We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Novel Method for Copy-Move Forgery Detection

by Sharanjit Kaur, Manpreet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 18
Year of Publication: 2021
Authors: Sharanjit Kaur, Manpreet Kaur
10.5120/ijca2021921064

Sharanjit Kaur, Manpreet Kaur . Novel Method for Copy-Move Forgery Detection. International Journal of Computer Applications. 174, 18 ( Feb 2021), 10-14. DOI=10.5120/ijca2021921064

@article{ 10.5120/ijca2021921064,
author = { Sharanjit Kaur, Manpreet Kaur },
title = { Novel Method for Copy-Move Forgery Detection },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2021 },
volume = { 174 },
number = { 18 },
month = { Feb },
year = { 2021 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number18/31775-2021921064/ },
doi = { 10.5120/ijca2021921064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:27.139714+05:30
%A Sharanjit Kaur
%A Manpreet Kaur
%T Novel Method for Copy-Move Forgery Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 18
%P 10-14
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A technique named forgery detection is used for detecting alterations from the image. This approach comprises several methods. This research study is depending on identifying theforgery in copy-move.The PCA algorithm will mark the principle component analysis for incompatible pixels from the picture. The GLCM algorithm is applied with the PCA algorithm in this research study for detecting forgery. The proposed algorithm is executed in MATLAB and outcomes are scrutinized on the basis of PSNR and MSE values. It is scrutinized that the proposed algorithm gives good performance in comparison with existing algorithm.

References
  1. G. H. Li, Q. Wu, D. Tu, and S. J. Sun., “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWTand SVD,” in Proceedings of IEEE International Conference on Multimedia and Expo, Beijing, Jul. 2007, pp. 17503.
  2. Geetika Gupta, Akshay Girdhar., “A ROBUST PASSIVE METHOD FOR DETECTION OF COPY-MOVE FORGERY IN IMAGES”, 2017, IEEE.
  3. H. Huang, W. Guo, and Y. Zhang., “Detection of copy-move forgery in digital images using SIFT algorithm,” in Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Vol. 2, Dec. 2008, pp. 2726.
  4. Hanieh Shabanian, Farshad Mashhadi., “A New Approach for Detecting Copy-Move Forgery in Digital Images”, 2017, IEEE.
  5. I. Amerini., “A SIFT-based forensic method for copymove attack detection and transformation recovery”, IEEE Trans. Inf. Foren. Sec., 2011.
  6. M. Ghorbani, M. Firouzmand, and A. Faraahi., “DWT-DCT (QCD) based copy-move image forgery detection”, in 18th IEEE International Conference on Systems, Signals and Image Processing (IWSSIP), 2011, pp. 14.
  7. R.Dhanya, R.Kalai Selvi., “A State of the Art Review on Copy Move Forgery Detection Techniques”, Proceedings of 2017 IEEE International Conference on Circuits and Systems (ICCS 2017).
  8. Rahul Dixit, RuchiraNaskar and Aditi Sahoo., “Copy–Move Forgery Detection Exploiting Statistical Image Features”, IEEE WiSPNET 2017.
  9. X. Kang, and S. Wei., “Identifying tampered regions using singular value decomposition in digital image forensics”, in International Conference on Computer Science and Software Engineering, 2008.
  10. Yong Yew Yeap, U. U. Sheikh, Ab Al-Hadi Ab Rahman., “Image Forensic for Digital Image Copy Move Forgery Detection”, 2018 IEEE 14th International Colloquium on Signal Processing & its Applications (CSPA 2018).
  11. Yue Wu, Wael Abd-Almageed, and Prem Natarajan., “Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network”, 2018 IEEE Winter Conference on Applications of Computer Vision.
Index Terms

Computer Science
Information Sciences

Keywords

PCA GLCM Copy-move forgery