A passive technique for detecting copy-move forgeries by image feature matching

  • PDF / 4,084,880 Bytes
  • 24 Pages / 439.37 x 666.142 pts Page_size
  • 70 Downloads / 185 Views

DOWNLOAD

REPORT


A passive technique for detecting copy-move forgeries by image feature matching Toqeer Mahmood 1 & Mohsin Shah 2,3 & Junaid Rashid 4 & Tanzila Saba 5 & Muhammad Wasif Nisar 6 & Muhammad Asif 7 Received: 26 September 2019 / Revised: 5 June 2020 / Accepted: 18 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Due to the recent evolutions in the technologies various digital devices and image processing tools are available in the market. Consequently, crime rates are also proliferating in the developed and developing regions of the world. One such crime is the manipulation of digital image contents that can be achieved by using commercial and open-source image manipulation tools. The most widespread approach for image contents manipulation is the copy-move forgery. While crafting the copy-move forgeries (CMFs) it is often required to conceal undesired regions or duplicate desired regions in the image. Thus, forensic applications are needed to certify the contents of an image and to expose the manipulated areas. In this study, we are presenting a technique for detecting CMFs in digital images by image feature matching. The technique segments the suspected image into overlapping blocks and Tchebichef moments are computed for every block to characterize the manipulated regions of the image. Tchebichef moments are adopted because of their ability to represent image features more effectively as compared to other moments such as Legendre and Zernike moments. Each block of Tchebichef moments is further segmented into non-overlapping blocks and processed through singular values decomposition (SVD). To obtain a reduced size feature vector largest singular values of each sub-block are used that also enhanced the performance in the feature matching process. In the experiments standard databases namely, the DVMM Columbia University dataset, COVERAGE, and CoMoFoD are utilized to assess the performance of the proposed approach. The results conclusively demonstrate that the presented technique based on Tchebichef moments and SVD transcends the other methods. Keywords Copy-move forgeries . Tchebichef moments . Singular values decomposition, digital forensics . Forgery detection . Passive authentication

* Toqeer Mahmood [email protected] Extended author information available on the last page of the article

Multimedia Tools and Applications

1 Introduction With the recent innovations in the digital industry, particularly the availability of high definition imaging devices are facilitating the internet consumers to share a huge amount of images on social media such as LinkedIn, Twitter, etc. In the court of law, to decide a crime the digital images are also used as evidence for someone’s innocence or conviction. However, the high definition digital devices and easy to operate image editing tools are making the authenticity of image contents dubious. Therefore, forensic applications are needed to authenticate the truthfulness of image contents and expose the manipulated objects. The meth