copy move forgery detection on digital images primer researchissue4/paper1.pdf · international...

12
International Scientific Global Journal in Engineering Science and Applied Research (ISGJESAR) ISSN: 2456 - 1894 Vol. 3 Issue 3 May 2018 V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 1 ABSTRACT In today’s advanced age the reliable towards picture is twisting a direct result of malicious forgery images. The issues identified with the security have prompted the examination center towards tampering detection. As the source image also, the objective locales are from a similar picture so that copy move forgery is very effective in image manipulation due to its same properties such as temperature, color, noise and illumination conditions. In this article, we added preliminary research methods (existing algorithms). We used hybrid approaches of existing algorithms. The performance is evaluated in terms of normally used parameters precision and recall with improved results. Thus the proposed CMFD can manage all the image processing operations. We added single image forensics analysis method also. Finally made a comparative analysis based on some clustering algorithms and its applications, drawbacks, digital forensics tool analysis. Keywords: copy move forgery, block-based, feature extraction, matching, tampering Copy Move Forgery Detection on Digital Images Primer Research Arun Anoop M 1 , PhD Scholar, S.Poonkuntran 2, Professor & Head 1,2 Department of Computer Science, Velammal College of Engineering and Technology, Viraganoor, Madurai, India

Upload: others

Post on 11-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 1

ABSTRACT

In today’s advanced age the reliable towards picture is twisting a direct result of malicious

forgery images. The issues identified with the security have prompted the examination

center towards tampering detection. As the source image also, the objective locales are from

a similar picture so that copy move forgery is very effective in image manipulation due to its

same properties such as temperature, color, noise and illumination conditions. In this

article, we added preliminary research methods (existing algorithms). We used hybrid

approaches of existing algorithms. The performance is evaluated in terms of normally used

parameters precision and recall with improved results. Thus the proposed CMFD can

manage all the image processing operations. We added single image forensics analysis

method also. Finally made a comparative analysis based on some clustering algorithms and

its applications, drawbacks, digital forensics tool analysis.

Keywords: copy move forgery, block-based, feature extraction, matching, tampering

Copy Move Forgery Detection on Digital Images –

Primer Research

Arun Anoop M1, PhD Scholar, S.Poonkuntran

2, Professor & Head

1,2Department of Computer Science, Velammal College of Engineering and Technology, Viraganoor, Madurai, India

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 2

1. INTRODUCTION

Digital images forgeries happening because of lack of security between client and server. In medical field, medical

image manipulation occurred, is that the security less communication channel between hospital and patient(s). If any

manipulation of data may life threaten patient’s health. But in nowadays many illegal manipulations in images and videos we can

see. Digital image are used in some of the medical, court. Copy move forgery (CMF) is one of the particular form of image

tampering where a piece (interested potion) of the image is copy-pasted on other piece of the same image. Digital image forgery,

were because free available image editing tools like Adobe photoshop , GIMP etc.[30]. Cut a piece of leaves and pasted it to hide

any of the object is Copy Move Forgery. Musaed Alhussein mentioned to include feature selection algorithms to reduce the

number of features. Also, in future, authors will investigate the effect of other types of color components such as luminance and

Chroma, or hue and saturation, in image forgery detection [61]. Vincent Christlein et. al., develop a joint forensic toolbox

performs on manipulated images [62]. V.Suresh et. al., mentioned in future authors will concentrate to detect spliced images [63].

Meenal Shandilya mentioned in future author will add identification of other forms of geometric attacks, relevant to copy-move

forgery, such as reflection, as well as other image region transforms, such as gray level interpolation [64]. Anushree U. Tembe et.

al., mentioned to find tampered regions with other type of geometric transformations in future [65]. Rani Susan Oommen et. al.,

use a different measure instead of SSIM to localize forged regions to get efficient detection. Authors mentioned SSIM is not a

good measure to compare regions [66]. R.C. Pandey et. al., mentioned in future their work will detect splicing in human body and

face, to concentrate social networking sites using different image features [67].

II. RELATED WORKS Anil Dada Warbhe et. al., concluded the main drawback of block-based approaches. Authors mentioned that the

detection procedure of copy-move forgery took high computation time. Authors concluded that in block-based approach, the

image needs to be divided into the number of blocks and each block is processed for feature extraction and matching. Hence

authors best choice is key-point based approach for copy-paste forgery detection in large size images over block based approach

[51]. Yongzhen Ke et. al., mentioned Image recognition accuracy, common sense knowledge and refinement of logic reasoning

rule was not high enough. And they concluded that improving accuracy will be their future work [52]. Xunyu Pan et. al.,

robustness of the proposed algorithm with regards to several imaging conditions. And authors future work will Combine the

current detection method with other noise based features to increase the detection performance [53]. P M Panchal et. al.,

mentioned future work will be in video registration [54]. SITI FADZLUN MD SALLEH et. al., mentioned future works may

explore in color images, or high resolution images. And also future works should consider multilayer processing [55]. Geethu N

Nadh et. al., mentioned authors will think about to add security enhancements in future [56]. Nishmitha M.R et. al., mentioned to

add DWT to detect image forgery in future [57]. Seung-Jin Ryu et. al., mentioned to concentrates on establishing an appropriate

data structure[58]. Keerthi Priya et. al., mentioned their work can be implemented in real applications. Also, authors have an idea

to combine with other mechanisms like image segmentation and neural learning [59]. Hansoo Kim et. al., mentioned to include

implementations and verifications of several detection schemes of digital image forgeries [60].

III. PROBLEM DEFINITION Main problem is lack of security between client and server. Most important problem is authenticity. Seven main

problems in `image forgery field` are adding or removing interested portions, resize, unusual color modification, cut someone’s

head and paste it into someone’s body, presenting false evidence in court, unavailability of original photos for experiment(Text

forgery in images), availability of freely available image editing tools(like GIMP, Adobe Photoshop etc.). Main drawback is a

person who have well knowledge in manipulation, he or she can change normal image to abnormal and abnormal to normal. This

will increase the crime rates. A small bit change can identify by image forgery detection approach.

IV. PROPOSED SYSTEM The research work of the paper is to identify the tampered portion of the image. The proposed work comprises of three

main steps(ii-iv): (i) pre-processing, (ii) Block Tiling, (iii) Feature Extraction, (iv) Block Matching and (v) Block reconstruction.

In proposed system (Multiple Feature-Extraction Approach) is implemented based on three existing algorithms. Finally it is

compared with two key point based methods SIFT and CSURF and proved MFE approach is the best solution to find image

forgery detections. And we used fusion approaches for evaluation process (both key point and block-based).

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 3

Fig. 1: MFE Approach (Block diagram of the proposed work)

Pre-ProcessingOriginal

Image

.

.

.

.

.

.

.

.

.

.

.

.

Weber Local DescriptorFeature

Extraction

Lexicographic Sorting

Tampered

Localization

Block

Matching

Forged

Image

Feature

Matching

EuclidianDistance

Block

Division

Hue Histograms

Zernike Moments

Fig. 2: 3FE Hybrid Approach(Block diagram of the proposed work{ZM+WLD+HH)

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 4

Pre-ProcessingOriginal

Image

.

.

.

.

.

.

.

.

.

.

.

.

HOG and GLCMFeature

Extraction

Lexicographic Sorting

Tampered

Localization

Block

Matching

Forged

Image

Feature

Matching

EuclidianDistance

Block

Division

Fig. 3: 2FE Hybrid Approach (Block diagram of the proposed work{HOG+GLCM)

a. Input Data Base

The information images gathered from various website pages is considered as database for the proposed system.

b. Preprocessing

Read the original image from the database.

After that the original RGB image is converted into Gray scale image using standard color space conversion.

In color image processing, no need any type of conversion.

Gray conversion can identify more accurate features from corners.

The standard equation from RGB to Gray conversion is,

BGRI g 114.0587.0229.0 (1)

In the above equation, R, G and B are red, green and blue components.

c. Block Tiling

After pre-processing, the picture is separated into small squares.

d. Feature Extraction

The extraction of relevant information that represent the characteristics features of the image.

Feature vector’s size will depend on the block size.

After that the features of the blocks are extracted using Zernike Moment, Weber Local descriptor and Hue Histogram for

first approach.

For second extract features based on Hog and GLCM algorithm.

V. RESULTS AND DISCUSSION The proposed work is implemented in the MATLAB 2014a software with a database of images. In this work, the image is taken

from the Columbia university dataset [26].

A) Comparative analysis:

Papers are compared based on drawbacks (1-28, 39) and investigations(29-39) by author(s).

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 5

Sl.No: Paper Title Drawbacks(1-28,39) and Investigations(29-38)

1 [68] Xudong Zhao et. al., mentioned in future authors will study about Higher order features integrated

with dimensionality reduction method [68].

2 [69] Anupama K. Abraham et. al., mentioned in future authors will concentrate to detect the Copy-

move forgery in videos with minimal time [69].

3 [70]

Pradyumna Deshpande et. al., mentioned that in future, authors will add DWT can be used to

increase the speed-up , find new method for rotation invariant forgery detection techniques. And

will work in Video forgery detection [70].

4 [71] Jaseela S et. al., in future, authors will concentrate in splicing and detect tampering in video

forgery [71].

5 [72] Weihai Li et. al., mentioned to improve the BAG (block artifact grid) marking algorithm to

achieve clearer grid map and reduce computation load. And also to design a machine judging

algorithm to check the alignment of BAG [72].

6 [73] Pin Zhang et. al., mentioned that authors will concentrate to work with weakness of their proposed

work [73].

7 [74] Hareesh Ravi et. al., mentioned in future, authors will perform the localization of tampering in a

video. In that localization can be in terms of GOP, frames or as small as a macro-block [74].

8 [75] Gawtham Srinivasan R et. al., mentioned in future authors will research about to detect forgery

with DWT and also authors concentrate to add overlapping sub blocks concept [75].

9 [76] Priya Singh et. al., will add correlation method and to produce better result with more than one

forged region in the image [76].

10 [77] Amrit Hanuman et. al., will investigate resampling factors, techniques to improve rotation

detection, optimal peak detection strategies, adaptable block size algorithm using JPEG

compressed Tampered images and different input image color spaces [77].

11 [78]

Ashima Gupta et. al., will take work to find optimize the data structures to gain additional query

performance and further improve accuracy [78].

12 [79] Joshi Chintal J et. al., mentioned to extend their work on videos where search for duplicated

blocks has to perform on multiple image frames [79].

13 [80] Prinkle Rani et. al., mentioned in future authors will minimize the processing time to detect the

forgery in the images to few seconds or even microseconds [80].

14 [81]. Harpreet Kaur et. al., mentioned in future authors will add more tests will be performed on

pictures with greater quantity of testing samples. And also authors will investigate comparison of

different color spaces in image forgery detection [81].

15 [1] Er. Saiqa Khan et. al., extended to work on videos where search for duplicated blocks has to

perform on multiple image frames[1].

16 [2] B.L.Shivakumar et. al., they will deal with problem such as rotation and Gaussian noise[2].

17 [3] Salam A. Thajeel et. al., will deal to detect and extract duplicated regions with higher accuracy and

robustness[3].

18 [4] Vivek Kumar Singh et. al., may deal to detect Gaussian blurring and AWGN[4].

19 [5] Feng Liu et. al., will deal with the detection of multiple copy move forgery and localisation in

future[5].

20 [6] Vidhi P. Raval may deal with Gaussian blurring may be in future[6].

21 [7] Zhang Ting et.al. , deal to improve the robustness against low quality factors of JPEG compression

and assure authenticity in future[7].

22 [8] Irene Amerini et. al., may deal with the proposal of new algorithms in the same area and

investigate for authenticity proving strategy[8].

23 [9] Vincent Christlein et. al., deal with a rigorous evaluation on the impact of noise and the scale

invariance of SATS in future[9].

24 [10] Yanping Huang et.al., may deal with rotation and scaling in future[10].

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 6

25 [11] Ghulam Muhammad et. al., may investigate more about DyWT and may propose new methods to

find authenticity[11].

26 [12] Yuenan Li will investigate more with LSH based similar patch detection scheme than

lexicographic sorting[12].

27 [13] Hieu Cuong Nguyen et. al., my deal with Gaussian noise and scaling[13].

28 [14] Seniha Ketenci et. al., may deal with rotation, scaling and other similar operations analysis in

future[14].

29 [15] M. Ali Qureshi et. al., surveyed different forging detection techniques with a focus on copy and

move approaches[15].

30 [16] Mohsen Zandi, Ahmad Mahmoudi-Aznaveh et. al., proposed a method and analysed with various

kinds of attacks such as rotation, AWGN, JPEG compression and blurring[16].

31 [17] Lu Liu et. al., demonstrated the efficiency of their method on different forgeries and quantify its

robustness and sensitivity[17].

32 [18] Jen-Chun Lee et. al., mentioned they improving detection in regions with rotation and scaling

adjustment over large areas[18].

33 [19] Hao-Chiang Hsu et. al., proposed method can achieve high correct rate, estimated rotation angle

and scaling factor[19].

34 [20] Davide Cozzolino et. al., proposed technique to be at least as accurate, robust, and much faster,

than state-of-the-art dense-field references[20].

35 [21] Ye Zhu et. al., mentioned that their algorithm was effective for geometric transformation, such as

scaling and rotation, Gaussian blur, Gaussian white noise and JPEG recompression[21].

36 [22] WU YunJie et. al., demonstrated the robustness and effectiveness[22].

37 [23] Mohd Dilshad Ansari et. al., discussed about pixel-based techniques for image forgery detection,

mainly copy-move and splicing techniques[23].

38 [24] Ewerton Silva et. al., their proposed image forgery detection based on voting process among all

detection maps[24].

39 [25] Jian Li et. al., in future they all will try to improve the detection speed of the proposed scheme by

means of parallel programming[25].

B) Result Analysis

The step by step analysis part of the proposed forgery detection is mentioned below with single original image shown in figure 8.

(c)CoMoFoD dataset

Fig 8: Original Images

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 7

Fig 9: Grayscale Images

Fig 10: Forged Images (angle=Left 90)

(c)CoMoFoD dataset

Fig 11: Authenticity of Images (Forgery detected area)

Fig 12: Authenticity of Images (Multiple Forgery detected area)

C) Evaluation Metrics

The performance evaluation of the proposed work is evaluated in terms of the following:-

100PrPP

p

FT

Tecision (16)

100ReNP

p

FT

Tcall (17)

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 8

Table 1: Performance metrics comparison for forgery detection

Techniques Precision Recall PSNR

SampleImage1 58 98 18.890

SampleImage2 55 97 12.666

SampleImage3 99 96.8 21.193

Table 2: Performance metrics comparison for forgery detection (Used fusion of image forgery detection techniques for

evaluation process)

Techniques Precision Recall PSNR

SIFT [27] 88.4 79.2 11.4280

CSURF [28] 91.1 85.4 14.76

3FE-methods with Lexi.sort and Eu.dist.

HYBRID Proposed

100 96.8 22.3193

2FE-methods with Lexi.sort and Eu.dist.

HYBRID Proposed

97 94.2 19.42

Table 3: Comparative analysis of clustering algorithm and its applications

Sl.

Number

Clustering algorithms Applications

1 K-means clustering 1. Leaf disease detection[33]

2. Data mining

3. Image Forgery Detection

[38]

4. Wireless Sensor Networks

5. Biometrics

6. Biomedical Engineering

7. Facial Image Extraction[41]

8. Machine Learning

9. Finger Knuckle print authentication

[36]

10. Iris segmentation

[34]

2 C-means or Fuzzy clustering 1. Iris segmentation[34]

2. Indoor Fingerprint Localization[40]

3. Passwords sharing prevention[35]

4. Mobile phone fraud detection[42]

3 Hierarchical clustering Ear localization[39]

4 Trajectory localization User authentication[37]

Table 4: Attacks we identified in single images (Text forgery in images)

Data poisoning attack Attack with some interested portion adding forgery.

Cut paste attack Cut a region and pasting approach.

Brightening attack Brightness updating attack.

Insertion of handwritten signature Adding forged signature into an image for manipulation crime.

Removal of watermark Using breaking tools to remove the watermarks.

Meta data removal attack Take the properties of image to delete all meta data informations.

GPS tag removal attack Depend on online sites to remove GPS tags.

EXIF tag removal attack With the help of freely available tools to remove the EXIF tags.

Metadata modifying and updating attack With the help of freely available websites to modify meta data and updating

attack.

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 9

Table 5: Comparative analysis of Digital Image (forensics tools, uses)

Jeffry’s Image metadata

viewer[83].

Can’t identify MS Paint used forgeries.

Online tool for viewing metadata embedded within images, such as camera setting used when taking

a photographs, date and location[83].

Metapicz web Meta data viewing tool.

EXIFTool by Phil

Harvey[84].

ExifTool is a free and open-source software program for reading, writing, and manipulating image,

audio, video, and PDF metadata [82]. Other methods to remove EXIf are [84].

FTK forensics tool Forensics solution.

Hex editor[86]. A hex editor is a type of computer program that allows for manipulation of the fundamental binary

data that constitutes a computer file[86].

Imageforensics[87]. Image forensics analysis[87].

Fotoforensics[88]. Image forensics analysis[88].

Verexif[89]. View and remove EXIF[89]

Error Level Analysis [85]

VI. CONCLUSION

Thus the paper solved the problem of image authenticity using the proposed copy move forgery detection. Best one approach in

our experimental evaluation is 3FE Hybrid approach. MFE approach 1 and 2 will work only if we have 2images (original and

forged). For single image forgery detection, we analysed some existing forgery detection tools. Three feature extraction

combination is the best one in our preliminary approach. In future, we will apply clue removal attacks also before post processing

stage. In our next work, we will deal with the same to test for robustness, accuracy tests against attacks like AWGN, Gaussian

Blur, Gaussian Noise, rotation (Clues removal attack once normal image processing attacks finished).

REFERENCES

[1] Khan, Er Saiqa, and Er Arun Kulkarni. "An efficient method for detection of copy-move forgery using discrete wavelet

transform." International Journal on Computer Science and Engineering, Vol. 2, No. 5, pp. 1801, 2010.

[2] Shivakumar, B. L., and S. Santhosh Baboo. "Automated forensic method for copy-move forgery detection based on Harris

interest points and SIFT descriptors." International Journal of Computer Applications, Vol. 27, No. 3, pp. 9-17, 2011.

[3] Thajeel, Salam A., and G. Bin Sulong. "State of the art of copy-move forgery detection techniques: a review." International

Journal of Computer Science Issues, Vol. 10, No .6, pp. 174-183, 2013.

[4] Singh, Vivek Kumar, and R. C. Tripathi. "Fast and efficient region duplication detection in digital images using sub-

blocking method." international journal of advanced science and technology, Vol. 35, No. 1, pp. 93-102, 2011.

[5] Liu, Feng, and Hao Feng. "An efficient algorithm for image copy-move forgery detection based on DWT and SVD."

International Journal of Security and Its Applications, Vol. 8, No. 5, pp. 377-390, 2014.

[6] Raval, Vidhi P. "Analysis and Detection of Image Forgery Methodologies."International Journal of Scientific Research and

Development, Vol. 1, No. 9, 2013.

[7] Zhang, Ting, and Rang-ding Wang. "Copy-move forgery detection based on SVD in digital image." Image and Signal

Processing, 2009. CISP'09. 2nd International Congress on. IEEE, 2009.

[8] Amerini, Irene, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, and Giuseppe Serra. "Copy-move

forgery detection and localization by means of robust clustering with J-Linkage." Signal Processing: Image Communication,

Vol. 28, No. 6, pp. 659-669, 2013.

[9] Christlein, Vincent, Christian Riess, and Elli Angelopoulou. "On rotation invariance in copy-move forgery detection." 2010

IEEE International Workshop on Information Forensics and Security. IEEE, 2010.

[10] Huang, Yanping, Wei Lu, Wei Sun, and Dongyang Long. "Improved DCT-based detection of copy-move forgery in

images." Forensic science international, Vol. 206, No. 1, pp. 178-184, 2011.

[11] Muhammad, Ghulam, et al. "Blind copy move image forgery detection using dyadic undecimated wavelet transform." 2011

17th International Conference on Digital Signal Processing (DSP). IEEE, 2011.

[12] Li, Yuenan. "Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor

searching." Forensic science international, Vol. 224, No. 1 (2013): 59-67.

[13] Nguyen, Hieu Cuong, and Stefan Katzenbeisser. "Detection of copy-move forgery in digital images using radon

transformation and phase correlation."Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012

Eighth International Conference on. IEEE, 2012.

[14] Ketenci, Seniha, and Guzin Ulutas. "Copy-move forgery detection in images via 2D-Fourier transform."

Telecommunications and Signal Processing (TSP), 2013 36th International Conference on. IEEE, 2013.

[15] Qureshi, M. Ali, and M. Deriche. "A review on copy move image forgery detection techniques." Systems, Signals &

Devices (SSD), 2014 11th International Multi-Conference on. IEEE, 2014.

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 10

[16] Zandi, Mohsen, Ahmad Mahmoudi-Aznaveh, and Azadeh Mansouri. "Adaptive matching for copy-move Forgery

detection." 2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2014.

[17] Liu, Lu, Rongrong Ni, Yao Zhao, and Siran Li. "Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and

CFA Features." In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International

Conference on, pp. 626-629, 2014.

[18] Lee, Jen-Chun, Chien-Ping Chang, and Wei-Kuei Chen. "Detection of copy–move image forgery using histogram of

orientated gradients." Information Sciences, Vol. 321, No. 1, pp. 250-262, 2015.

[19] Hsu, Hao-Chiang, and Min-Shi Wang. "Detection of copy-move forgery image using Gabor descriptor." Anti-counterfeiting,

Security, and Identification. IEEE, 2012.

[20] Cozzolino, Davide, Giovanni Poggi, and Luisa Verdoliva. "Efficient dense-field copy–move forgery detection." IEEE

Transactions on Information Forensics and Security, Vol. 10, No. 11, pp. 2284-2297, 2015.

[21] Zhu, Ye, Xuanjing Shen, and Haipeng Chen. "Copy-move forgery detection based on scaled ORB." Multimedia Tools and

Applications, Vol. 75, No. 6, pp. 3221-3233.

[22] Wu, YunJie, Yu Deng, HaiBin Duan, and LinNa Zhou. "Dual tree complex wavelet transform approach to copy-rotate-move

forgery detection." Science China Information Sciences, Vol. 57, No. 1, pp. 1-12, 2014.

[23] Ansari, Mohd Dilshad, S. P. Ghrera, and Vipin Tyagi. "Pixel-based image forgery detection: a review." IETE Journal of

education, Vol. 55, No. 1, pp. 40-46, 2014.

[24] Silva, Ewerton, Tiago Carvalho, Anselmo Ferreira, and Anderson Rocha. "Going deeper into copy-move forgery detection:

Exploring image telltales via multi-scale analysis and voting processes." Journal of Visual Communication and Image

Representation, Vol. 29, No. 1, pp. 16-32, 2015.

[25] Li, Jian, Xiaolong Li, Bin Yang, and Xingming Sun. "Segmentation-based image copy-move forgery detection scheme."

IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp. 507-518, 2015.

[26] Ng TT, Chang SF, Hsu J, Pepeljugoski M. “Columbia photographic images and photorealistic computer graphics dataset.”

ADVENT, Columbia University, Technical Report. 2005.

[27] Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G. “A sift-based forensic method for copy–move attack detection and

transformation recovery.” IEEE Transactions on Information Forensics and Security, vol. 6, No. 3, pp. 1099-110, Sep 2011.

[28] Bo X, Junwen W, Guangjie L, Yuewei D. Image copy-move forgery detection based on SURF. In2010 International

Conference on Multimedia Information Networking and Security 2010 Nov 4 (pp. 889-892). IEEE.

[29] V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, “An evaluation of popular copy-move forgery detection

approaches,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841–1854, 2012.

[30] Arun Anoop M, ``Review on Image forgery and its detection,`` ICIIECS 2015,IEEE

[31] Arun Anoop M, Poonkuntran S, ``Certain investigation on Biomedical impression and Image Forgery Detection,``

International Journal of Biomedical Engineering and Technology (Inderscience.)

[32] Arun Anoop M, Poonkuntran S, ``A Brief study on “Multimedia Security” In Research``, ISBN-13:978-93-86258-63-2,

FIRST EDITION,JULY 2017,VSRD Academic Publishing.

[33] Mr. Jagan Bihari Padhy*, Devarsiti Dillip Kumar**, Ladi Manish*** and Lavanya Choudhry****, ``Leaf Disease Detection

Using K-Means Clustering And Fuzzy Logic Classifier ,`` IJESTA,Volume 02, No. 5, May 2016

[34] S.Jayalakshmi1, M.Sundaresan2, ``A Study of Iris Segmentation Methods using Fuzzy C-Means and K-Means Clustering

Algorithm,`` International Journal of Computer Applications (0975 – 8887), Volume 85 – No 11, January 2014,pp 1-5

[35] Salvador Mandujano, Rogelio Soto,``PREVENTING PASSWORD SHARING: USER AUTHENTICATION VIA FUZZY

C-MEANS CLUSTERING APPLIED TO KEYSTROKE PROFILES,``citeseer, doi=10.1.1.60.9251

[36] A. MUTHUKUMAR1** AND S. KANNAN 2,``K-MEANS BASED MULTIMODAL BIOMETRIC AUTHENTICATION

USING FINGERPRINT AND FINGER KNUCKLE PRINT WITH FEATURE LEVEL FUSION``,IJST, Transactions of

Electrical Engineering, Vol. 37, No. E2, pp 133-145

[37] Hazarath Munaga*1,J.V.R.Murthy1,and N. B. Venkateswarlu2, ``Enhanced User Authentication through Trajectory

Clustering ,``International Journal of Recent Trends in Engineering , ACEEE

[38] Ghassem Alikhajeh1, Abdolreza Mirzaei1, Mehran Safayani1, and Meysam Ghaffari2,`` Duplicate matching and estimating

features for detection of copy-move images forgery,``ARXIV, Jan2017,pp 1-12.

[39] Surya Prakash, Umarani Jayaraman and Phalguni Gupta,`` Ear Localization using Hierarchical Clustering,`` Proceedings of

SPIE International Defence, Security and Sensing conference (Biometric Technology for Human Identification VI),

Orlando, Florida, April 2009.

[40] Hao Zhou ; Nguyen Ngoc V an,`` Indoor Fingerprint Localization Based on Fuzzy C-Means Clustering,`` Measuring T

echnology and Mechatronics Automation (ICMTMA), 2014 Sixth International Conference, China.

[41] Yousef Farhang, `` Face Extraction from Image based on K-Means Clustering Algorithms,`` (IJACSA) International Journal

of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

[42] Sharmila Subudhi, Suvasini Panigrahi, ``Detection of Mobile Phone Fraud Using Possibilistic fuzzy C-Means Clustering

and Hidden Markov Model,`` International Journal of Synthetic Emotions, Vol,issue2,Jul-dec2016

[43] Michael V. Boland,2Mia K. Markey,1and Robert F. Murphy1*, ``Automated Recognition of Patterns Characteristic of

Subcellular Structures in Fluorescence Microscopy Images,`` 1998 Wiley-Liss, Inc., RECOGNITION OF CELLULAR

LOCALIZATION PATTERNS, pp366-375.

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 11

[44] Michael Vorobyov,``Shape Classification Using Zernike Moments, ``Available: https://www.slideserve.com/rivka/shape-

classification-using-zernike-moments

[45] Jie Chen,Shiguang Shan, Chu He, Guoying Zhao,Matti Pietikainen, Xilin Chen, Wen Gao,``WLD: A Robust Local Image

Descriptor,``IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 9,

SEPTEMBER 2010, pp 1705-1720

[46] Zernike Moments, Available: http://murphylab.web.cmu.edu/

publications/boland/boland_node25.html

[47] HOG, Available: https://www.learnopencv.com/histogram-of-oriented-gradients/

[48] Nishmitha M.R and Aravind Naik,” COMPARISON OF THREE TECHNIQUES OF IMAGE FORGERY DETECTION,”

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) , Volume 14 Issue 2 –APRIL

2015

[49] Meera Mary Isaac, Dr. M. Wilscy,” A Key point based Copy-Move Forgery Detection using HOG features,”IEEE,2016.

[50] GLCM, Available: https://www.ucalgary.ca/mhallbey/glcm1 [51] Anil Dada Warbhe, R. V. Dharaskar, V. M. Thakare,” A Survey on Keypoint Based Copy-Paste Forgery Detection

Techniques”, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA(ScienceDirect, Procedia Computer Science 78 ( 2016 ) 61 – 67).

[52] Yongzhen Ke, Weidong Min, Fan Qin, Junjun Shang," Image Forgery Detection Based on Semantics", International Journal of Hybrid Information tehcnology,vol.7, No.1 (2014),pp. 109-124

[53] Xunyu Pan. Xing Zhang, Siwei Lyu, " Exposing Image Forgery with Blind Noise Estimation", MM&Sec’11, ACM, September 29–30, 2011, Buffalo, New York, USA.

[54] P M Panchal, S R Panchal, S K Shah,” A Comparison of SIFT and SURF”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 1, Issue 2, April 2013

[55] SITI FADZLUN MD SALLEH, MOHD FOAD ROHANI, MOHD AIZAINI MAAROF,”COPY-MOVE FORGERY DETECTION: A SURVEY ON TIME COMPLEXITY ISSUES AND SOLUTIONS”, Journal of Theoretical and Applied Information Technology 15

th June 2017. Vol.95. No 11.

[56] Geethu N Nadh, Sreelatha S.H,” Contrast Enhancement Detection on Digital Images - A Survey”, International Journal Of Engineering And Computer Science ISSN:2319-7242 , Volume 4 Issue 7 July 2015, Page No. 13465-13467.

[57] Nishmitha M.R and Aravind Naik,”COMPARISON OF THREE TECHNIQUES OF IMAGE FORGERY DETECTION”, International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE),ISSN: 0976-1353 Volume 14 Issue 2 –APRIL 2015.

[58] Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee,” Detection of Copy-Rotate-Move Forgery Using Zernike Moments”, LNCS 6387, pp. 51–65, 2010

[59] Keerthi Priya, Vishnukanth Karwa P,” A Novel Image Localization Method for Image Forgery”,IJIRCCE, Vol. 5, Issue 5, May 2017

[60] Hansoo Kim and Joong Lee,” An Implementation and Pragmatic Analysis of the Digital Image Forgery Detection Schemes”, International Journal of Future Computer and Communication, Vol. 4, No. 5, October 2015

[61] Musaed Alhussein,” Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine”, 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation.

[62] Vincent Christlein, Christian Riess, ,Johannes Jordan, Corinna Riess, and Elli Angelopoulou,” An Evaluation of Popular Copy-Move Forgery Detection Approaches”,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,26 Nov 2012.

[63] V.Suresh, T.Primya, G. Kanagaraj,” Efficient Detection Technique for Image Forgery”, International Journal of Imaging Science and Pattern Recognition Volume 1 Issue 1,2017.

[64] Meenal Shandilya, Ruchira Naskar, “ Detection of Geometric Transformations in Copy-Move Forgery of Digital Images”, Master Thesis, NIT,Rourkela,June 2015.

[65] Anushree U. Tembe, Supriya S. Thombre,” Copy-Paste Forgery Detection in Digital Image Forensic”, IJSRSET | Volume 3 | Issue 2,2017

[66] Rani Susan Oommen and Dr. Jayamohan M,” A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES”, International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 4, August 2015

[67] R.C. Pandey, S. K. Singh, and K. K. Shukla,” A FULLY AUTOMATED BLIND AND PASSIVE FORENSIC METHOD FOR IMAGE SPLICING DETECTION”, I J C T A, 9(41) 2016, pp. 899-908

[68] Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li,” Passive Detection of Image Splicing using Conditional Co-occurrence Probability Matrix”, APSIPA ASC 2011 Xi’an.

[69] Anupama K. Abraham, Rosna P. Haroon,” An Improved Hashing Method for the Detection of Image Forgery”, IOSR-JCE, Volume 16, Issue 5, Ver. III (Sep – Oct. 2014), PP 13-19

[70] Pradyumna Deshpande , Prashasti Kanikar,” Pixel Based Digital Image Forgery Detection Techniques”, IJERA, Vol. 2, Issue 3, May-Jun 2012, pp. 539-543

[71] Jaseela S, Mrs.Nishadha S. G.,” Copy Move Image Forgery Detection Using SURF Feature Point Extraction”, International Journal Of Scientific & Engineering Research, Volume 7, Issue 7, July-2016

[72] Weihai Li, Yuan Yuan and Nenghai Yu,” DETECTING COPY-PASTE FORGERY OF JPEG IMAGE VIA BLOCK ARTIFACT GRID EXTRACTION”.

[73] Pin Zhang, Xiangwei Kong, Detecting Image Tampering Using Feature Fusion”, 2009 International Conference on Availability, Reliability and Security, 2009 IEEE

[74] Hareesh Ravi, A.V. Subramanyam, Gaurav Gupta, B. Avinash Kumar,” COMPRESSION NOISE BASED VIDEO FORGERY DETECTION”.

International Scientific Global Journal in Engineering Science and Applied Research

(ISGJESAR) ISSN: 2456 - 1894

Vol. 3 Issue 3

May 2018

V o l 2 I s s u e 3 | w w w . I s g j e s a r . c o m Page 12

[75] Gawtham Srinivasan R, Lokhesh K ,” Image Encryption and DWT Based Copy-move Image Forgery Detection”, International Journal of Computer Applications Technology and Research Volume 6–Issue 1, 66-69, 2017

[76] Priya Singh, Ms. Shalini Sharma Goel,” Correlation Based Image Tampering Detection”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2) , 2016, 990-995

[77] Amrit Hanuman, Azim Abdool, Akash Pooransingh, Aniel Maharajh, “A Novel Approach To Detection and Evaluation of Resampled Tampered Images”, International Journal of Image Processing (IJIP), Volume (9) : Issue (4) : 2015

[78] Ashima Gupta, Nisheeth Saxena, S.K Vasistha,” Detecting Copy move Forgery using DCT”, International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013

[79] Joshi Chintal J, Prof. Shailendra K Mishra,” Investigating the Possibility of Recognizing the Forgery by Using Spatial & Transform Domain”, International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 5, May 2015.

[80] Prinkle Rani, Er. Jyoti Rani,” Copy-Move Forgery Attack Detection using Enhanced SIFT”, IJERT,Vol. 4 Issue 10, October-2015.

[81] Harpreet Kaur, Kamaljit Kaur,” Image Forgery Detection Using Steerable Pyramid Transform and LAB Color Space”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, August 2015.

[82] EXIFTool, Available: https://www.sno.phy.queensu.ca/~phil/exiftool/

[83] Jeffrey’s Image metadata viewer, Available: http://exif.regex.info/exif.cgi

[84] EXIF removal, Available: https://www.makeuseof.com/tag/3-ways-to-remove-exif-metadata-from-photos-and-why-you-might-want-to/

[85] ELA, Available: https://fotoforensics.com/tutorial-ela.php

[86] Hex editor, Available: https://en.wikipedia.org/wiki/Hex_editor

[87] Image forensiscs, available: http://www.imageforensic.org/

[88] Foto forensics, Available: https://fotoforensics.com/

[89] Verexif , Available: https://www.verexif.com/