[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

A novel deep learning framework for copy-moveforgery detection in images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this era of technology, digital images turn out to be ubiquitous in a contemporary society and they can be generated and manipulated by a wide variety of hardware and software technologies. Copy-move forgery is considered as an image tampering technique that aims to generate manipulated tampered images by concealing unwanted objects or reproducing desirable objects within the same image. Therefore, image content authentication has become an essential demand. In this paper, an innovative design for automatic detection of copy-move forgery based on deep learning approaches is proposed. A Convolutional Neural Network (CNN) is specifically designed for Copy-Move Forgery Detection (CMFD). The CNN is exploited to learn hierarchical feature representations from input images, which are used for detecting the tampered and original images. The extensive experiments demonstrate that the proposed deep CMFD algorithm outperforms the traditional CMFD systems by a considerable margin on the three publicly accessible datasets: MICC-F220, MICC-F2000, and MICC-F600. Furthermore, the three datasets are incorporated and joined to the SATs-130 dataset to form new combinations of datasets. An accuracy of 100% has been achieved for the four datasets. This proves the robustness of the proposed algorithm against a diversity of known attacks. For better evaluation, comparative results are included.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-Move Forgery Detection and Localization by Means of Robust Clustering with J-Linkage. Signal Processing: Image Communication 28(6):659–669

    Google Scholar 

  2. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf For Secur 6(3)

  3. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10:226–245

    Article  Google Scholar 

  4. Boz A, Bilge HŞ (2016) Copy-move image forgery detection based on LBP and DCT. 24th Signal Processing and Communication Application Conference (SIU), 16–19

  5. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf For Secur 7(6):1841–1854

    Article  Google Scholar 

  6. Chu J, Guo Z, Leng L (2018) Object detection based on multi-layer convolution feature fusion and online hard example mining. IEEE Access 6:19959–19967. https://doi.org/10.1109/access.2018.2815149

    Article  Google Scholar 

  7. Costanzo A, Amerini I, Caldelli R, Barni M (2014) Forensic analysis of SIFT Keypoint removal and injection. IEEE Trans Inf For Secur 9(9):1450–1464

    Article  Google Scholar 

  8. Derroll D, Divya B (2015) Image authentication techniques and advances survey, COMPUSOFT. Int J Adv Comput Technol Volume-IV, No. IV

  9. Elaskily MA, Aslan HK, Abd El-Samie FE, Elshakankiry OA, Faragallah OS, Dessouky MM (2017) Comparative study of copy-move forgery detection techniques. Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & Intl Conf on New Paradigms in Electronics & Information Technology (PEIT), Alexandria, Egypt

  10. Elaskily MA, Elnemr HA, Dessouky MM, Faragallah OS (2018) Two Stages Object Recognition Based Copy-Move Forgery Detection Algorithm. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6891-7

  11. Farid H (2009) Image forgery detection a survey. IEEE Signal Process Mag 26(2):16–25

    Article  Google Scholar 

  12. Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. Proceedings of DFRWS 2003, Cleveland, USA

  13. Gu J, Wang Z, Kuen J, Ma L, Shahroudy A, Shuai B, Liu T, Wang X, Wang G, Cai J, Chen T (2018) Recent advances in convolutional neural networks. Pattern Recogn 77:354–377

    Article  Google Scholar 

  14. Hosny KM (2008) Fast computation of accurate Zernike moments. Real-Time Image Process 3:97–107. https://doi.org/10.1007/s11554-007-0058-5

    Article  Google Scholar 

  15. Hosny KM, Hamza HM, Lashin NA (2018) Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators. Imaging Sci J 66(6):330–345. https://doi.org/10.1080/13682199.2018.1461345

    Article  Google Scholar 

  16. Hosny KM, Hamza HM, Lashin NA Copy-for-duplication forgery detection in colour images using QPCETMs and sub-image approach. IET Image Process. https://doi.org/10.1049/iet-ipr.2018.5356

  17. Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using sift algorithm. Pacific-Asia workshop on computational intelligence and industrial application PACIIA’08, Volume 2, pp 272–276, Washington

  18. Kang X, Lin G, Chen Y, Zhang E, Duan G (2012) Detecting tampered regions in digital images using discrete cosine transform and singular value decomposition. Int J Digit Content Technol Appl (JDCTA) 6

  19. Kaur H, Saxena J, Singh S (2015) Simulative comparison of copy- move forgery detection methods for digital images. Int J Electr Electr Comput Syst IJEECS, ISSN 2348-117X, Volume 4

  20. Khan MK, Zakariah M, Malik H, Choo K-KR (2018) A novel audio forensic data-set for digital multimedia forensics. Australian Journal of Forensic Science 50(5):525–542. https://doi.org/10.1080/00450618.2017.1296186

    Article  Google Scholar 

  21. Kim D-H, Lee H-Y (2017) Image manipulation detection using convolutional neural network. Int J Appl Eng Res 12(21):11640–11646

    Google Scholar 

  22. Kingma DP, Ba JL, (2015) ADAM: a method for stochastic optimization. International conference on learning representations, San Diego, CA, may 7, 2015 - may 9

  23. Kirchner M, Böhme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inf Forensics Secur 3(4)

  24. Kushol R, Salekin MS, Kabir MH, Khan AA (2016) Copy-move forgery detection using color space and moment invariants-based features. International Conference on Digital Image Computing: Techniques and Applications (DICTA), Australia

  25. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  26. Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and Palmprint recognition. International conference on information and communication technology convergence (ICTC). https://doi.org/10.1109/ictc.2010.5674791

  27. Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-016-3971-4

  28. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Processing: Image Communication. https://doi.org/10.1016/j.image.2017.07.006

  29. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 1(1). doi: https://doi.org/10.1109/TCSVT.2019.2896270

  30. Lin X, Li J-H, Wang S-L, Liew A-W-C, Cheng F, Huang X-S (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39

    Article  Google Scholar 

  31. Liu Y, Yin B, Yu J, Wang Z (2016) Image classification based on convolutional neural networks with cross-level strategy. Multimed Tool Appl 76(8):11065–11079

    Article  Google Scholar 

  32. Liua G, Wanga J, Lianb S, Wanga Z (2010) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565

    Article  Google Scholar 

  33. Mahmoud K, Al-Rukab AA (2016) Moment based copy move forgery detection methods. Int J Comput Sci Inf Secur (IJCSIS) 14(7)

  34. Mishra P, Mishra N, Sharma S, Patel R (2013) Region duplication forgery detection technique based on SURF and HAC. Sci World J Hindawi Publishing Corporation

  35. Muhammad G, Hussain M (2013) Passive detection of copy-move image forgery using Undecimated wavelets and Zernike moments. Inf J 16(5):2957–2964

    Google Scholar 

  36. Nanda W, Diane N, Xingming S, Moise FK (2014) Survey of partition-based techniques for copy-move forgery detection. The scientific world journal 2014:Article ID 975456

    Google Scholar 

  37. Ouyang J, Liu Y, Liao M (2017) Copy-move forgery detection based on DeepLearning. 10th international congress on image and signal processing, BioMedical engineering and informatics (CISP-BMEI). doi:https://doi.org/10.1109/cisp-bmei.2017.8301940

  38. Prajapati BM, Desai NP (2015) Forensic analysis of digital image tampering. Int J Technol Res Eng 2(10)

  39. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. IEEE international workshop on information forensics and security (WIFS)

  40. Sadeghi S, Dadkhah S, Jalab H, Mazzola G, Uliyan D (2017) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Applic 21(2):291–306

    Article  MathSciNet  Google Scholar 

  41. Shah H, Shinde P, Kukreja J (2013) Retouching detection and steganalysis. Int J Eng Innov Res 2(6)

  42. Sharma S, Ghanekar U (2015) A rotationally invariant texture descriptor to detect copy-move forgery in medical images. IEEE Int Conf Comput Intell Commun Technol Ghaziabad pp 795–798

  43. Thajeel SA, Sulong G (2014) A survey of copy-move forgery detection techniques. J Theor Appl Inf Technol 70(1)

  44. Tran DT, Iosifidis A, Gabbouj M (2018) Improving efficiency in convolutional neural networks with multilinear filters. Neural Networks 105:328–339

    Article  Google Scholar 

  45. Vartak R, Deshmukh S (2014) Survey of digital image authentication techniques. Int J Res Advent Technol 2(7)

  46. Wang P, Wei Z, Xiao L (2015) Pure spatial rich model features for digital image steganalysis. Multimed Tool Appl 75(5):2879–2912

    Google Scholar 

  47. Warif NBA, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, Choo K-KR (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259–278

    Article  Google Scholar 

  48. Weiqi L, Zhenhua Q, Feng P, Jiwu H (2007) A survey of passive technology for digital image forensics. Front Comput Sci China 1(2):166–179

    Article  Google Scholar 

  49. Wu Y, Abd-Almageed W, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network. IEEE winter conference on applications of computer vision (WACV), doi:https://doi.org/10.1109/wacv.2018.00211

  50. Yu H, He F, Pan Y (2018) Novel region-based active contour model via local patch similarity measure for image segmentation. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-5697-y

  51. Yu H, He F, Pan Y (2018) A novel segmentation model for medical images with intensity in homogeneity based on adaptive perturbation. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6735-5

  52. Zakariah M, Khan MK, Malik H (2016) Digital multimedia audio forensics: past, present and future. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-016-4277-2

  53. Zeiler MD, Fergus R (2014) Visualizing and understanding convolutional networks. European Conference on Computer Vision (ECCV), pp 818–833

  54. Zhan Y, Chen Y, Zhang Q, Kang X (2017) Image forensics based on transfer learning and convolutional neural network. Proceedings of the 5th ACM workshop on information hiding and multimedia security, Philadelphia, USA, 20–22

  55. Zimba M, Xingming S (2011) Fast and robust image cloning detection using block characteristics of DWT coefficients. Int J Digit Content Technol Appl 5

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed A. Elaskily.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elaskily, M.A., Elnemr, H.A., Sedik, A. et al. A novel deep learning framework for copy-moveforgery detection in images. Multimed Tools Appl 79, 19167–19192 (2020). https://doi.org/10.1007/s11042-020-08751-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08751-7

Keywords

Navigation