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography," Communications of the ACM, vol. 24, no. 6, pp. 381-395, 1981.   DOI
84 G. K. Birajdar and V. H. Mankar, "Digital image forgery detection using passive techniques: a survey," Digital Investigation, vol. 10, no. 3, pp. 226-245, 2013.   DOI
85 Y. Huang, W. Lu, W. Sun, and D. Long, "Improved DCT-based detection of copy-move forgery in images," Forensic Science International, vol. 206, no. 1-3, pp. 178-184, 2011.   DOI
86 T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah, and M. T. Mahmood, "Copy-move forgery detection technique for forensic analysis in digital images," Mathematical Problems in Engineering, vol. 2016, article no. 8713202, 2016.
87 Y. Cao, T. Gao, L. Fan, and Q. Yang, "A robust detection algorithm for copy-move forgery in digital images," Forensic Science International, vol. 214, no. 1-3, pp. 33-43, 2012.   DOI
88 S. M. Fadl and N. A. Semary, "A proposed accelerated image copy-move forgery detection," in Proceedings of the IEEE Visual Communications and Image Processing Conference, Valletta, Malta, 2014, pp. 253-257.
89 E. Mohebbian and M. Hariri, "Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images," in Proceedings of the 2nd International Conference on Knowledge-Based Engineering and Innovation, Tehran, Iran, 2015, pp. 436-440.
90 S. Kumar, J. V. Desai, and S. Mukherjee, "Copy move forgery detection in contrast variant environment using binary DCT vectors," International Journal of Image, Graphics and Signal Processing, vol. 7, no. 6, pp. 38-44, 2015.   DOI
91 X. Wang, G. He, C. Tang, Y. Han, and S. Wang, "Keypoints-based image passive forensics method for copymove attacks," International Journal of Pattern Recognition and Artificial Intelligence, vol. 30, no. 3, article no. 1655008, 2016.
92 Y. Rao and J. Ni, "A deep learning approach to detection of splicing and copy-move forgeries in images," in Proceedings of the IEEE International Workshop on Information Forensics and Security, Abu Dhabi, United Arab Emirates, 2016, pp. 1-6.
93 G. Schaefer and M. Stich, "UCID: an uncompressed colour image database," in Proceedings of the Conference on Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, USA, 2004, pp. 472-480.
94 National Geographic [Online]. Available: http://www.nationalgeographic.com/photography/.
95 J. Deng, W. Dong, R. Socher, L. J. Li, K. Li, and F. F. Li, "ImageNet: a large-scale hierarchical image database," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 2009, pp. 248-255.
96 H. Zhang, C. Wang, and X. Zhou, "Fragile watermarking based on LBP for blind tamper detection in images," Journal of Information Processing Systems, vol. 13, no. 2, pp. 385-399, 2017.   DOI
97 W. Luo, J. Huang, and G. Qiu, "Robust detection of region-duplication forgery in digital image," in Proceedings of the 18th International Conference on Pattern Recognition, Hong Kong, China, 2006, pp. 746-749.
98 G. Liu, J. Wang, S. Lian, and Z. Wang, "A passive image authentication scheme for detecting region-duplication forgery with rotation," Journal of Network and Computer Applications, vol. 34, no. 5, pp. 1557-1565, 2011.   DOI
99 F. Peng, Y. Y. Nie, and M. Long, "A complete passive blind image copy-move forensics scheme based on compound statistics features," Forensic Science International, vol. 212, no. 1-3, pp. e21-e25, 2011.   DOI
100 M. F. Hashmi, V. Anand, and A. G. Keskar, "Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform," AASRI Procedia, vol. 9, pp. 84-91, 2014.   DOI
101 J. Fridrich, D. Soukal, and J. Lukas, "Detection of copy-move forgery in digital images," in Proceedings of the Digital Forensic Research Workshop, Cleveland, OH, USA, 2003, pp. 55-61.
102 Kodak Lossless True Color Image Suite [Online]. Available: http://r0k.us/graphics/kodak/.
103 Database for object and concept recognition [Online]. Available: http://www.cs.washington.edu/research/imagedatabase/groundtruth/.
104 T. T. Ng, S. F. Chang, J. Hsu, and M. Pepeljugoski, "Columbia photographic images and photorealistic computer graphics dataset," Columbia University, New York, NY, ADVENT Technical Report #205-2004-5, 2005.
105 The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/.
106 G. Muhammad, M. H. Al-Hammadi, M. Hussain, and G. Bebis, "Image forgery detection using steerable pyramid transform and local binary pattern," Machine Vision and Applications, vol. 25, no. 4, pp. 985-995, 2014.   DOI
107 G. Griffin, A. Holub, and P. Perona, "Caltech-256 object category dataset," California Institute of Technology, Los Angeles, CA, USA, Technical Report 7694, 2007.
108 X. Pan and S. Lyu, "Region duplication detection using image feature matching," IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 857-867, 2010.   DOI
109 M. Hussain, G. Muhammad, S. Q. Saleh, A. M. Mirza, and G. Bebis, "Copy-move image forgery detection using multi-resolution weber descriptors," in Proceedings of the 8th International Conference on Signal Image Technology and Internet Based Systems, Naples, Italy, 2012, pp. 395-401.
110 A. V. Malviya and S. A. Ladhake, "Region duplication detection using color histogram and moments in digital image," in Proceedings of the International Conference on Inventive Computation Technologies, Coimbatore, India, 2016, pp. 1-4.
111 D. M. Uliyan, H. A. Jalab, A. W. A. Wahab, and S. Sadeghi, "Image region duplication forgery detection based on angular radial partitioning and Harris key-points," Symmetry, vol. 8, no. 7, article no. 62, 2016.
112 E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-move forgery detection by matching triangles of keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084-2094, 2015.   DOI
113 R. C. Pandey, S. K. Singh, K. K. Shukla, and R. Agrawal, "Fast and robust passive copy-move forgery detection using SURF and SIFT image features," in Proceedings of the 9th International Conference on Industrial and Information Systems, Gwalior, India, 2014, pp. 1-6.
114 S. Kumar, J. V. Desai, and S. Mukherjee, "A fast keypoint based hybrid method for copy move forgery detection," International Journal of Computing and Digital Systems, vol. 4, no. 2, pp. 91-99, 2015.   DOI
115 M. M. Isaac and M. Wilscy, "Copy-move forgery detection based on Harris corner points and BRISK," in Proceedings of the 3rd International Symposium on Women in Computing and Informatics, Kochi, India, 2015, pp. 394-399.
116 M. H. Alkawaz, G. Sulong, T. Saba, and A. Rehman, "Detection of copy-move image forgery based on discrete cosine transform," Neural Computing and Applications, 2016. https://doi.org/10.1007/s00521-016-2663-3
117 H. Wang, H. X. Wang, X. M. Sun, and Q. Qian, "A passive authentication scheme for copy-move forgery based on package clustering algorithm," Multimedia Tools and Applications, vol. 76, no. 10, pp. 12627-12644, 2017.   DOI
118 J. Zhao and J. Guo, "Passive forensics for copy-move image forgery using a method based on DCT and SVD," Forensic Science International, vol. 233, no. 1-3, pp. 158-166, 2013.   DOI
119 M. Doyoddorj and K. H. Rhee, "Robust copy-move forgery detection based on dual-transform," in Proceedings of the 5th International Conference on Digital Forensics and Cyber Crime, Moscow, Russia, 2013, pp. 3-16.
120 B. Ustubioglu, G. Ulutas, M. Ulutas, V. Nabiyev, and A. Ustubioglu, "LBP-DCT based copy move forgery detection algorithm," in Proceedings of the 30th International Symposium on Computer and Information Sciences, London, UK, 2015, pp. 127-136.
121 A. Kashyap and S. D. Joshi, "Detection of copy-move forgery using wavelet decomposition," in Proceedings of the International Conference on Signal Processing and Communication, Noida, India, 2013, pp. 396-400.
122 S. Mallat and S. Zhong, "Characterization of signals from multiscale edges," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, no. 7, pp. 710-732, 1992.   DOI
123 R. C. Pandey, R. Agrawal, S. K. Singh, and K. K. Shukla, "Passive copy move forgery detection using SURF, HOG and SIFT features," in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications, Bhubaneswar, India, 2014, pp. 659-666.
124 S. Prasad and B. Ramkumar, "Passive copy-move forgery detection using SIFT, HOG and SURF features," in Proceedings of the IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, Bangalore, India, 2016, pp. 706-710.
125 M. Emam, Q. Han, and H. Zhang, "Two-stage keypoint detection scheme for region duplication forgery detection in digital images," Journal of Forensic Sciences, vol. 63, no. 1, pp. 102-111, 2018.   DOI
126 G. Muhammad, M. Hussain, and G. Bebis, "Passive copy move image forgery detection using undecimated dyadic wavelet transform," Digital Investigation, vol. 9, no. 1, pp. 49-57, 2012.   DOI
127 C. S. Prakash and S. Maheshkar, "Copy-move forgery detection using DyWT," International Journal of Multimedia Data Engineering and Management, vol. 8, no. 2, pp. 1-9, 2017.
128 M. Jaberi, G. Bebis, M. Hussain, and G. Muhammad, "Accurate and robust localization of duplicated region in copy-move image forgery," Machine Vision and Applications, vol. 25, no. 2, pp. 451-475, 2014.   DOI
129 L. Yu, Q. Han, and X. Niu, "Feature point-based copy-move forgery detection: covering the non-textured areas," Multimedia Tools and Applications, vol. 75, no. 2, pp. 1159-1176, 2016.   DOI
130 Y. Zhu, X. J. Shen, and H. P. Chen, "Covert copy-move forgery detection based on color LBP," Acta Automatica Sinica, vol. 43, no. 3, pp. 390-397, 2017.
131 G. Li, Q. Wu, D. Tu, and S. Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proceedings of the IEEE International Conference on Multimedia and Expo, Beijing, China, 2007, pp. 1750-1753.
132 B. Ustubioglu, G, Ulutas, M. Ulutas, and V. V. Nabiyev, "Improved copy-move forgery detection based on the CLDs and colour moments," The Imaging Science Journal, vol. 64, no. 4, pp. 215-225, 2016.   DOI
133 M. Emam, Q. Han, L. Yu, and H. Zhang, "A keypoint-based region duplication forgery detection algorithm," IEICE Transactions on Information and Systems, vol. E99-D, no. 9, pp. 2413-2416, 2016.   DOI
134 H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Proceedings of the IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China, 2008, pp. 272-276.
135 I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "Geometric tampering estimation by means of a SIFT-based forensic analysis," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Dallas, TX, USA, 2010, pp. 1702-1705.
136 I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A SIFT-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011.   DOI
137 I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, "Copy-move forgery detection and localization by means of robust clustering with J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.   DOI
138 G. Jin and X. Wan, "An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage," Signal Processing: Image Communication, vol. 57, pp. 113-125, 2017.   DOI
139 J. Zhang, Z. Feng, and Y. Su, "A new approach for detecting copy-move forgery in digital images," in Proceedings of the 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, China, 2008, pp. 362-366.
140 L. Li, S. Li, H. Zhu, S. C. Chu, J. F. Roddick, and J. S. Pan, "An efficient scheme for detecting copy-move forged images by local binary patterns," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 46-56, 2013.
141 R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Susstrunk, "SLIC superpixels compared to state-of-theart superpixel methods," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 11, pp. 2274-2282, 2012.   DOI
142 M. P. Bhavya Bhanu and M. N. Arun Kumar, "Copy-move forgery detection using segmentation," in Proceedings of the 11th International Conference on Intelligent Systems and Control, Coimbatore, India, 2017, pp. 224-228.
143 S. Bayram, H. T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Taipei, Taiwan, 2009, pp. 1053-1056.
144 F. Yang, J. Li, W. Lu, and J. Weng, "Copy-move forgery detection based on hybrid features," Engineering Applications of Artificial Intelligence, vol. 59, pp. 73-83, 2017.   DOI
145 V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.   DOI
146 D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, "CoMoFoD—new database for copy-move forgery detection," in Proceedings of the 55th International Symposium on ELMAR, Zadar, Croatia, 2013, pp. 49-54.
147 R. Dixit, R. Naskar, and S. Mishra, "Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD," IET Image Processing, vol. 11, no. 5, pp. 301-309, 2017.   DOI
148 G. P. Nason and B. W. Silverman, "The stationary wavelet transform and some statistical applications," in Wavelets and Statistics. New York, NY: Springer, 1995, pp. 281-299.
149 A. N. Myna, M. G. Venkateshmurthy, and C. G. Patil, "Detection of region duplication forgery in digital images using wavelets and log-polar mapping," in Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, Sivakasi, India, 2007, pp. 371-377.
150 S. Bravo-Solorio and A. K. Nandi, "Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling," in Proceedings of the 17th European Signal Processing Conference, Glasgow, UK, 2009, pp. 824-828.
151 S. Bravo-Solorio and A. K. Nandi, "Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics," Signal Processing, vol. 91, no. 8, pp. 1759-1770, 2011.   DOI
152 Q. Wu, S. Wang, and X. Zhang, "Log-polar based scheme for revealing duplicated regions in digital images," IEEE Signal Processing Letters, vol. 18, no. 10, pp. 559-562, 2011.   DOI
153 C. S. Park, C. Kim, J. Lee, and G. R. Kwon, "Rotation and scale invariant upsampled log-polar Fourier descriptor for copy-move forgery detection," Multimedia Tools and Applications, vol. 75, no. 23, pp. 16577-16595, 2016.   DOI