Detection of Image Tempering: Conventional and Deep Learning-based Techniques
DOI:
https://doi.org/10.32792/jeps.v12i2.192الكلمات المفتاحية:
Image Forgery، Copy-move detection، Deep CNNالملخص
In light of the cumulative use of digital images in a wide range of apps, as well as the accessibility of
image manipulation software, detecting image alteration has become a difficult task. The copy-move
technique is the most commonly used sort of picture counterfeiting. A portion of an image is duplicated
and manipulated in various ways. Handcrafted qualities are commonly used in the identification of
picture forgery and counterfeiting. It has always been a difficulty with earlier photo reproduction
detection systems that they would rather only detect a specific type of tampering if they are aware of
specific image features. Deep learning is currently being used to detect image alteration, which is a
breakthrough. These strategies were even more efficient than prior methods since they were able to
extract complex images from them. The purpose of this work is to teach you about deep learning-based
picture forgery detection methods, why they function, and how they can be improved upon. In addition,
you will learn about publicly available image forgery datasets.
المراجع
Deep Kaur, C., & Kanwal, N. (2019). An analysis of image forgery detection techniques.
Statistics, Optimization & Information Computing, 7(2), 486-500.
Agarwal, R., Khudaniya, D., Gupta, A., & Grover, K. (2020, May). Image Forgery Detection
and Deep Learning Techniques: A Review. In 2020 4th International Conference on Intelligent
Computing and Control Systems (ICICCS) (pp. 1096-1100). IEEE.
Alasadi, A. H. H., & Jaffar, R. H. (2018). Fingerprint Verification System Based on Active
Forgery Techniques. International Journal of Computer Applications, 975, 8887.
Doegar, A., Dutta, M., & Kumar, G. (2019). A review of passive image cloning detection
approaches. In Proceedings of 2nd International Conference on Communication, Computing
and Networking (pp. 469-478). Springer, Singapore.
The Oxford dictionary online. http://oxforddictionaries.com/ Accessed 7 December 2021.
Subramaniam, T., Jalab, H. A., Ibrahim, R. W., & Mohd Noor, N. F. (2019). Improved image
splicing forgery detection by combining conformable focus measures and focus measure
operators applied on obtained redundant discrete wavelet transform coefficients: symmetry,
(11), 1392.
Huang, H., Guo, W., & Zhang, Y. (2008, December). Detection of copy-move forgery in digital
images using SIFT algorithm. In 2008 IEEE Pacific-Asia Workshop on Computational
Intelligence and Industrial Application (Vol. 2, pp. 272-276). IEEE
Ahmad, M., & Khursheed, F. (2021). Digital Image Forgery Detection Approaches A Review.
In Applications of Artificial Intelligence in Engineering (pp. 863-882). Springer, Singapore.
Diallo, B., Urruty, T., Bourdon, P., & Fernandez-Maloigne, C. (2020). Robust forgery detection
for compressed images using CNN supervision. Forensic Science International: Reports, 2,
Kaur, S. J., & Bhatla, N. (2020, November). Forgery Detection For High-Resolution Digital
Images Using FCM And PBFOAAlgorithm. In 2020 Sixth International Conference on
Parallel, Distributed and Grid Computing (PDGC) (pp. 248-253). IEEE.
Patel, H. A., & Shah, D. B. (2021). Semi-Fragile Blind Watermarking Mechanism for Color
Image Authentication and Tampering. ICTACT Journal on Image and Video Processing, 11(3),
-2359.
Patel, H. A., & Shah, D. B. (2019). Digital image watermarking mechanism for image
authentication, image forgery and self-recovery. Int. J. Electron. Eng, 140-143.
Khudhair, Z. N., Mohamed, F., & Kadhim, K. A. (2021, April). A Review on Copy-Move
Image Forgery Detection Techniques. In Journal of Physics: Conference Series (Vol. 1892, No.
, p. 012010). IOP Publishing.
Jaafar, R. H., Rasool, Z. H., & Alasadi, A. H. H. (2019, September). New copy-move forgery
detection algorithm. In 2019 International Russian Automation Conference (RusAutoCon) (pp.
-5). IEEE.
Bharti, C. N., & Tandel, P. (2016, March). A survey of image forgery detection techniques. In
International Conference on Wireless Communications, Signal Processing and
Networking (WiSPNET) (pp. 877-881). IEEE.
Thapaliya, A., Elambo Atonge, D., Mazzara, M., Chakraborty, S., Afanasyev, I., & Ahmad, M.
(2019). Digital Image Forgery. In 6th International Young Scientists Conference on Information
Technologies, Telecommunications and Control Systems (ITTCS 2019),
Innopolis/Yekaterinburg, Russia, December 6, 2019. (Vol. 2525).
Khayeat, A. (2017). Copy-move forgery detection in digital images (Doctoral dissertation,
Cardiff University).
Saber, A. H., Khanl, M. A., & Mejbel, B. G. (2020). A survey on image forgery detection using
different forensic approaches. Advances in Science, Technology and Engineering Systems
Journal, 5(3), 361-370.
Wen, B., Zhu, Y., Subramanian, R., Ng, T. T., Shen, X., & Winkler, S. (2016, September).
COVERAGE—A novel database for copy-move forgery detection. In 2016 IEEE international
conference on image processing (ICIP) (pp. 161-165). IEEE.
alZahir, S., & Hammad, R. (2020). Image forgery detection using image similarity. Multimedia
Tools and Applications, 79(39), 28643-28659.
Tralic, D., Zupancic, I., Grgic, S., & Grgic, M. (2013, September). CoMoFoD—New database
for copy-move forgery detection. In Proceedings ELMAR-2013 (pp. 49-54). IEEE.
Zheng, L., Zhang, Y., & Thing, V. L. (2019). A survey on image tampering and its detection in
real-world photos. Journal of Visual Communication and Image Representation, 58, 380-399.
Lee, J. C., Chang, C. P., & Chen, W. K. (2015). Detection of copy-move image forgery using
histogram of orientated gradients. Information Sciences, 321, 250-262.
Parihar, V., & Mehtre, B. M. (2016). Copy move forgery detection using key-points structure.
Sardar Patel University of Police, Security and Criminal.
Dixit, R., Naskar, R., & Mishra, S. (2017). Blur-invariant copy-move forgery detection
technique with improved detection accuracy utilizing SWT-SVD. IET Image Processing, 11(5),
-309.
Vidyadharan, D. S., & Thampi, S. M. (2017). Digital image forgery detection using compact
multi-texture representation. Journal of Intelligent & Fuzzy Systems, 32(4), 3177-3188.
Wang, C., Zhang, Z., & Zhou, X. (2018). An image copy-move forgery detection scheme based
on A-KAZE and SURF features. Symmetry, 10(12), 706.
Mahmood, T., Mehmood, Z., Shah, M., & Saba, T. (2018). A robust technique for copy-move
forgery detection and localization in digital images via stationary wavelet and discrete cosine
transform. Journal of Visual Communication and Image Representation, 53, 202-214.
Hashmi, M. F., Hambarde, A. R., & Keskar, A. G. (2013, December). Copy move forgery
detection using DWT and SIFT features. In 2013 13th International Conference on intelligent
systems design and applications (pp. 188-193). IEEE.
Anand, V., Hashmi, M. F., & Keskar, A. G. (2014, April). A copy-move forgery detection to
overcome sustained attacks using dyadic wavelet transform and SIFT methods. In Asian
Conference on Intelligent Information and Database Systems (pp. 530-542). Springer, Cham.
Wu, Y., Abd-Almageed, W., & Natarajan, P. (2018). Buster not: Detecting copy-move image
forgery with source/target localization. In Proceedings of the European Conference on
Computer Vision (ECCV) (pp. 168-184).
Allu Venkateswara, Chanamallu Srinivasa, Dharma Raj Cheruku (2020), An Innovative And
Efficient Deep Learning Algorithm For Copy Move Forgery Detection In Digital Images,
International Journal of Advanced Science and Technology 29 (5), 10531 – 10542.
Xinyi Wang, He Wang, Shaozhang Niu and Jiwei Zhang (2019), Detection and localization of
image forgeries using improved mask regional convolutional neural network, Math. Biosci.
Eng., vol. 16, no. 5, pp. 4581–4593, 2019.
Leekha, A., Gupta, A., Kumar, A., & Chaudhary, T. (2021, March). Methods of Detecting
Image forgery using convolutional neural network. In Journal of Physics: Conference Series
(Vol. 1831, No. 1, p. 012026). IOP Publishing.
Bayar, B., & Stamm, M. C. (2016, June). A deep learning approach to universal image
manipulation detection using a new convolutional layer. Proceedings of the 4th ACM workshop
on information hiding and multimedia security (pp. 5-10).
Zhang, Y., Goh, J., Win, L. L., & Thing, V. L. (2016). Image Region Forgery Detection: A
Salloum, R., Ren, Y., & Kuo, C. C. J. (2018). Image splicing localization using a multi-task
fully convolutional network (MFCN). Journal of Visual Communication and Image
Representation, 51, 201-209.
Amerini, I., Uricchio, T., Ballan, L., & Caldelli, R. (2017, July). Localization of JPEG double
compression through multi-domain convolutional neural networks. In 2017 IEEE Conference on
computer vision and pattern recognition workshops (CVPRW) (pp. 1865-1871).
Manu, V. T., & Mehtre, B. M. (2016). Detection of copy-move forgery in images using
segmentation and SURF. Advances in signal processing and intelligent recognition systems (pp.
-654). Springer, Cham.
التنزيلات
منشور
إصدار
القسم
الرخصة
The Authors understand that, the copyright of the articles shall be assigned to Journal of education for Pure Science (JEPS), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (JEPS), University of Thi-Qar.
Journal of education for Pure Science (JEPS), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (JEPS), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.