• Nenhum resultado encontrado

An Enhanced Approach to Detect Copy Move Forgery

N/A
N/A
Protected

Academic year: 2017

Share "An Enhanced Approach to Detect Copy Move Forgery"

Copied!
5
0
0

Texto

(1)

An Enhanced Approach to Detect Copy Move Forgery

Ruchita Singh

Department of Computer Science and Engineering, MMU, Haryana, India

Email: ruchita_61@yahoo.com

Dr. Ashish Oberoi

Department of Computer Science and

Engineering, MMU, Haryana, India Email: a_oberoi01@yahoo.co.in

Nishi Goel

Department of Computer Science and Engineering, MMU, Haryana, India

Email: nishigoel1@gmail.com

Abstract– Due to the enhancement in the availability and quality of image manipulation tools, it is easy for a forger to forge any image without living any traces of modification. Digital Image tampering is now-a-days very common. Most obvious practice for doing forgery is Copy Move Forgery. In this research, a novel approach to detect Copy Move forgery is proposed. In this approach block based method and feature based method is employed to extract features from the image and extracted features are than matched to detect forgery and also perform the localization of the Forged Regions in the Digital Image.

Keywords Copy Move Forgery, Discrete Cosine Transform (DCT), Feature Extraction, Block Based, Scale Invariant Feature Transform (SIFT).

I.

I

NTRODUCTION

Originality of digital images is a major concern now-a-days. The availability of powerful digital image processing programs such as Adobe Photoshop, Corel Draw etc. makes it relatively easy to create digital forgeries and puts at stake the authenticity of digital Images. Digital images are the foremost source of information when we used them as an evidence. In the current scenario digital crime is growing at such a faster rate that it even surpasses defensive measures. Sometimes a Digital media content may be found to be incontrovertible evidence of a crime or of a malevolent action. To determine whether the digital image is authentic or not is a key purpose of image forensics. There are several different types of tampering attacks but the most common and the immediate one is the copy move forgery. In Figure 1 depicted a simple example of copy move forgery.

(a) (b) Fig.1. Example of Copy Move Forgery. (a) Original Image

(b) Forged Image.

Numerous tampering attacks are there but the most common used is the copy move forgery. Copy move forgery involves concealing or duplicating one region in an image by pasting certain portions of the same image on it.

Digital image forensics has two approaches to detect forgery. One is active approach which includes watermarking and stenography [1] These are implemented at the time of image acquisition and other is tampering

detection; it detects the intentional manipulation of images [2]. Image manipulation is denoted as tampering when it aims at modifying the content of the visual message.

II.

L

ITERATURE

R

EVIEW

Several techniques were proposed to detect image forgery in the literature of digital image forensics. Author proposed one such approach to detect copy move forgery, which basically perform rigorous search by comparing the image to every cyclic-shifted versions of it [3].There is a technique based on the radon transform and phase correlation in order to improve the robustness in forgery detection. The proposed technique can detect forgeries even if the forged images were undergone some image processing operations such as rotation ,scaling, Gaussian noise addition, [4] etc.

Author proposed a system in which query image is divided into equal size sub-blocks. The feature extraction of each sub-block is carried out using Haar wavelet and Fourier descriptor. A matching scheme based on Most Similar Highest Priority (MSHP) principle and the adjacency matrix of bipartite graph partitioning (BGP) formed using sub-blocks of query and target image, is provided for matching the image [5].

(2)

Copyright © 2014 IJECCE, All right reserved match algorithm, author used Discrete Cosine Transform

(DCT) for the detection [10]. It was based on quantized DCT coefficient of each overlapping block of the image. However this method fails for any type of geometrical transformations of the query block e.g. rotation, scaling. A key point based methods were proposed to overcome the rate complexity of block based method. Author proposed the method of detection using scale invariant feature transform (SIFT) key point [11]. Author Proposed Content Based Image Retrieval System for Medical Databases (CBIR-MD) based on various techniques like Fourier descriptor, Euclidean distance, Haar Wavelet transformation, Canberra distance and analyzed its performance on Endoscopy, Dental and Skull images [12]. It detects the key point and match them using nearest neighborhood search. SIFT is robust to rotation and scaling but unable detect forgery by smooth surfaces. Author analyzed different algorithms based on their performance. As a result it was shown that different key point-based methods like SIFT and SURF, and block-based methods like DCT, PCA, Discrete Wavelet Transform (DWT), perform that deals at exposing the malicious image manipulation [13]. Author proposed method relies on Scale Invariant Features Transform (SIFT) and features matching, and improves previous work by introducing a new robust clustering phase based on the J-Linkage algorithm, and an accurate forgery localization procedure [14]. Author summarizes the three robust feature detection methods: Scale Invariant Feature Transform (SIFT), Principal Component Analysis (PCA)– SIFT and Speeded Up Robust Features (SURF). This paper uses KNN (K-Nearest Neighbor) and Random Sample Consensus (RANSAC) to the three methods in order to analyze the results of the methods’ application in recognition [15].

III.

P

ROPOSED

M

ETHODOLOGY

In the proposed methodology an input image is taken and converted into grayscale, then we apply DCT on it to find the intensity of that image and store the intensity levels in a separate Matrix. Image is then divided into the multipliers of two. Proposed method used the block size of 16x16.After that feature extraction process on each block is applied. Novelty of proposed method is that for each block some kernel value are set and calculate the sum matrix by employing following formula, similar phenomena is also done for red, blue and green channel of the image. Then quantization of obtained matrix is done followed by matching the similar features and their localization in the image.

Formula Used:

To calculate the feature vector for each block

Sum ( i, j)= ∑ image(i-1, j-1)* kernel (i, j)

Quantization of feature vector QP = 100*T_present

FQ = floor (feature vector (i)/QP) X = FQ*QP

Where, T_present is set to 0.1 and x is the quantized value.

Proposed Algorithm:

Step 1: An input image is taken and Convert the RGB image into Gray Scale.

Step 2: Apply (Discrete Cosine Transform) DCT and store the intensity levels in a separate matrix.

Step 3: Divide image into a block size in the multipliers of 2(16x16).

Step 4: Compute the feature vector for each block by setting kernel matrix value

Step 5: Store the feature vectors in rows of matrix.

Step 6: Perform quantization to assign value to the obtained feature vectors and lexicographically sort them save all the value in a matrix

Step 7: Identification of outliers based on the similarity features and save the coordinate values

Step 8: Perform Matching to find the same area. Step 9: Localization of the forged region. Step 10: Display Image with the Forged Regions.

Fig2. Shows Flow Chart of Proposed Method

IV.

R

ESULT AND

A

NALYSIS

(3)

(a) (b) (c) (d)

(e) (f) (g) (h) Fig.3. (a) Forged Image of Taj. (b) Forgery Detection for the Single Copy Move by Proposed Algorithm. (c) Forged Image Taj. (d) ) Forgery Detection for the Multiple Copy Move by Proposed Algorithm. (e) Forged Image of Mysore Palace. (f) Forgery Detection for the Single Copy Move by Proposed Algorithm. (g) Forged Image of Mysore Palace. (h)

Forgery Detection for the Multiple Copy Move by Proposed Algorithm

Table 1: Comparative Results of Proposed Algorithm for Forged Image of Taj

Algorithm Single Move (In Seconds) Processing Time For Processing Time For Multiple Move (In Seconds) (In Pixel) Size rate (In Percentage) Average Accuracy

DCT 28.013 31.295 299X168 71

PCA 21.002 24.132 299X168 82

SIFT 15.907 19.528 299X168 84

Proposed Algorithm 17.829 20.433 299X168 93

Table 2: Comparative Results of Proposed Algorithm for forged Image of Mysore Palace

Algorithm

Processing Time For Single Move(In Seconds)

Processing Time For Multiple Move (In Seconds)

Size (In Pixel)

Average Accuracy rate (In Percentage)

DCT 21.003 25.290 266X190 78

PCA 22.197 24.057 266X190 82

SIFT 16.907 18.528 266X190 89

Proposed Algorithm 12.889 14.187 266X190 98

0 10 20 30 40 50 60 70 80 90 100

DCT PCA SIFT Propos

ed Algorit

hm Average Accuracy rate (In

Percentage) 71 82 84 93

Av

er

a

g

e

Ac

cu

ra

cy

De

te

ctio

n

Ra

te

(4)

Copyright © 2014 IJECCE, All right reserved Graph 2: Processing Time taken to Detect Forged Regions

of Proposed Algorithm for Forged Image of Taj.

Graph 4: Processing Time taken to Detect Forged Regions of Proposed Algorithm for Forged Image of Mysore

Palace.

Graph 3: Accuracy Rates of Proposed Algorithm for Forged Image of Mysore Palace.

C

ONCLUSION

In this research, proposed algorithm is analyzed on various parameters like processing time, accuracy rate, bmp processing and it is concluded that this proposed approach has generated better results. Comparative analysis of algorithm against DCT, PCA, SIFT also justifies the performance of this approach. The Proposed algorithm is also tested for multiple forgery detection and results obtained depicted that this algorithm is efficient in detecting multiple forgery. Results generated by proposed approach are better as compared to other block based and feature based methods. Hence it is concluded that this technique and algorithmic approach is efficient in terms of the results and complexity, still there is scope of the future work for further enhancement of the results.

In future scope of work, the method can be extended to detect forgery by more post-processing operations on snippet and further techniques can be associated such as genetic algorithms, neural networks.

R

EFERENCES

[1] S. Ly u and H. Farid, “How realistic is p hotorealistic?” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp.845–850, 2005.

[2] I.J.Cox, M. L. Miller, and J. A. Bloom, Digital watermarking. San Francisco, CA: Morgan Kaufmann, 2002.

[3] Ashima Gupta, Nisheeth Saxena and S.K.Vasistha, “Detecting

Copy move Forgery using DCT,” International Journal of

Scientific and Research Publications, Vol 3(5), ISSN 2250-3251, 2013.

[4] Hieu Cuong Nguyen and Stefan Katzenbeisser, “Detection of copy move forgery in Digital images using Radon transformation

and phase correlation,” Eighth InternationalConference on

Intelligent information hiding and Multimedia Signal Processing, IEEE, pp.134-137, 2012

[5] Ashish Oberoi, Deepak Sharma and Manpreet Singh, “CBIR -MD/BGP: CBIR-MD System based on Bipartite Graph

Partitioning,” International Journal of Computer Applications,

Vol 52(15), pp.49-58, 2012.

[6] A.C.Popescu and H.Farid, “Exposing Digital Forgeries by

Detecting Duplicated Image Regions,” Technical Report,

TR2004-515, Department of computer Science, Darmouth College, pp.758-767, 2006

0 10 20 30 40

Pr

o

ce

ssi

n

g

Ti

m

e

Algorithms Processing Time

Processing Time For Single Move(In Seconds)

0 10 20 30

Pr

o

ce

ssi

n

g

Ti

m

e

Algorithms Processing Time

Processing Time For Single Move(In Seconds)

0 10 20 30 40 50 60 70 80 90 100

DCT PCA SIFT Proposed

Algorithm Average Accuracy rate (In

Percentage) 78 82 89 98

A

v

e

rag

e

A

cc

u

rac

y

Det

e

ction

R

ate

(5)

[7] Swapnil H.Kudke, A.D.Gawande, “Copy-Move Attack Forgery

Detection by Using SIFT,” International Journal of Innovative

Technology and Engineering, Vol.(5), ISSN 2278-3075, 2013 [8] Shilpa Narula, Ashish Oberoi, Sumit Kaushik,Dr.D.S.Rao,

“Performance And Analysis Of Directional Edgedetectors On 3

-Planar Images Corrupted With Impulsive Noise,” International

Journal of Computer Technology and Applications, Vol2 (5), pp. 1263-1268, 2011.

[9] B.L.Shivakumar and Lt.Dr.S.Santhosh Baboo, “Detection of Region Duplication Forgery in Digital Images Using SURF,” International Journal of computer science Issues, Vol.8(4), ISSN 1694-0814, 2011

[10] I.Amerini,L.Ballan,R.Caldelli,A.D.Bimbo,and G.Serra, “A SIFT-based Forensics Method for Copy-Move Attack Detection

and Transformation Recovery,” IEEE Transaction on

Information Forensics and Security, Vol.6, no.3, pp.1099-1110, 2011.

[11] V.Christlein,C.Riess, J.Jordan, C.Riess, and E.Angelopoulou,

“An Evaluation of popular Copy-Move Forgery Detection

Approaches,” IEEE Transactions on Information Forensicsand

Security, Vol.7, pp.1841-1854, 2012

[12] Ashish Oberoi and Manpreet Singh, “Content Based Image Retrieval System for Medical Databases (CBIR-MD) Lucratively

tested on Endoscopy, Dental and Skull Images,” International

Journal of Computer Science Issues, Vol9(3), pp.300-306, 2012. [13] Preeti Yadav, Yogesh Rathore and Aarti Yadu, “DWT Based

Copy-Move Image Forgery Detection,” International Journal of Advanced Research in Computer Science and Electronics Engineering, Vol.1(5), ISSN 2277-9043, 2012.

[14] B.L.Shivakumar and Dr.S.Santhosh Baboo, “Automated Forensics Method for Copy- MoveForgery Detection based on

Harris Interest Points and Sift Descriptors,” International

Journal of Computer Applications, Vol.27(3), pp.0975-8887, 2011.

[15] Nattapol Chaitawittanun, “Detection of Copy-Move Forgery by Clustering Technique,” International Conference on Image, Vision and Computing, Vol.50(10), pp-3948-3959, 2012.

A

UTHOR

S

P

ROFILE

Ms. Ruchita Singh

currently completed her internship in Infosys . She has obtained her M.Tech (CSE) from MM Engineering College, MM University, Mullana (Ambala). She passed out her B.Tech from Kurukshetra University.

Email: ruchita_61@yahoo.com

Dr. Ashish Oberoi

He is currently serving as Asst. Professor in Department of Computer Science and Engineering, M.M.Engineering College,MMU Mullana. He Obtained his M.tech (CSE) from Kurushetra University and he had completed Ph.D (CSE) from MM Engineering College, MM University, Mullana (Ambala).He has about 6 years of teaching experience. He has published more than 16 research papers in International and Indian Journals and Conferences. Email: a_oberoi01@yahoo.co.in

Nishi Goel

Imagem

Table 1: Comparative Results of Proposed Algorithm for Forged Image of Taj

Referências

Documentos relacionados

Ainda que o incorporador opte por aproveitar o pavimento térreo, o Plano Diretor Desenvolvimento Urbano Ambiental (PDDUA) de Porto Alegre trará outro desincentivo, pois se

grego é, assim, a estranha síntese entre a forma e o informe, de tal modo que se descobre como sendo o próprio mundo da arte, sem que nunca se perca a visão de que “a sua

recognition motif) Regulação de genes Núcleo / Citosol A4I7Q0 Putativa fenilalanil-tRNA sintetase cadeia alfa Tradução Citosol A4I7Q3 Superoxido dismutase (SODB1,

If we believe that the visual imagery in Blue Travel reproduces meta-codes that shape the society in which this visual discourse is produced, thus we need to conclude that

[r]

This project’s goal was to research whether an image analysis approach to automatically detect third Purkinje reflections could help provide adequate fixation target location

A abordagem de Stokes (2005) foi complementada por O’Connor e Ayres (2005), que destacaram três etapas no processo de pesquisa e desen- volvimento de produtos novos para o mercado:

Figura 4 - Estrutura Institucional programa Minha Casa, Minha Vida...26 Figura 5 - Quadro esquemático com fundamentação teórica da seção Instituições e governança