Skip to main content
Log in

Localize the Copy-Move Forged Region of an Image Using Improved SIFT

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

With the advancement in technology, digital images have become a very popular source of information. But this source of information is also being used to mislead people and society by altering the original image. One of the ways through which digital images are tampered with is the copy-move forgery method, wherein a part of an image is copied and pasted into another area inside the same image. To avoid and prevent any kind of anomalies, this paper focuses on ways to detect this copy and move forgery in an image using the keypoint-based approach in an efficient manner. The methodology involves detecting key points using Improved Scale Invariant Feature Transform (SIFT) based on which features are identified. Within the isolated descriptors, the deployed K-Nearest Neighbor (K-NN) classifier determines the closest match. Now in order to remove the outliers present in the features, Hierarchical Clustering is used to cluster similar descriptors. Experimental result has proved this methodology to be effective in detecting the forgery in an image for different kinds of related transformations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Abd Warif NB, et al. Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl. 2016;75:259–78.

    Article  Google Scholar 

  2. Agrawal M, Konolige K, Blas MR. Censure: Center surround extremas for realtime feature detection and matching. In: Computer Vision–ECCV 2008: 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part IV 10. Springer. 2008;102–115.

  3. Alkawaz MH, et al. Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Appl. 2018;30:183–92.

    Article  Google Scholar 

  4. Ansari MD, Ghrera SP, Tyagi V. Pixel-based image forgery detection: a review. IETE J Educ. 2014;55:40–6.

    Article  Google Scholar 

  5. Ardizzone E, Bruno A, Mazzola G. Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur. 2015;10:2084–94.

    Article  Google Scholar 

  6. Bailo O, et al. Efficient adaptive non-maximal suppression algorithms for homogeneous spatial keypoint distribution. Pattern Recogn Lett. 2018;106:53–60.

    Article  Google Scholar 

  7. Baratloo A, et al. Part 1: simple definition and calculation of accuracy, sensitivity and specificity. Archives of Academic Emergency Medicine; 2015.

    Google Scholar 

  8. Bay H, Tuytelaars T, Van Gool L. Surf: speeded up robust features. Lect Notes Comput Sci. 2006;3951:404–17.

    Article  Google Scholar 

  9. Christlein V, et al. An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur. 2012;7:1841–54.

    Article  Google Scholar 

  10. Dhanaraj RS, Sridevi M. An efficient technique to extricate keypoints from a digital image. In: Journal of Physics: Conference Series. Vol. 1921. 1. IOP Publishing. 2021;012068.

  11. Diwan A, et al. Keypoint based comprehensive copy-move forgery detection. IET Image Proc. 2021;15:1298–309.

    Article  Google Scholar 

  12. Dixit A, Gupta RK. Copy-move image forgery detection a review. Int J Image Graph Signal Process (IJIGSP). 2016;8:29–40.

    Article  Google Scholar 

  13. Dixit R, Naskar R. Review, analysis and parameterisation of techniques for copy- move forgery detection in digital images. IET Image Proc. 2017;11:746–59.

    Article  Google Scholar 

  14. Fowdur TP, Baulum BN, Beeharry Y. Performance analysis of network traffic capture tools and machine learning algorithms for the classification of applications, states and anomalies. Int J Inf Technol. 2020;12:805–24.

    Google Scholar 

  15. Goutte C, Gaussier E. A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In: Advances in Information Retrieval: 27th European Conference on IR Research, ECIR 2005, Santiago de Compostela, Spain, March 21-23, 2005. Proceedings 27. Springer. 2005;345–359.

  16. Han Y, Chen P, Meng T. Harris corner detection algorithm at sub-pixel level and its application. In: 2015 International Conference on Computational Science and Engineering. Atlantis Press. 2015;133–137.

  17. Hassan SI, et al. Partitioning and hierarchical based clustering: a comparative empirical assessment on internal and external indices, accuracy, and time. Int J Inform Technol. 2020;12:1377–84.

    Google Scholar 

  18. Huang H-Y, Ciou A-J. Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation. EURASIP J Image Video Process. 2019;2019:1–16.

    Article  Google Scholar 

  19. Amila J, Jasmin V. Image feature matching and object detection using bruteforce matchers. In,. International Symposium ELMAR. IEEE. 2018;2018:83–6.

  20. Kanwal N, et al. A keypoint based technique to detect localize copy move forgery in digital images. Multimed Tools Appl. 2020;79:12829–46.

    Article  Google Scholar 

  21. Kapse AS, et al. Digital image security using digital watermarking. Int Res J Eng Technol. 2018;5:163–6.

    Google Scholar 

  22. Lee J-C. Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent. 2015;31:320–34.

    Article  Google Scholar 

  23. Li Y, Zhou J. Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur. 2018;14:1307–22.

    Article  Google Scholar 

  24. Li Y, et al. Image operation chain detection with machine translation framework. IEEE Trans Multimed. 2022. https://doi.org/10.1109/TMM.2022.3215000.

    Article  Google Scholar 

  25. Lowe DG. Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision. Vol. 2. IEEE. 1999;1150–1157.

  26. Mahmood T, et al. Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int. 2017;279:8–21.

    Article  Google Scholar 

  27. Mahmood T, et al. Copy-move forgery detection technique for forensic analysis in digital images. Math Prob Eng. 2016. https://doi.org/10.1155/2016/8713202.

    Article  Google Scholar 

  28. Mittal K, Aggarwal G, Mahajan P. Performance study of K-nearest neighbor classifier and K-means clustering for predicting the diagnostic accuracy. Int J Inf Technol. 2019;11:535–40.

    Google Scholar 

  29. Mohamed Mursi MF, Salama MM, Habeb MH. An improved SIFT-PCAbased copy-move image forgery detection method. Int J Adv Res Comput Sci Electron Eng (IJARCSEE). 2017;6:23–8.

    Google Scholar 

  30. Murtagh F, Contreras P. Algorithms for hierarchical clustering: an overview. Wiley Interdiscip Rev. 2012;2:86–97.

    Google Scholar 

  31. Nielsen F. Introduction to HPC with MPI for data science. Springer; 2016.

    Book  Google Scholar 

  32. Park J, et al. Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry. 2020;12:492.

    Article  Google Scholar 

  33. Prakash C, et al. Keypoint-based passive method for image manipulation detection. Cogent Eng. 2018;5:1523346.

    Article  Google Scholar 

  34. Pun C-M, Chung J-L. A two-stage localization for copy-move forgery detection. Inf Sci. 2018;463:33–55.

    Article  MathSciNet  Google Scholar 

  35. Al-Qershi OM, Khoo BE. Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int. 2013;231:284–95.

    Article  Google Scholar 

  36. Raju PM, Nair MS. Copy-move forgery detection using binary discriminant features. J King Saud Univ-Comput Inform Sci. 2022;34:165–78.

    Google Scholar 

  37. Roy A, Karforma Sunil. A survey on digital signatures and its applications. J Comput Inform Technol. 2012;3:45–69.

    Google Scholar 

  38. Shivakumar BL, Santhosh Baboo S. Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues (IJCSI). 2011;8:199.

    Google Scholar 

  39. Shivashankara S, Srinath S. Signer independent real-time hand gestures recognition using multi-features extraction and various classifiers. Int J Inform Technol (BJIT). 2020. https://doi.org/10.1007/s41870-020-00463-3.

    Article  Google Scholar 

  40. Sun Y, Ni R, Zhao Y. Nonoverlapping blocks based copy-move forgery detection. Secur Commun Netw. 2018;2018:1–11.

    Google Scholar 

  41. Sunitha K, Krishna AN. Efficient keypoint based copy move forgery detection method using hybrid feature extraction. In: 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). IEEE. 2020;670–675.

  42. Suresh G, Rao CS. Localization of copy-move forgery in digital images through differential excitation texture features. Int J Intell Eng Syst. 2019. https://doi.org/10.22266/ijies2019.0430.05.

    Article  Google Scholar 

  43. Taunk K et al. A brief review of nearest neighbor algorithm for learning and classification. In: 2019 International Conference on Intelligent Computing and Control Systems (ICCS). IEEE. 2019;1255–1260.

  44. Thirunavukkarasu V, et al. Non-intrusive forensic detection method using DSWT with reduced feature set for copy-move image tampering. Wireless Pers Commun. 2018;98:3039–57.

    Article  Google Scholar 

  45. Tralic D et al. CoMoFoD-New database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE. 2013;49–54.

  46. Walia S, Kumar K. Digital image forgery detection: a systematic scrutiny. Aust J Forensic Sci. 2019;51:488–526.

    Article  Google Scholar 

  47. Wang L. Research and implementation of machine learning classifier based on KNN. In: IOP Conference Series: Materials Science and Engineering. Vol. 677. 5. IOP publishing. 2019;052038.

  48. Wu Y, Ma Y, Wan S. Multi-scale relation reasoning for multi-modal visual question answering. Signal Process Image Commun. 2021. https://doi.org/10.1016/j.image.2021.116319.

    Article  Google Scholar 

  49. Wu Y, et al. Digital twin of intelligent small surface defect detection with cyber-manufacturing systems. ACM Trans Internet Technol. 2022. https://doi.org/10.1145/3571734.

    Article  Google Scholar 

  50. Wu Y, et al. Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Trans Industr Inf. 2023;19:2089–98. https://doi.org/10.1109/TII.2022.3194590.

    Article  Google Scholar 

  51. Xiong F, et al. SMDS-Net: model guided spectral-spatial network for hyperspectral image denoising. IEEE Trans Image Process. 2022;31:5469–83. https://doi.org/10.1109/TIP.2022.3196826.

    Article  Google Scholar 

  52. Yang B, et al. A copy-move forgery detection method based on CMFD-SIFT. Multimed Tools Appl. 2018;77:837–55.

    Article  Google Scholar 

  53. Yang H-Y, et al. Copy-move forgery detection based on adaptive keypoints extraction and matching. Multimed Tools Appl. 2019;78:34585–612.

    Article  Google Scholar 

  54. Ye X, et al. 3-Net: feature fusion and filtration network for object detection in optical remote sensing images. Remote Sens. 2020. https://doi.org/10.3390/rs12244027.

    Article  Google Scholar 

  55. Zhang Y, et al. Image-splicing forgery detection based on local binary patterns of DCT coefficients. Secur Commun Netw. 2015;8:2386–95.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachel Selva Dhanaraj.

Ethics declarations

Conflict of Interest

The authors declare that they have no known competing financial interests that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Research Trends in Computational Intelligence” guest edited by Anshul Verma, Pradeepika Verma, Vivek Kumar Singh and S. Karthikeyan.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhanaraj, R.S., Sridevi, M. Localize the Copy-Move Forged Region of an Image Using Improved SIFT. SN COMPUT. SCI. 5, 71 (2024). https://doi.org/10.1007/s42979-023-02388-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02388-7

Keywords

Navigation