Professional Documents
Culture Documents
art ic l e i nf o
a b s t r a c t
Article history:
Received 8 March 2016
Received in revised form
14 June 2016
Accepted 13 September 2016
Available online 13 September 2016
The authenticity and reliability of digital images are increasingly important due to the ease in modifying
such images. Thus, the capability to identify image manipulation is a current research focus, and a key
domain in digital image authentication is Copy-move forgery detection (CMFD). Copy-move forgery is
the process of copying and pasting from one region to another location within the same image. In this
paper, we survey the recent developments in CMFD, and describe the entire CMFD process involved.
Specically, we characterize the common CMFD workow of feature extraction and matching process
using block or keypoint-based approaches. Instead of listing the datasets and validations used in the
literature, we also categorize the types of copied regions. Finally, we also outline a number of future
research directions.
& 2016 Elsevier Ltd. All rights reserved.
Keywords:
Copy-move forgery
Image forgery
Blind detection
Copied region
Image forensics
Contents
1.
2.
3.
4.
5.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Image forgery detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Copy-move forgery detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
3.1.
Workow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Block-based approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
4.1.
Block-based feature extraction techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
4.1.1.
Frequency transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
4.1.2.
Texture and intensity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
4.1.3.
Moments invariant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
4.1.4.
Log polar transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
4.1.5.
Dimension reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
4.1.6.
Others. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
4.2.
Block-based matching techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
4.2.1.
Sorting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
4.2.2.
Hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
4.2.3.
Correlation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
4.2.4.
Euclidean distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
4.2.5.
Others. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Keypoint-based approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
5.1.
Keypoint-based feature extraction techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
5.1.1.
SIFT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Corresponding author at: Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249-0631, USA.
E-mail addresses: nurbaqiyah@siswa.um.edu.my (N.B.A. Warif), ainuddin@um.edu.my (A.W.A. Wahab), yamani@um.edu.my (M.Y.I. Idris),
roziana.ramli@gmail.com (R. Ramli), rosli_salleh@um.edu.my (R. Salleh), shamshirband@um.edu.my (S. Shamshirband), raymond.choo@fulbrightmail.org (K.-K. Choo).
http://dx.doi.org/10.1016/j.jnca.2016.09.008
1084-8045/& 2016 Elsevier Ltd. All rights reserved.
260
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
5.1.2.
Harris corner detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
5.1.3.
SURF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
5.2.
Keypoint-based matching techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
5.2.1.
Nearest neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
5.2.2.
Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
6. Publicly available datasets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
7. Types of copied regions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
7.1.
Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
7.2.
Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
7.3.
Creature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
7.4.
Letter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
8. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
8.1.
Data inconsistencies and high scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
8.2.
Limitations in existing computer architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
8.3.
Potential of big data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
9. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
1. Introduction
20
15
10
Journal
Conference
5
0
2007 2008 2009 2010 2011 2012 2013 2014
Years
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
261
Table 1
List of review articles on CMFD techniques.
Author (s)
Descriptions
Contributions
Evaluated performance of popular feature extraction techniques in CMFD for various post processing scenarios.
Findings
Keypoint-based features (SIFT and SURF) can be performed very efciently with low computational load. However, it is sensitive to lowcontrast regions and repetitive image content.
Five features (DCT, DWT, KPCA, PCA and Zernike) outperformed keypoint-based features with high performance. Of these techniques, the
authors recommended Zernike due to its relatively small memory footprint.
Contributions
Categorized the matching techniques in CMFD into brute force and block-based.
The block-based was further classied into spatial domain, transform domain, and post processing invariant method.
Findings
The DCT and PCA block-based techniques exhibit a high computational complexity.
The DCT is inapplicable when considering highly textured and small tampered regions.
Generally, most of the techniques are not responsive to the geometric transformations, such as rotation and scaling.
Contributions
Categorized the features extraction techniques in CMFD into eight groups (DCT, Log-Polar Transform, Texture & Intensity, Invariant keypoint, Invariant moment based, PCA, SVD and Others).
Findings
The complexity and execution time of the CMFD could be reduced when a smaller size of feature vectors is employed.
The robustness of the CMFD increased by adopting feature extraction techniques that are invariant to a wider range of attacks such as
scaling, rotation and etc.
Most of the existing CMFD techniques are time consuming.
on optical and sensor regularities. An overview of the image forgery detection categories is depicted in Fig. 2.
Digital Watermark
ACTIVE
Digital Signature
Copy-Move
Dependent
Splicing
IMAGE FORGERY
DETECTION
Tampering
Compression
Independent
PASSIVE
Re-Sampling
Inconsistencies
Optical Regularities
Source Device
Sensor Regularities
262
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Fig. 3. An example of copy-move forgery (a) original image (b) forged image. The grass is used to manipulate the image with the intention of hiding the house.
3.1. Workow
In CMFD, the common workow consists of four stages,
namely: pre-processing, feature extraction, matching and visualization (see Fig. 4). Each stage is now discussed as follows.
The rst stage of CMFD process is typically pre-processing,
which is optional. In pre-processing, one seeks to improve the
image data by suppressing undesired distortions or enhancing the
image features (Miljkovi, 2009). The conversion of RGB (Red,
Green, and Blue) color channels to grayscale appears to be the
most frequently used method used in pre-processing (see (Vincent
Christlein and E.A.P., 2010; Amerini et al., 2011; Ardizzone et al.,
2010, 2009; Cao et al., 2012; Huang et al., 2008, 2011; Li et al.,
2012; Li and Yu, 2010; Lynch et al., 2013; Muhammad et al., 2012;
Myna et al., 2008; Peng et al., 2011; Ryu et al., 2013; Wang et al.,
2012; Yang et al., 2013; Yang and Huang, 2009; Zhang et al., 2008;
Zhao and Guo, 2013). In the conversion, the RGB channels are
merged using I = 0.228R + 0.587G+0. 114B to represent the
grayscale component. Alternatively, RGB channels can be converted to YCbCr color system to operate either on the luma
(Y) information or on chrominance components (Cb and Cr) (see
Hussain et al., 2014, 2013a, 2013b, 2012; Muhammad et al., 2013;
Wu et al., 2010).
The color conversions are performed to reduce dimensionality
of the data and increase the distinctive visual features in an image.
Indirectly, the complexity of processing can be reduced and the
speed of processing will be increased. Aside from the color
Table 2
Types of attack that have been classied.
Attacks
Example operations
Descriptions
Intermediate/geometric transform
Rotating, scaling,
mirror reection,
translation
JPEG compression,
blurring, Gaussian
noise
Post-processing
conversion method, block division has been used as part of preprocessing in CMFD. The block division is a method that divides
the image into a number of blocks either using the overlap or nonoverlap approach. The block division can reduce the computational time for matching process to nd the similar feature vector
in an image compared to exhaustive search.
After pre-processing, the feature extraction allows one to select
relevant information that represent the characteristics of interest
in the image (Chora, 2007). Common methods of feature extraction reported in the literature are Discrete Cosine Transform (DCT),
Discrete Wavelet Transform (DWT), log polar transform, invariant
keypoint, and texture and intensity.
Feature extraction is followed by the matching stage that seeks
out similarities between two or more features in the image. In this
stage, manipulations of copy-move forgery in the image are determined. The execution of matching techniques is mainly by
block-based or keypoint-based depending on the extracted features. For example, DCT features are matched by blocks while the
invariant keypoint features are matched by distance of the nearest
neighbor from all points in the feature space.
Finally, the process of CMFD can be visualized to display and
localize the tampered regions in the forged image. The visualization of block-based approach is usually presented by coloring or
mapping the region of the matching blocks. On the other hand, the
keypoint-based approach is commonly displayed by line transformation between each matching point. Both visualization can be
further rened by morphology operation using the shapes properties of the features such as contours, skeletons and convex hulls
(see Amerini et al., 2013; Cao et al., 2012; Jaberi et al., 2013a,
2013b; Li et al., 2012; Pan and Lyu, 2010; Peng et al., 2011; Yang
and Huang, 2009; Zhang et al., 2008; Zhao and Guo, 2013).
In the next two sections, CMFD techniques are organized into
two approaches, namely: block-based and keypoint-based.
4. Block-based approach
The block-based approach splits an image into blocks of square
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
263
Block-based
16
14
14
12
10
10
8
5
6
4
2
2007
2008
5
3
0
2009
2010
2011
2012
2013
2014
2012
2013
2014
(a)
Feature Extraction
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
2007
2008
2009
2010
2011
Frequency Transform
Moments Invariant
Dimension Reduction
Others
(b)
Matching Techniques
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
2007
2008
Sorting
2009
Hash
2010
2011
Euclidean Distance
2012
Correlation
2013
2014
Others
(c)
Fig. 6. Publications indexed by WOS for block-based approach between 2007 and
2014 (a) Literature of block-based approach by year (b) Breakdown of the blockbased approach into six different types of feature extraction techniques
(c) Breakdown of the block-based approach into ve different types of matching
techniques.
264
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Table 3
Publications of block-based approach according to feature extraction techniques.
Feature Extraction Techniques Author (s)
Frequency transform
Moments invariant
Log polar transform
Dimension reduction
Others
Cao et al. (2012), Deng et al. (2012), Huang et al. (2011), Ketenci and Ulutas (2013), Kumar et al. (2013), Li et al. (2008), Li et al. (2012),
Muhammad et al. (2012), Murali et al. (2012), Myna et al. (2008), Peng et al. (2011), Shao et al. (2012), Shin (2013), Yang et al. (2013),
Zhang et al. (2008) and Zhao and Guo (2013)
Ardizzone et al. (2009), Bravo-Solorio and Nandi (2011), Davarzani et al. (2013), Gan and Zhong (2014), Hsu and Wang (2012), Kuznetsov Andrey Vladimirovich (2014), Lin et al. (2009), Lynch et al. (2013), Singh and Raman (2012), Ulutas and Ulutas (2013) and Uluta
et al. (2013)
Bilgehan and Uluta (2013), Kashyap and Joshi (2013), Le and Xu (2013), Mahdian and Saic (2007) and Ryu et al. (2013, 2010)
Bayram et al. (2009), Li et al. (2014, 2012), Li and Yu (2010), Li (2013) and Wu et al. (2010)
Ting and Rang-Ding (2009), Yang and Huang (2009) and Zhao (2010)
Liu et al. (2014) and Wang et al. (2012)
Table 4
Six variations of the frequency transform in CMFD and their enhancements.
Author (s)
Details
Advantages
Limitations
DCT
Li et al. (2008)
FWHT
DWT
DyWT
Muhammad et al.
(2012)
Performed a comparison between the approximate (LL) sub band Robust to rotation and jpeg compression.
and detail (HH) sub band from the DyWT techniques.
DyWT is shift invariant compared than
DWT.
Wiener Filter
Implemented the Wiener Filter in the wavelet based image deRobust to JPEG compression, scaling, rotation, Incapable of self-adaptive to adjust the threshold.
noising to extract four features as follows:
adding noise, and blurring.
variance of the pattern noise
signal noise ratio between the de-noised image and the pattern
noise
information entropy
average energy gradient of the original grayscale image
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Technique
265
266
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
4.1.6. Others
Other feature extraction techniques that can be found in the
literature are Multi Scale Auto-convolution (MSA) (Wang et al.,
2012). MSA is determined by vector sequence and invariance to
afne transform. This technique is robust against rotation, Gaussian noise and JPEG compression with the exception of the scaling
operation. Another technique uses features generated from JPEG
block articial grids and local noise discrepancies (Liu et al., 2014).
These features are combined with the image quality score as
coefcient. This technique is effective in detecting copy-move and
splicing forgery, regardless of the JPEG compression ratio of the
input image.
4.2.1. Sorting
Sorting is a technique that orders the features in a certain arrangement. It is a commonly employed technique in the matching
process of block-based approaches. It enhances the computational
complexity during the search of identical values in a large size
image. Hence, an efcient sorting technique is important to
quickly nd the duplicated area by improving the search and
merge algorithms.
The sorting techniques used in matching process for blockbased features include Lexicographical, KD-Tree, and Radix (see
Table 6). Among the sorting techniques, lexicographical is the most
widely employed technique in block-based. The lexicographical
technique commonly detects potentially tampered region through
the adjacent identical pairs of blocks. However, the implementation of lexicographical varies between authors such as the calculations of distance between adjacent blocks and number of
threshold used to dene the tampered area.
The accuracy of lexicographical techniques can also be improved using kd-tree (Christlein et al., 2010). The latter is a nearest
neighbor searching technique, which sorts array of blocks. First,
the technique splits the array into two parts recursively with different dimensions. When the size of the array is smaller or equal
to the neighborhood search size, the iterative processes are terminated. Finally, the neighborhood is analyzed and compared with
a threshold to dene the possible duplicated area. This technique
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
267
Table 5
Summary of matching techniques for block-based approach.
Matching Techniques Author (s)
Sorting
Lexicographical
KD Tree
Radix
Others
Hash
Correlation
Euclidean distance
Others
Ardizzone et al. (2009), Bilgehan and Uluta (2013), Bravo-Solorio and Nandi (2011), Cao et al. (2012), Davarzani et al. (2013), Gan and Zhong
(2014), Huang et al. (2011), Ketenci and Ulutas (2013), Kumar et al. (2013), Le and Xu (2013), Li et al. (2012, 2014), Ryu et al. (2010), Ulutas and
Ulutas (2013), Uluta et al. (2013), Wang et al. (2012), Yang et al. (2013) and Zhao and Guo (2013)
Mahdian and Saic (2007), Ting and Rang-Ding (2009) and Vincent Christlein and E.A.P. (2010)
Lin et al. (2009) and Singh and Raman (2012)
Lynch et al. (2013)
Bayram et al. (2009), Kuznetsov Andrey Vladimirovich (2014), Li and Yu (2010), Li (2013) and Ryu et al. (2013)
Myna et al. (2008), Peng et al. (2011), Shao et al. (2012) and Zhang et al. (2008)
Kashyap and Joshi (2013) and Muhammad et al. (2012)
Akbarpour Sekeh et al. (2013), Hsu and Wang (2012), Li et al. (2008), Li et al. (2012), Liu et al. (2014), Murali et al. (2012), Shin (2013), Wu et al.
(2010) and Zhao (2010)
Table 6
Denition of sorting techniques.
Sorting Techniques Denition
Lexicographical
KD-Tree
Radix
usually used to dene the duplicated regions after sorting is executed (Gan and Zhong, 2014; Peng et al., 2011; Wang et al., 2012).
However, the correlation can be performed independently without
sorting to nd the similarity criterion in the image. The most
commonly deployed correlation technique in CMFD is phase correlation. Normally, the phase correlation identies the template
matching in two similar images. This similarity is represented by a
signicant peak that ranges between 0 and 1. Later, the phase
correlation is adopted to nd the matching within one image
(Shao et al., 2012). The region is identied as potentially tampered
if the value of the correlation peak exceeds the predened
threshold during scanning of the image.
4.2.4. Euclidean distance
Euclidean distance is a measurement of distances between two
vectors in Euclidean space. Similar to correlation, Euclidean distance is often nalized in the manipulated area after the sorting
process (Le and Xu, 2013; Li et al., 2014, 2012; Ryu et al., 2010). It
calculates the distance between similar blocks identied by the
sorting technique to detect the duplication in an image. Muhammad et al. (Muhammad et al., 2012) calculate the distance
between identical blocks and eliminates the sorting process. An
image is suspected of been tampered with if the two blocks is near
to each other with a similar neighborhood (Kashyap and Joshi,
2013).
4.2.5. Others
Other matching techniques include DCT coefcient and clustering. In CMFD, DCT coefcients are commonly utilized in feature
extraction. However, the sum of difference between DCT coefcients can be used as a matching criteria to localized the tampered
area (Shin, 2013). The block is considered tampered if the difference value is equal to 0.0. As a result, the technique signicantly
reduces the computational complexity and feature dimension.
Additionally, a coarse-to-ne approach is applied by using sequential block clustering to enhance the duplicated region detection model (Akbarpour Sekeh et al., 2013). The search space in
block matching is minimized through the clustering technique. In
short, both techniques (DCT coefcient and clustering) signicantly improve the time complexity they eliminate the blockcomparing operations.
5. Keypoint-based approach
Keypoint-based approaches are non block-based, as the block
division is eliminated in pre-processing (see Fig. 8). The keypoint
features extract the distinctive local features such as corners,
blobs, and edge from the image. Each feature is presented with a
268
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Keypoint-based
9
8
7
6
5
4
3
2
1
0
1
0
2007
0
2008
2009
2010
2011
2012
2013
2014
2012
2013
2014
2012
2013
2014
(a)
Feature Extraction
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
2007
2008
2009
SIFT
2010
SURF
2011
Harris
(b)
Matching Techniques
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
2007
2008
2009
2010
2011
(c)
Fig. 9. Publications on keypoint-based approach located on WOS, by (a) year,
(b) feature extraction techniques, and (c) matching techniques.
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Table 7
Publications on feature extraction techniques for keypoint-based approach.
Feature extraction
techniques
Author (s)
SIFT
Harris corner
detector
SURF
Table 8
List of SIFT drawbacks.
No. Drawbacks
1.
2.
3.
4.
et al., 2014).
5.1.2. Harris corner detector
The keypoint techniques is rst introduced in Harris Corner
Detector (Harris and Stephens, 1988) following the SIFT technique.
The detector extracts corners and edges from the regions based on
the local auto-correlation function. It has been shown that Harris
features result in consistencies in natural imagery.
In CMFD, the Harris detector has been studied and explored to
improve SIFT-based techniques (see Fig. 9(b)). As the Harris detector only produces feature points, compatible potential descriptor techniques are combined with the features. Moreover, the
Harris features are enhanced to increase the points reliability in
detecting the forgery. A summary of studies focusing on Harris
features is listed in Table 9. Such techniques are generally found to
be robust to rotation, scale, jpeg compression, noise and blurring.
5.1.3. SURF
SURF technique is initially proposed by Bay and Ess (2008) to
improve the performance of SIFT. The SURF features reduce the
processing time and also feature dimension. SURF-based technique in CMFD is presented by Bo et al. (2010), where they extended
the dimension of Bay's techniques into 128. They demonstrated
that SURF can reduce the false match especially for high resolution
images, while robust to certain transformation and post processing operations. However, this technique is unable to detect a
small copied region in the image. It was later shown that the
SURF-based technique reduces the accuracy although it improves
the processing time in copy-move detection (Mishra et al., 2013).
5.2. Keypoint-based matching techniques
Similarities among the feature points in an image can also be
measured using nearest neighbor. However, due to the high
computational complexity, it is challenging to detect the forgery in
an image. Therefore, the nearest neighbor techniques have been
the subject of active research.
In this section, the nearest neighbor techniques for keypointbased approach are divided into four types, namely: Best Bin First,
2NN, g2NN, and others. Another matching technique for keypointbased introduced in CMFD is clustering technique. The breakdown
of these techniques by year is presented in Fig. 9(c) and the
269
270
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Table 9
Summary of studies on Harris features-based techniques in CMFD.
Author (s)
Feature Point
Kakar and
Sudha
(2012)
Feature descriptor
Outcome
Zhao and Zhao Technique: employ dense Harris feaTechnique: a circle patch around each feature point Resilient to the forgery with the at area and little
(2013)
ture points
are extracted using local binary pattern operators.
visual structures.
Objective: to get a sufcient number of Objective: to be rotation invariant.
feature points with approximately uniform distribution.
Guo et al.
(2013)
Technique: apply Daisy descriptor proposed by Tola Resistant to any diverse types of operations, such as
et al. (2010) and enhanced for rotation invariant.
rotation, scaling, JPEG compression, and Gaussian
noise addition better than SIFT.
Objective: to enhance SIFT descriptor
performance.
Chen et al.
(2013)
Zheng and
Chang
(2014)
Technique: generate a SURF descriptor around each Signicantly improved the Chen et al. (2013) techniHarris point.
que which able to be robust even if the image is
subjected to strong geometric transform and
Objective: to improve the computation speed
degradation.
Table 10
Publications for keypoint-based approach by matching technique.
Matching
techniques
Nearest Neighbor
Best bin rst
2NN
g2NN
Others
Clustering
Author (s)
images since one original image may have more one or more
forged images. Moreover, the accuracy results might not be guaranteed due to certain pixels in the image being falsely detected,
even when the image has been identied as forged. Therefore, a
number of researchers improve the evaluation by validating the
detection per pixel in one image to form the percentage of the
detection in an image. In this case, a set of ground truth images has
to be created in the dataset, particularly to compare with the detected pixels.
Fig. 10 shows examples of results for correctly detected image
and falsely detected image, as compared to the ground truth image. The nal results of the accuracy per pixel will be determined
by obtaining the average percentage of the total images in the
dataset. Unfortunately, the processing time of this evaluation will
increase, although the results are more detailed compared to approaches based on accuracy per image.
In order to calculate the accuracy, commonly used metrics in
CMFD are True Positive Ratio (TPR) and False Positive Ratio (FPR).
These metrics are commonly used in the accuracy per image category, where a good detection technique should maintain a high
TPR while the FPR at the minimum level. The calculation for both
TPR and FPR are presented in Eq. (1).
TPR =
=
#Imagesdetectedasforgedbeingforged
FPR
#Forgedimages
#Imagesdetectedasforgedbeingoriginal
#Originalimages
(1)
Precision =
=
Forgedregion Detectedregion
Recall
Detectedregion
Forgedregion Detectedregion
Forgedregion
(2)
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
271
Table 11
Summary of nearest neighbor techniques in CMFD.
Technique
How it works
Based on a variant of the k-d tree search which index the nearest neighbor for a large
fraction of queries and returns a very close neighbor.
2NN
g2NN
Objective
d1
d2
threshold.
Iterate the 2NN procedure between di /di + 1 until the ratio greater than the threshold. If k is To detect multiple copy-move forgeries in one image.
the value which the procedure stops, each keypoint in correspondence to a distance in (d1,
7.1. Background
Background image is dened as the dissimilarity between the
objects and the surroundings. This type represents the scenes with
variations in luminance and geometry settings instead of objects
(Piccardi, 2004). The background can be a scenery, nature, texture
or color. Normally, homogenous backgrounds are been used to
hide the object appearing in the image. Thus, the requirement of
texture analysis including the intensity, patterns, and color is
needed.
Table 12
Existing publicly available copy-move forgery datasets.
Name
Image size
Total
image
Descriptions
URL
128 128
1845
http://www.ee.columbia.edu/ln/dvmm/down
loads/AuthSplicedDataSet/AuthSplicedDataSet.
htm
200 200
10
374 256
1725
240 160 to
900 600
12614
420 300 to
38882592
48
722 480 to
800 600
220
800 533 to
3888 259
600
2048 1536
2000
512 512
3000 200
260
768 1024
160
http://faculty.ksu.edu.sa/ghulam/Pages/Im
ageForensics.aspx
http://forensics.idealtest.org:8080/index_v1.
html
http://forensics.idealtest.org:8080/index_v2.
html
https://www5.cs.fau.de/research/data/image-ma
nipulation/
http://www.micc.uni.it/downloads/MICC-F220.
zip
http://www.micc.uni.it/downloads/MICC-F600.
zip
http://www.micc.uni.it/downloads/MICCF2000.zip
http://www.vcl.fer.hr/comofod/download.html
original and forged image
applied with translation, rotation, scale, distortion or a combination of them
original and forged image
http://www.grip.unina.it/download/prog/CMFD/
PNG format
CMFDdb_grip.zip
272
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Fig. 10. Examples of detection results for (a) correctly detected image, (b) falsely detected image, in comparison to (c)ground truth image.
the letter in the same alphabet. For instance, digital words have
different fonts while handwritten have diverse forms. In copymove forgery, the letter is copied to change the meaning of the
word or text. Hence, as the text is one medium of communications,
it is possible to have some impacts when the meaning of the image
has been altered.
8. Discussion
7.2. Object
Basically, an object is any physical form that is real and recognizable. Object in an image include architecture (e.g building),
art, shape, plant and lines. The object is copied in the image
generally for manipulating the amount of things while hiding the
unwanted things. Besides, the object copied could change the
forms of the object representation. There is one eld in image
studies which is known as object recognition and is being actively
researched on at the time of this writing. Object recognition in
real-world settings requires local image features that can differentiate from each other. Thus, the features of the copied objects
are easily identied.
7.3. Creature
Although both human and animal could be an object, this
creature type means a group of gures that can move and carry
different behavior. Creature is copied regularly to symbolize the
crowd. It does not necessarily consists of a full gure, as it can be a
part of the gure (e.g. face, eye, and hands). Several recognition
techniques relating to face and behavior detection might be necessary to identify the manipulated areas.
7.4. Letter
The last type of copied regions is letter. Here, letter is a symbol
of an alphabet representing a word or text. There are variations of
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
Types
Original Image
273
Forged Image
Background
Object
Creature
Letter
Fig. 12. Example images obtained from CASIA v2.0 Dataset (Jing and Wei, 2011).
popular, and SIFT features is the most popular and reliable technique in detecting copy-move forgery due to its good performance
in geometrical transformation operation. The difference of Gaussians procedure makes the features robust in scaling while the
274
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
275
Acknowledgments
9. Conclusion
We surveyed publications on CMFD between 2007 and 2014,
and determined that copy-move forgery manipulation is a popular
line of research inquiry in recent years (e.g. as evidenced by the
number of publications on the topic). In this survey, we provided a
comprehensive overview of existing CMFD techniques for the
entire process. Specically, we discussed the importance of the
CMFD techniques, and outlined the common process involved in
the CMFD workow. The key processes are categorized into two
categories; namely block-based and keypoint-based. We described
the major classes of techniques in both categories, and listed the
associated activities related to the CMFD including datasets and
validations. Furthermore, we classied the copied regions to determine their relevancy in existing CMFD techniques. We also
discussed how advances in big data solutions could be inuence
and/or solve CMFD challenges.
References
Akbarpour Sekeh, M., Maarof, M.A., Rohani, M.F., Mahdian, B., 2013. Efcient image
duplicated region detection model using sequential block clustering. Digit. Investig. 10, 7384. http://dx.doi.org/10.1016/j.diin.2013.02.007.
Al-Qershi, O.M., Khoo, B.E., 2013. Passive detection of copy-move forgery in digital
images: state-of-the-art. Forensic Sci. Int. 231, 284295. http://dx.doi.org/
10.1016/j.forsciint.2013.05.027.
Amerini, I., Ballan, L., Caldelli, R., Bimbo, A., Del, Serra, G., 2011. A SIFT-based forensic method for copy move attack detection and transformation recovery.
IEEE Trans. Inf. Forensics Secur. 6, 10991110.
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., Serra, G., 2013. Copymove forgery detection and localization by means of robust clustering with
J-linkage. Signal Process. Image Commun. 28, 659669. http://dx.doi.org/
10.1016/j.image.2013.03.006.
Anand, V., Hashmi, Mohammad Farukh Keskar, A.G., 2014. A Copy Move Forgery
Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and
SIFT Methods, in: 6th Asian Conference on Intelligent Information and Database
Systems (ACIIDS). pp. 530542.
Ardizzone, E., Bruno, A., Mazzola, G., 2015. Copy move forgery detection by
matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10, 20842094.
Ardizzone, E., Bruno, A., Mazzola, G., 2010. Detecting Multiple Copies in Tampered
Images. In: 17th International Conference on Image Processing. pp. 21172120.
Ardizzone, E., Mazzola, G., Informatica, I., Universit, D., 2009. Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis, in: 15th International Conference Vietri Sul Mare, Italy. pp. 893901.
Bay, H., Ess, A., 2008. Speeded-Up Robust Features (SURF). Comput. Vis. Image
Underst. 110, 346359. http://dx.doi.org/10.1016/j.cviu.2007.09.014.
Bayram, S., Sencar, H.T., Memon, N., 2009. An Efcient And Robust Method For
Detecting Copy-Move Forgery, in: IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP). pp. 10531056.
Behringer, R., Ramachandran., M., Chang, V., 2016. A Low-Cost Intelligent Car Breakin Alert System Using Smartphone Accelerometers for Detecting Vehicle BreakIns, in: The First International Conference on Internet of Things and Big Data.
Bilgehan, M., Uluta, M., 2013. Detection of Copy-Move Forgery Using Krawtchouk
Moment, in: 8th International Conference on Electrical and Electronics Engineering (ELECO), pp. 311314.
Birajdar, G.K., Mankar, V.H., 2013. Digital image forgery detection using passive
techniques: a survey. Digit. Investig. 10, 226245. http://dx.doi.org/10.1016/j.
diin.2013.04.007.
Bo, X., Junwen, W., Guangjie, L., Yuewei, D., 2010. Image Copy-Move Forgery Detection Based On SURF, in: International Conference on Multimedia Information
Networking and Security. Ieee, pp. 889892. http://dx.doi.org/10.1109/MINES.
2010.189.
Bravo-Solorio, S., Nandi, A., 2011. Exposing duplicated regions affected by reection,
rotation and scaling, in: IEEE International Conference on Acoustics, Speech and
Signal Processing (ICASSP). pp. 18801883. http://dx.doi.org/10.1016/j.sigpro.
2011.01.022.
Brown, M., Szeliski, R., Winder, S., 2005. Multi-Image Matching Using Multi-Scale
Oriented Patches, in: IEEE Computer Society Conference on Computer Vision
and Pattern Recognition (CVPR05). Ieee, pp. 510517. http://dx.doi.org/10.1109/
CVPR.2005.235.
Cao, Y., Gao, T., Fan, L., Yang, Q., 2012. A robust detection algorithm for copy-move
forgery in digital images. Forensic Sci. Int. 214, 3343. http://dx.doi.org/10.1016/
j.forsciint.2011.07.015.
Chen, L., Lu, W., Ni, J., Sun, W., Huang, J., 2013. Region duplication detection based
on harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24, 244254. http://dx.doi.org/10.1016/j.jvcir.2013.01.008.
Chora, R.S., 2007. Image Feature Extraction Techniques and Their Applications for
CBIR and Biometrics Systems. Int. J. Biol. Biomed. Eng., 1.
Christlein, V., Riess, C., Angelopoulou, E., 2010. A Study on Features for the Detection of Copy-Move Forgeries. Sicherheit 2010, Gesellschaft fr. Inform. e. V.,
105116.
Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E., 2012. An Evaluation of
Popular Copy-Move Forgery Detection Approaches. IEEE Trans. Inf. Forensics
Secur. 7, 18411854.
Cozzolino, D., Poggi, G., Verdoliva, L., 2014. Copy-Move Forgery Detection Based On
Patchmatch, in: IEEE International Conference on Image Processing. pp. 5247
5251.
Davarzani, R., Yaghmaie, K., Mozaffari, S., Tapak, M., 2013. Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci. Int. 231, 6172.
http://dx.doi.org/10.1016/j.forsciint.2013.04.023.
Deng, Y., Wu, Y., Zhou, L., 2012. Detection of copy-rotate-move forgery using Dual
Tree Complex Wavelet Transform. Adv. Sci. Lett. 16, 3238. http://dx.doi.org/
276
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
10.1166/asl.2012.3289.
Do, Q., Martini, B., Choo, K.K.R., 2015a. A Forensically Sound Adversary Model for
Mobile Devices. PLoS One 10 (9), e0138449. http://dx.doi.org/10.1371/journal.
pone.0138449.
Do, Q., Martini, B., Choo, K.K.R., 2015b. A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2 (4), 6065. http://dx.doi.org/10.1109/
MCC.2015.71.
Do, Q., Martini, B., Choo, K.K.R., 2016. Is the data on your wearable device secure?
An Android. Wear smartwatch case Study Softw.: Pract. Exp. . http://dx.doi.org/
10.1002/spe.2414
Fan, J., Han, F., Liu, H., 2014. Challenges of Big Data analysis. Natl. Sci. Rev., 138.
http://dx.doi.org/10.1093/nsr/nwt032.
Farid, H., 2006. Exposing digital forgeries in scientic images, in: Proceeding of the
8th Workshop on Multimedia and Security - MM&Sec 06. ACM Press, New
York, New York, USA, p. 29. http://dx.doi.org/10.1145/1161366.1161374.
Farukh, M., Anand, V., Keskar, A.G., 2014. Copy-move Image Forgery Detection
Using an Efcient and Robust Method Combining Un-decimated Wavelet
Transform and Scale Invariant Feature Transform. AASRI Procedia 9, 8491.
http://dx.doi.org/10.1016/j.aasri.2014.09.015.
Fridrich, J., Soukal, D., Luk, J., 2003. Detection of Copy-Move Forgery in Digital
Images. Int. J. Comput. Sci. Issues 3, 652663. http://dx.doi.org/10.1109/
PACIIA.2008.240.
Gan, Y., Zhong, J., 2014. Image copy-move tamper blind detection algorithm based
on integrated feature vectors. J. Chem. Pharm. Res. 6, 15841590.
Guo, J.-M., Liu, Y.-F., Wu, Z.-J., 2013. Duplication Forgery Detection Using Improved
DAISY Descriptor. Expert Syst. Appl. 40, 707714. http://dx.doi.org/10.1016/j.
eswa.2012.08.002.
Harris, C., Stephens, M., 1988. A Combined Corner and Edge Detector, in: Procedings
of the Alvey Vision Conference 1988. Alvey Vision Club, pp. 23.123.6.
doi:10.5244/C.2.23.
He, H., Huang, X., Kuang, J., 2013. Exposing copy move forgeries based on a dimension reduced SIFT method. Inf. Technol. J. 12, 29752979.
Hsu, H.C., Wang, M.S., 2012. Detection of copy-move forgery image using Gabor
descriptor. Proc. Int. Conf. Anti-Counterfeiting, Secur. Identication, ASID, pp. 1
4. doi:10.1109/ICASID.2012.6325319.
Hu, H., Zhang, Y., Shao, C., Ju, Q., 2014. Orthogonal moments based on exponent
functions: exponent-Fourier moments. Pattern Recognit. 47, 25962606.
Hu, M.-K., 1962. Visual Pattern Recognition by. Moment Invariants. IRE Trans. Inf.
Theory 2, 179187.
Hu, Y., Yan, J., Choo, K.-K.R., 2016. PEDAL: A Dynamic Analysis Tool for Efcient
Concurrency Bug Reproduction in Big Data Environment. Cluster Comput.
Huang, Y., Lu, W., Sun, W., Long, D., 2011. Improved DCT-based detection of copymove forgery in images. Forensic Sci. Int. 206, 178184. http://dx.doi.org/
10.1016/j.forsciint.2010.08.001.
Huang, H., Guo, W., Zhang, Y., 2008. Detection Of Copy-Move Forgery in Digital
Images Using SIFT Algorithm, in: IEEE Pacic-Asia Workshop on Computational
Intelligence and Industrial Application. Ieee, pp. 272276. http://dx.doi.org/10.
1109/PACIIA.2008.240.
Hussain, M., Muhammad, G., Saleh, S.Q., Mirza, A.M., Bebis, G., 2013a. Image forgery
detection using multi-resolution weber local descriptors. EuroCon, 15701577.
Hussain, M., Muhammad, G., Saleh, S.Q., Mirza, A.M., Bebis, G., 2013b. Evaluation of
image forgery detection using multi-scale weber local descriptors. IEEE Eur.
2013, 15701577. http://dx.doi.org/10.1109/EUROCON.2013.6625186.
Hussain, M., Muhammad, G., Saleh, S.Q., Mirza, A.M., Bebis, G., 2012. Copy-move
image forgery detection using multi-resolution Weber descriptos. 8th Int. Conf.
Signal Image Technol. Internet Based Syst. SITIS, 2012r, pp. 395401. http://dx.
doi.org/10.1109/SITIS.2012.64.
Hussain, M., Saleh, S.Q., Aboalsamh, H., Muhammad, G., Bebis, G., 2014. Comparison
between WLD and LBP descriptors for non-intrusive image forgery detection,
in: IEEE International Symposium on Innovations in Intelligent Systems and
Applications (INISTA) Proceedings. Ieee, pp. 197204. http://dx.doi.org/10.1109/
INISTA.2014.6873618.
Jaberi, M., Bebis, G., Hussain, M., Muhammad, G., 2013b. Accurate and robust localization of duplicated region in copymove image forgery. Mach. Vis. Appl 25,
451475. http://dx.doi.org/10.1007/s00138-013-0522-0.
Jaberi, M., Bebis, G., Hussain, M., Muhammad, G., 2013a. Improving The Detection
And Localization Of Duplicated Regions In Copy-Move Image Forgery, in: 18th
International Conference on Digital Signal Processing (DSP). Ieee, pp. 16.
http://dx.doi.org/10.1109/ICDSP.2013.6622700.
Jing, D., Wei, W., 2011. CASIA Tampered Image Detection Evaluation (TIDE) Database
[WWW Document]. URL http://forensics.idealtest.org/casiav2/ (accessed
04.28.15).
Kakar, P., Sudha, N., 2012. Exposing Postprocessed Copy-Paste Forgeries through
Transform-Invariant Features. IEEE Trans. Inf. Forensics Secur. 7, 10181028.
Kashyap, A., Joshi, S.D., 2013. Detection of Copy-Move Forgery Using Wavelet Decomposition, in: International Conference on Signal Processing and Communication (ICSC). pp. 13.
Ketenci, S., Ulutas, G., 2013. Copy-move forgery detection in images via 2D-Fourier
Transform. 36th Int. Conf. Telecommun. Signal Process. 813816. doi:10.1109/
TSP.2013.6614051.
Kodituwakku, S., Selvarajah, S., 2004. Comparison of color features for image retrieval. Indian J. Comput. Sci. 1, 207211.
Kumar, S., Desai, J., Mukherjee, S., 2013. A Fast DCT Based Method for Copy Move
Forgery Detection, in: IEEE Second International Conference on Image Information Processing (ICIIP-2013). Ieee, pp. 649654. http://dx.doi.org/10.1109/
ICIIP.2013.6707675.
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278
277
(SIU).
Vincent Christlein, C.R. and E.A.P., 2010. On Rotation Invariance In Copy-Move
Forgery Detection, in: IEEE International Workshop on Information Forensics
and Security.
Wang, T., Tang, J., Zhao, W., Xu, Q., Luo, B., 2012. Blind detection of copy-move
forgery based on multi-scale autoconvolution invariants. Commun. Comput. Inf.
Sci., 438446. http://dx.doi.org/10.1007/978-3-642-33506-8_54.
Wu, Q., Wang, S., Zhang, X., 2010. Detection of image region-duplication with rotation and scaling tolerance, in: Second International Conference, ICCCI. pp.
100108. http://dx.doi.org/10.1007/978-3-642-16693-8_11.
Xu, D., Ren, P., Sun, L., Song, H., 2016. Precoder-and-receiver design scheme for
multi-user coordinated multi-point in LTE-A and fth generation systems. IET
Commun. 10, 292299. http://dx.doi.org/10.1049/iet-com.2015.0229.
Xu, Z., Zhang, H., Sugumaran, V., Choo, K.-K.R., Mei, L., Zhu, Y., 2016. Participatory
sensing-based semantic and spatial analysis of urban emergency events using
mobile social media. EURASIP J. Wirel. Commun. Netw. 2016, 44. http://dx.doi.
org/10.1186/s13638-016-0553-0.
Yang, B., Sun, X., Chen, X., Zhang, J., Li, X., 2013. An efcient forensic method for
copy move forgery detection based on DWT-FWHT. Radio Eng. 22, 10981105.
Yang, Q.-C., Huang, C.-L., 2009. Copy-move forgery detection in digital image, in:
10th Pacic Rim Conference on Multimedia. pp. 816825.
Yu, L., Han, Q., Niu, X., 2014. Feature point-based copy-move forgery detection :
covering the non-textured areas. Multimed. Tools Appl. http://dx.doi.org/
10.1007/s11042-014-2362-y
Zhang, J., Feng, Z., Su, Y., 2008. A new approach for detecting copy-move forgery in
digital images, in: 11th IEEE Singapore International Conference on Communication Systems, ICCS 2008. pp. 362366. http://dx.doi.org/10.1109/ICCS.2008.
4737205.
Zhao, J., 2010. Detection of copy-move forgery based on one improved LLE method.
2nd IEEE Int. Conf. Adv. Comput. Control 4, 547550. http://dx.doi.org/10.1109/
ICACC.2010.5486861.
Zhao, J., Zhao, W., 2013. Passive forensics for region duplication image forgery based
on harris feature points and local binary patterns. Math. Probl. Eng., 2013. http:
//dx.doi.org/10.1155/2013/619564.
Zhao, J., Guo, J., 2013. Passive forensics for copy-move image forgery using a
method based on DCT and SVD. Forensic Sci. Int. 233, 158166. http://dx.doi.
org/10.1016/j.forsciint.2013.09.013.
Zhao, L., Chen, L., Ranjan, R., Choo, K-K R., He, J., 2016. Geographical information
system parallelization for spatial big data processing: a review. Cluster Comput.
Zheng, J., Chang, L., 2014. Detection Technology of Tampering Image Based on
Harris Corner Points. J. Comput. Inf. Syst. 10, 14811488. http://dx.doi.org/
10.12733/jcis9302.
Nor Bakiah Abd Warif is a PhD student at the Faculty of Computer Science and
Information Technology, University of Malaya. She received her Bachelor Degrees in
Information Technology at the National University of Malaysia. Her research interests are in the areas of image processing and image forensics, especially on copymove forgery detection.
Ainuddin Wahid Abdul Wahid received a PhD from Surrey University, United
Kingdom. He is currently a Senior Lecturer at the Department of Computer System
and Technology, Faculty of Computer Science and Information Technology, University of Malaya. His research interests including security service, steganography,
network security, digital forensics and information hiding.
Roziana Ramli is a PhD student at the Faculty of Computer Science and Information Technology, University of Malaya. She received her Bachelor and Master Degrees in Engineering from University of Malaya. Her research interest includes
medical image processing and analysis.
278
N.B.A. Warif et al. / Journal of Network and Computer Applications 75 (2016) 259278