Deep Studying Signature for Obstruction obscure in Copy Move Image Forgeries
Deep Studying Signature for Obstruction obscure in Copy Move Image Forgeries |
||
|
||
© 2022 by IJETT Journal | ||
Volume-70 Issue-10 |
||
Year of Publication : 2022 | ||
Authors : S. Shashikala, G. K. Ravikumar |
||
DOI : 10.14445/22315381/IJETT-V70I10P225 |
How to Cite?
S. Shashikala, G. K. Ravikumar, "Deep Studying Signature for Obstruction obscure in Copy Move Image Forgeries," International Journal of Engineering Trends and Technology, vol. 70, no. 10, pp. 262-270, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I10P225
Abstract
Digital image tampering and counterfeiting can be done precisely with advanced photo editing tools available with various malicious intentions. It becomes necessary to verify the integrity of the image as images are becoming the information source in various computer-aided applications. Copy move counterfeits are created by copying a slice from one region of the image to another region. The current techniques for detecting copy-move counterfeits fail in the presence of partial occlusion or partial distortion created to falsify detection. This work proposes a deep learning signature to solve this problem. Deep learning signature is created using a probabilistic distribution function of occlusions. The coarse forgery regions are detected with scale-invariant feature transform-based keypoint matching. Deep learning signature matches the coarse forgery regions to detect the partially occluded copy move counterfeits.
Keywords
Copy-move forgery, Coarse forgery regions, Deep learning signature, Partially occluded counterfeit.
Reference
[1] Mallonee, L, “ Infamously Altered Photos, Before and After Their Edits,” Wired, 2015.
[2] Wikipedia Contributors, “ List of Photo Manipulation Controversies,” 2019. Wikipedia.
[3] Allbeson, T.; Allan, S, “ The War of Images in the Age of Trump,” in Trump’s Media War; Happer, C., Hoskins, A., Merrin, W., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2019.
[4] Westerlund, Mika, “ The Emergence of Deepfake Technology,” A Review. Technology Innovation Management Review, vol. 9, pp. 39-52, 2019.10.22215/Timreview/1282.
[5] Islam, M.M.; Karmakar, G.; Kamruzzaman, J.; Murshed, M. A , “Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images,” Electronics, vol. 9, pp. 1500, 2020.
[6] R. Cristin, J. P. Ananth and V. Cyril Raj, “Illumination-Based Texture Descriptor and Fruitfly Support Vector Neural Network for Image Counterfeit Detection in Face Images,” In IET Image Processing, vol. 12, no. 8, pp. 1439-1449, 2018.
[7] Y. Guo, X. Cao, W. Zhang and R. Wang, “Fake Colorized Image Detection," In IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1932-1944, 2018.
[8] H. Li, W. Luo, X. Qiu and J. Huang, “ Image Counterfeit Localization Via Integrating Tampering Possibility Maps," In IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1240-1252, 2017.
[9] J. H. Bappy, C. Simons, L. Nataraj, B. S. Manjunath and A. K. Roy-Chowdhury, “Hybrid LSTM and Encoder-Decoder Architecture For Detection of Image Forgeries,” In IEEE Transactions on Image Processing, vol. 28, no. 7, pp. 3286-3300, 2019.
[10] B. Chen, M. Yu, Q. Su, H. J. Shim and Y. Shi, “Fractional Quaternion Zernike Moments For Robust Color Image Copy-Move Counterfeit Detection,” IEEE Access, vol. 6, pp. 56637-56646, 2018.
[11] Y. Li and J. Zhou, “ Fast and Effective Image Copy-Move Counterfeit Detection Via Hierarchical Feature Point Matching,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1307-1322, 2019.
[12] O. Mayer and M. C. Stamm, “Accurate and Efficient Image Counterfeit Detection Using Lateral Chromatic Aberration,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 7, pp. 1762-1777, 2018.
[13] X. Bi and C.-M. Pun, “ Fast Reflective Offset-Guided Searching Method For Copy-Move Forgery Detection,” Information Sciences, vol. 418–419, pp. 531–545, 2017.
[14] X.-Y. Wang, S. Li, Y.-N. Liu, Y. Niu, H.-Y. Yang, and Z.-L Zhou, “A New Keypoint-Based Copy-Move Forgery Detection For Small Smooth Regions,” Multimedia Tools and Applications, vol. 76, no. 22, pp. 23353–23382
[15] S. Teerakanok and T. Uehara, “Copy-Move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research,” in Proceedings COMPSAC,pp. 365–369, 2018.
[16] M. Emam, Q. Han, Q. Li, and H. Zhang, “ A Robust Detection Algorithm for Image Copy-Move Forgery in Smooth Regions,” in Proc. ICCSS, London, U.K, pp. 119–123, 2017.
[17] Singh, B., Sharma, D.K, “ Predicting Image Credibility in Fake News Over Social Media Using A Multi-Modal Approach,” Neural Computer & Application, 2021.
[18] Zhang, Weiguo, “A Novel Counterfeit Feature Extraction Technique For Exposing Face-Swap Images Based on Deep Learning and Error Level Analysis,” Entropy (Basel, Switzerland), vol. 22, no. 2, pp. 249, 2020.
[19] Ghoneim, A., Muhammad, G., Amin, S. U., & Gupta, B, “ Medical Image Forgery Detection for Smart Healthcare,” IEEE Communications Magazine, vol. 56, no. 4, pp. 33-37, 2018.
[20] Thajeel, Salam & Shakir, Ali & Rasheed, Waleed & Sulong, Ghazali, “ Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms,” KSII Transactions on Internet and Information Systems, vol. 13, pp. 4005-4025, 2019. 10.3837/Tiis.2019.08.010.
[21] Liu, Y., Q. Guan, and X. Zhao, “ Copy-Move Forgery Detection Based on Convolutional Kernel Network,” Multimedia Tools and Applications, vol. 77, no. 14, pp. 18269-18293, 2018.
[22] Chou, C.-L. and J.-C. Lee, “Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns,” in Proceedings of Springer on International Conference on Security With Intelligent Computing and Big-Data Services, vol. 733, pp 47-56, 2018.
[23] Mahmood, T., Et Al, “A Robust Technique For Copy-Move Forgery Detection and Localization in Digital Images Via Stationary Wavelet and Discrete Cosine Transform,” Journal of Visual Communication and Image Representation, vol. 53, pp. 202-214, 2018.
[24] Hosny, K.M., H.M. Hamza, and N.A. Lashin, "Copy-Move Forgery Detection of Duplicated Objects Using Accurate PCET Moments and Morphological Operators," The Imaging Science Journal, vol. 66, no. 6, pp. 330-345
[25] Al-Moadhen, Ahmed Abdulhadi Ahmed & Ridha, Mustafa & Khayeat, Ali, “ Splicing Detection in Color Image Based on Deep Learning of Wavelet Decomposed Image,” AIP Conference Proceedings, 2290. 10.1063/5.0027442.
[26] Rodriguez-Ortega, Yohanna & Ballesteros, Dora & Renza, Diego, “Copy-Move Forgery Detection (CMFD) Using Deep Learning For Image and Video Forensics,” Journal of Imaging, 7. 59. 10.3390/Jimaging7030059.
[27] Alhussain Akoum, Samia Bahlak, Nagham Abou Daher, "Image Forgery Analyse and Detection," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 8, pp. 8-12, 2021. Crossref, Https://Doi.Org/10.14445/23488387/IJCSE-V8I8P102
[28] D. Terzopoulos “Deformable Models,” The Visual Computer, vol. 4, pp. 306–331, 1988.
[29] Balaji V , Ajith Kumar P, Kiren Aananth A, Gunasekar N and Ciyamala Kushbu S, "Forgery Detection in Documents," SSRG International Journal of Electronics and Communication Engineering, vol. 5, no. 5, pp. 15-20, 2018. Crossref, Https://Doi.Org/10.14445/23488549/IJECE-V5I5P104
[30] K. Mikolajczyk, C. Schmid, “A Performance Evaluation of Local Descriptors,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 10, pp. 1615–1630, 2005.
[31] M. Bro-Nielsen, “Active Nets and Cubes,” IMM, Tech. Report, 1994
[32] A. B. Z. Abidin, H. B. A. Majid, A. B. A. Samah and H. B. Hashim, “ Copy-Move Image Forgery Detection Using Deep Learning Methods: A Review,” 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1-6, 2019.
[33] E. Silva, T. Carvalho, A. Ferreira, A. Rocha, “Going Deeper Into Copy-Move Forgery Detection: Exploring Image Telltales Via Multi-Scale Analysis and Voting Processes,” Journal of Visual Communication and Image Representation, vol. 29, pp. 16–32 , 2015.
[34] Huang, HY., Ciou, AJ, “Copy-Move Forgery Detection for Image Forensics Using the Superpixel Segmentation and the Helmert Transformation,” Journal on Image and Video Processing, vol. 68, 2019.
[35] A. B. Z. Abidin, H. B. A. Majid, A. B. A. Samah and H. B. Hashim, “ Copy-Move Image Forgery Detection Using Deep Learning Methods: A Review,” 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1-6, 2019.
[36] D.G. Lowe, “Distinctive Image Features From Scale-Invariant Keypoint,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, 2004.