You are on page 1of 3

International Journal of Futuristic Trends in Engineering and Technology Vol.

4 (01), 2014

Exposing Digital Forgeries Detecting by Different Techniques-Survey


Nidhi S. Bhatiya
Department of Computer Science and Technology, Parul Institute of Engg. and Tech., Limda ,Vadodara bhatiyanidhi2010@gmail.com
Abstract - Image forgery detection is an important research area in world. Digital image plays a very important role in many applications. But at the same time the image forged has also increased for a serious threat to the security of digital image. Using manipulation softwares digital image has become a serious problem that image forgeries image alteration often done. To determine whether a digital image is original or altered is big problem or say challenge. In this work observed the effect of different techniques .Our main focus is improving the copy move image forgery detection object to performance and to improve accuracy if the pasted region has transformations like rotation and translation or region has an very small area using efficient approach by neighbourhood method. Keywords image Forgery, Copy Move Forgery, Copy Create Forgery.

I. INTRODUCTION Digital image plays a very important role in many applications, but at the same time image alteration has also increased for a serious threats to the security of digital image. Image forgery detection is an important research area. Using editing softwares digital image has become serious problem that image forgeries image alteration is often done. To determine whether a digital image is altered is challenging problem. The application in which image forgery detection technique are used journalism, scientific publication, forensic science, glamour photography. Therefore, how we find out the image is true or not is very important and for that require detection of digital image. Image forgery refers to malicious image manipulation with intent to mislead the perception of observers. The image forgery approaches are basically classified as Active approach and passive approach [1]Both approaches use different technique and they further classified as: Watermarking(Active) and Tempering detection (Passive). There are many ways to categorize the image tampering, and generally, we can tell that some usually performed operations in image tampering are: 1. Deleting or hiding a region in the image; 2. Adding a new object into the image; 3. Misrepresenting the image information. Watermarking technique works by dividing an image into blocks and watermarking each block with a transparent, robust watermark that sensitively depends on a secret key
Akshar Publication 2014

(cameras ID) and continuously on the image. The watermarking method is a frequency based spread spectrum techniques. Digital watermarking can be used as a means for efficient tamper detection. One could mark small blocks of an image with watermarks that depend on a secret ID of that particular digital camera and later check the presence of those watermarks. The fragility of the watermark against various image distortions determines our ability to measure the extent of tampering. The drawback of this approach is that a watermark must be inserted at the time of recording which would limit this approach to specially equipped digital camera. Tempering detection where tempering is interfering with something so as to make unauthorized alteration or damages to it. Digital image tempering is very much similar in nature to that of the conventional photo fakeries where the conventional photographs are replaced by their digital counterparts. Image tempering again can be performed either by making changes to the context of the scene elements or without the change of the context. The image tempering methods according to the manipulation process used are further divided into three major classes such as Retouching, Splicing, and Copy move or cloning. These manipulations generally involve detection or addition of scene element of an image or combination of scene from multiple images. In Tempering detection includes copy move forgery detection and copy-create forgery detection. Discuss of all of this cloning techniques with using such kind of methods to detect forged object. II. COPY MOVE FORGERY Cloning detection involves copy paste a part of the same image to cover an object of the original image is one of the most commonly used image manipulation technique. This is usually performed with the intention to make an object disappear from the image by covering it with a segment copied from another part of the image. Clone can be placed any where into the image and in any shape or size it is impossible to detect the clone area. It is not possible to computationally to make an exhaustive search of all size to all possible image locations. Copy move forgery is a correlation between the original image segment and the pasted one which
http://www.ijftet.wix.com/research

48

International Journal of Futuristic Trends in Engineering and Technology Vol. 4 (01), 2014

can be used as a basis for successful detection of this type of forgeries. Usually the forgery will be saved in JPEG format and because the editing software the segment may not match exactly but only approximately. For that formulate the basic terms to detection of the copy move forgery which include the detection algorithm for that include some requirements. 1. Require algorithms should be allowing approximation match of the small image segments. 2. Time should be reasonable when introducing some false positives (FP). (i.e. detect retouching parts) Example of the copy move forgeries are given in below Figures which shows the editing into the original image by placing the person in to bottom right in second image.

Counts a Four. (Right)

For satisfy these requirements two algorithms are developed for copy move forgery. 1. Exact match 2. Based on appropriate match. III. COPY CREATE FORGERY In copy create forgery, is a type of tempering detection which used two or more images to make a fake image. According to manipulation process require number of divided blocks to identify cloning area. For that apply some manipulation process for more no of block to detect the forged object. Forgery can be placed in kinds of contrast enhancement, transformation operations, re-sampling and performance evaluation .The copy-create forgery given the two original images used to make a fake image which shown in figure:1.3 in copy create forgery copy paste a part of the one image and same from another image paste a object and make a fake image. So the fake image can divided into the number of blocks. Blocks can be used for comparing neighborhood pixels to detect the forged object. This is usually done in order to conceal certain details or to duplicate certain aspects of an image.

Fig. 1. Original Image (Left), Altered Image(Right).[4]

An example of the method's output is shown in the image below. Shown in the figure the original version of the test image/original image (left), and its forged version (bottomright). Another example of the forgery in which the cats in to the original image there are only two and a fake image the original image copied and the counts are four. So that type of forgery detection is very important when the image cannot identify if it is original or modified

Fig. 3. The Two Images Used for Creating the Forged Image [3]

CONCLUSION Many of research is done on active and passive temper detection techniques and still a lot of work is going on to detect successful tempering in digital images. With the development of a new image authentication and tamper detection technique, newer variant of detection tempering method are more challenging. ACKNOWLEDGMENT The work on this paper was supported by USC-SIPI database. Which is the University of Southern California in the subject of Signal and Image Processing. include in this database the collection of digitized image. It is maintained primarily to support in Image processing, image analysis and machine.
http://www.ijftet.wix.com/research

Fig. 2. Original Image with Two Cats (Left), With Altered Image

Akshar Publication 2014

49

International Journal of Futuristic Trends in Engineering and Technology Vol. 4 (01), 2014

REFERENCES
[1] S.Devimahalaxmi,K.Vijyalakshmi,,S.Priyadarshini,Digital image forgery detection and estimation by exploring basic image manipulation.,ELSVIER,2013. [2] Image watermarking for tamper detection,2011 [3] Somayeh Sadeghi, Hamid A. Jalab and Sajjad Dadkhah,Efficient CopyMove Forgery Detection for Digital Images,2012. [4] Image Processing-wikipedia. [5] S.Murali,Govindraj B. Chittapur,Prabhakara H. S and Basavaraj S. Anami,Comparision and Analysis of Photo Image Forgery Detection Techniques.,IJCSA,2012. [6] Shrishail Math R. C. Tripathi,Digital Forgeries:Problems and Challenges,2010 [7] Vrizlynn L.L. Thing, Yu Chen, Carmen Cheh,IEEE,2012.

Akshar Publication 2014

http://www.ijftet.wix.com/research

50

You might also like