copy move forgery detection through graph neighborhood degree · proposed algorithm on copy-move...

7
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427 © Research India Publications. http://www.ripublication.com 13421 Copy Move Forgery Detection through Graph Neighborhood Degree Prabhash Kumar Singh 1 , Biswapati Jana 2 , Sharmistha Halder (Jana) 3 1 Department of Computer Science, Vidyasagar University, Midnapore, WB, India. 2 Department of Computer Science, Vidyasagar University, Midnapore, WB, India. 3 Department of Mathematics, Midnapore College (Autonomous), Midnapore, WB, India. Abstract In this digital world, data and image are two main components which can be obtained with ease on the internet. This aspires to copy-move parts of an image from one region to another on the same image to give a new fallacious perspective. In this paper we have presented a novel copy move forgery detection scheme using graph neighborhood degree. At first, non- overlapping sub-blocks are taken of an image to form a codebook against a threshold. The corresponding pixels of the obtained codebook are processed to embed data at LSB of the pixels in the block. When this image is forged, we again compute the bits of each block to be embedded as previous and match to the LSB of that block. If unmatch ensues, the image is forged. Subsequently, the experiments are conducted on three standard databases to detect the efficiency of the proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the robustness and coherence of the proposed algorithm. Keywords: Digital Image Forensic, Copy Move Forgery, Neighborhood Degree, Embedding bits, Detection schemes. INTRODUCTION As technologies have outreach to most users, many are using it for good purpose while some are using it unethically to obtain false objectives by manipulating the digital available resources such as audio, video and image. Digital Image forensic is one of the field where the authenticity and detection of tampering to the images are done. The tampering of the images and its distribution on the internet causes a serious problem to the society. People tend to believe these counterfeit images and help to spread rumors. Sometimes people distributes these forged images just for fun, however, it becomes a serious concern when it is used for news, crime evidence or for scientific publications. Lots of advanced software for image manipulations is present. Digital Images can be tempered in many ways such as Copy-Move, Image Slicing, Image Imprinting etc. Copy-Move forgery (CMF) is the forgery in which one part of the image is copied to another part of the same image. The pasted region undergoes post processing operations such as scaling, rotation and noising with the help of different software so that it could not be traced by the users. Figure 1: Copy Move Forgery. (a) Original Image (b) Forged image As shown in Figure 1, the original image is given in Fig. 1(a) and the copy move forgery has been done on the same image which is presented in Fig. 1(b). Hardly anything could be detected between the original and forged image. Therefore, it is very hard to detect the copy moved region manually. So, the detection of the copy-moved region of an image has become an active topic of research. The copy move detection could be done either in active or passive image forensic methods. PREVIOUS WORKS Many copy move forgery detection algorithms are proposed to identify the tempered regions of the image. Some methods present in the literature are discussed for better awareness of the work carried out on copy move forgery detection schemes: Fidrich et. al. [1] proposed the first scheme i.e. lexicographically sorting and comparing to find the forged region between areas of interest to detect tampering but prove efficient only when the copied regions were large. Next, the block based matching algorithms were proposed by Popescu et. al. [2] and Kang et. al. [3] using Principal Component Analysis (PCA) where the authors were able to detect CMF in almost half the time taken by the algorithm proposed by Fidrich et. al. In this algorithm the issue of geometrical transformation was not addressed. Later, Wang et. al. [4] used Gaussian Pyramid to reduce the dimension of the image and the Hu moment was applied to the overlapping blocks of low frequency range. Another feature technique the Discrete wavelet transform (DWT) was proposed in [5], where DWT was used to obtain compressed image and duplicated blocks were identified by applying Phase correlation criterion on

Upload: others

Post on 31-May-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Copy Move Forgery Detection through Graph Neighborhood Degree · proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427

© Research India Publications. http://www.ripublication.com

13421

Copy Move Forgery Detection through Graph Neighborhood Degree

Prabhash Kumar Singh1, Biswapati Jana2, Sharmistha Halder (Jana)3

1Department of Computer Science, Vidyasagar University, Midnapore, WB, India. 2Department of Computer Science, Vidyasagar University, Midnapore, WB, India.

3Department of Mathematics, Midnapore College (Autonomous), Midnapore, WB, India.

Abstract

In this digital world, data and image are two main components

which can be obtained with ease on the internet. This aspires

to copy-move parts of an image from one region to another on

the same image to give a new fallacious perspective. In this

paper we have presented a novel copy move forgery detection

scheme using graph neighborhood degree. At first, non-

overlapping sub-blocks are taken of an image to form a

codebook against a threshold. The corresponding pixels of the

obtained codebook are processed to embed data at LSB of the

pixels in the block. When this image is forged, we again

compute the bits of each block to be embedded as previous

and match to the LSB of that block. If unmatch ensues, the

image is forged. Subsequently, the experiments are conducted

on three standard databases to detect the efficiency of the

proposed algorithm on copy-move forged images. Also, some

tampering detection schemes are carried out to show the

robustness and coherence of the proposed algorithm.

Keywords: Digital Image Forensic, Copy Move Forgery,

Neighborhood Degree, Embedding bits, Detection schemes.

INTRODUCTION

As technologies have outreach to most users, many are using

it for good purpose while some are using it unethically to

obtain false objectives by manipulating the digital available

resources such as audio, video and image. Digital Image

forensic is one of the field where the authenticity and

detection of tampering to the images are done. The tampering

of the images and its distribution on the internet causes a

serious problem to the society. People tend to believe these

counterfeit images and help to spread rumors. Sometimes

people distributes these forged images just for fun, however, it

becomes a serious concern when it is used for news, crime

evidence or for scientific publications. Lots of advanced

software for image manipulations is present. Digital Images

can be tempered in many ways such as Copy-Move, Image

Slicing, Image Imprinting etc. Copy-Move forgery (CMF) is

the forgery in which one part of the image is copied to another

part of the same image. The pasted region undergoes post

processing operations such as scaling, rotation and noising

with the help of different software so that it could not be

traced by the users.

Figure 1: Copy Move Forgery. (a) Original Image (b) Forged

image

As shown in Figure 1, the original image is given in Fig. 1(a)

and the copy move forgery has been done on the same image

which is presented in Fig. 1(b). Hardly anything could be

detected between the original and forged image. Therefore, it

is very hard to detect the copy moved region manually. So, the

detection of the copy-moved region of an image has become

an active topic of research. The copy move detection could be

done either in active or passive image forensic methods.

PREVIOUS WORKS

Many copy move forgery detection algorithms are proposed to

identify the tempered regions of the image. Some methods

present in the literature are discussed for better awareness of

the work carried out on copy move forgery detection schemes:

Fidrich et. al. [1] proposed the first scheme i.e.

lexicographically sorting and comparing to find the forged

region between areas of interest to detect tampering but prove

efficient only when the copied regions were large. Next, the

block based matching algorithms were proposed by Popescu

et. al. [2] and Kang et. al. [3] using Principal Component

Analysis (PCA) where the authors were able to detect CMF in

almost half the time taken by the algorithm proposed by

Fidrich et. al. In this algorithm the issue of geometrical

transformation was not addressed. Later, Wang et. al. [4] used

Gaussian Pyramid to reduce the dimension of the image and

the Hu moment was applied to the overlapping blocks of low

frequency range. Another feature technique the Discrete

wavelet transform (DWT) was proposed in [5], where DWT

was used to obtain compressed image and duplicated blocks

were identified by applying Phase correlation criterion on

Page 2: Copy Move Forgery Detection through Graph Neighborhood Degree · proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427

© Research India Publications. http://www.ripublication.com

13422

overlapping blocks. In [6], the coefficients and approximation

of Undecimated Wavelet Transforms (UWT) was proposed to

be used from overlapping blocks to and the similarity within

the blocks. Li et. al. [7] used SVD (Singular Value

Decomposition) along with DWT to detect duplicated region

even in highly compressed format with low computational

complexity. Bin [8] proposed feature extraction from the

overlapping blocks by Walsh-Hadamard Transform (FWHT)

and used multi-hop jump (MHJ) algorithm to eliminate

unnecessary matches. Another transform called orthogonal

polar cosine transform was used by Li [9] to extract feature

from the block. This algorithm proved to be e

effective for some post processing techniques. In [10], Lee et.

al. gave a new concept to find CMF using histogram of

oriented gradients. The statistical analysis was done to obtain

features for the overlapping blocks. This scheme stand well

for some post processing tampering. A study revealing the

comparison of Zernike over Pseudo Zernike moments was

shown by Mahmoud [11]. His study pointed out that the latter

technique was stronger than the former in terms of feature

based forgery detection. In contrast to block based forgery

detection techniques, some key point based algorithms where

mainly Scale-Invariant Feature Transform (SIFT) and the

Speeded-Up Robust Features (SURF) techniques [12] for

copy move forgery detection are proposed in the literature.

In recent times, Deep learning and Convolutional Networks

based schemes have been proposed to detect CMF in images

and videos. Yao et. al. [13] presented a technique to obtain

complex features for effective feature representation. Also,

Zhou et. al. [14] proposed block based convolutional neural

network to detect forgery. However this method turned to be

very computationally complex for tampering detection.

THE PROPOSED SCHEME

Graph Neighborhood Degree

In this paper, we have used graph to obtain a neighborhood

degree. A graph theory is the branch of mathematics used to

model and study a relationship between a pair of objects. A

graph is generally defined by a set of vertices (v) and edges

(e). Using the concept of graph theory many modern life’s

complex problems are solved such as computer network

problem, information transmission, transportation,

management science etc.

Consider a graph G consisting a set of vertices {v1; v2; v3; v4;

v5} and a set of edges {e1; e2; e3; e4; e5; e6} as shown in

Figure 2. Edge is a line which have vertex at both ends. An

edge could be directed or undirected. The adjacent vertex of v

is the vertices which are connected by an edge to the vertex v.

For example: adjacent vertices of v1 are {v2; v4; v5}. The

neighborhood degree of a vertex v is the number of vertices

present in the adjacency list for v. The neighborhood degree

list for the Figure 2 is given in Table 1.

Figure 2: Graph G

Table 1: Neighborhood Degree List

Vertex Neighborhood degree

v1 3

v2 2

v3 2

v4 2

v5 3

Assume that we take a gray scale image of size N x N and

divides it into non-overlapping blocks of size b x b. For each

block, the image intensities present within a pixel range are

substituted with the values assigned in Table 2. This is called

quantization.

Table 2: Quantization Value

Pixel Range Value

0 – 51 A

52 - 101 B

102 - 151 C

152 - 201 D

202 - 255 E

Based on the values, the 8-neighborhood degree of each cell

(i, j) are computed as shown in Figure 3. These degrees are

tested against a pre-defined threshold (τ) to prepare a

codebook. Codebook records the position of only those pixels

whose corresponding degrees computed are higher than the

given threshold in the considered block. The step by step

procedure to form a codebook is illustrated in Figure 4.

Figure 3: 8-Neighborhood Degree

Page 3: Copy Move Forgery Detection through Graph Neighborhood Degree · proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427

© Research India Publications. http://www.ripublication.com

13423

Figure 4: Flowchart to Form Codebook

Embedding Procedure

In order to embed data, the binary values of each pixel whose

positions are stored in the codebook are obtained. The bitwise

XOR operations are performed on the bit planes of each pixel

except the first bit plane to obtain the first 7 bits to embed.

The first bit plane (LSB) is chosen for the embedding of the

data. Next, we again find the XOR of the odd position bits and

even position bits. The total number of bits obtained to embed

is 9. Since, the total LSB bits present is b2 in a b x b blocks,

the

(b2 - 9) extra bits are embedded with 0.

Figure 5: Embedding Procedure

To illustrate the embedding process, we again consider the

example given in Figure 4. Let the threshold (τ) be 3. So, the

codebook formed after filtering the obtained neighborhood

degree against the threshold are composed of C i ; j = {(2, 2);

(2, 3); (2, 4); (3, 3); (3, 4)}. The corresponding original pixels

against these filtered pixel positions of the codebook are {46;

44; 43; 35; 41}. The binary values of these pixels are taken to

perform XOR operations on the bit planes to obtain

embedding bits 0010001. Again, we compute the XOR among

ODD and EVEN position bits to reap 0 and 0 respectively. So,

the total bits to be embedded in 4x4 block are

0010001000000000. The new block becomes as shown in

Figure 5 and the complete pseudocode for the proposed

embedding process is given below:

Forgery Detection

To detect a copy-move forgery on a preprocessed image, the

image If is segregated in non-overlapping blocks of b x b.

Each block is process to build its codebook after filtering of

the neighborhood degree against a predefined threshold as

discussed in previous subsection. The equivalent pixels in the

considered block present at the positions stored in codebook

are taken and ⊕ operations are performed on all bit planes

except the first bit plane. Subsequently, the XOR operations

are again computed for the ODD and EVEN position bits. The

rest of (b2 - 9) bits are concatenated with 0. These determined

bits are matched to the LSB bits collected from each pixels of

Page 4: Copy Move Forgery Detection through Graph Neighborhood Degree · proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427

© Research India Publications. http://www.ripublication.com

13424

the considered block. If match does not occur then the image

is forged. The pseudocode for the forgery detection algorithm

is shown below:

Analysis and Experimental Result

The proposed copy move forgery algorithm is tested against

three standard image databases named SIPI Database [15],

MSI Database and Kodak Database [16]. The proposed

algorithm is implemented using MATLAB 2015a on a

machine equipped with intel i5 2.6GHz with 4GB RAM.

To measure the performance of our method, we utilize

precision-recall (PR) curves [17, 18] with the help of True

Positive Rate (TPR) and False Positive Rate (FPR). The TPR

and FPR are calculated as shown in equations (1) and (2)

respectively. TP refers to the number of cases predicted to be

correct which are really correct whereas FP refers to the

number of cases predicted as incorrect but are actually correct.

The number of cases predicted as true but are actually

incorrect is false negative (FN) while the number of cases

predicted as incorrect apparent to be incorrect too is true

negative (TN). Here, True positive rate is the proportion of

actual tampered pixels that are reported as tampered pixels.

False positive rate is the proportion of actual untampered

pixels that were erroneously reported as tampered pixels.

Copy-Move Detection

Two images of size (512 X 512) pixels are randomly selected

from each database to copy move an ample portion of the

image to induce forgery at a region which is hard to visualize

with naked eye. The results obtained are shown in Figure 6 -

8. For each image a region is copied from the original image,

which is shown under original image column of the figures

and pasted on a different region of the same image as shown

under Copy Move header of the figures. The regions which

are detected as forged are made white for the sake of clarity

and is presented in the last column of the figures.

Figure 6: SIPI Database.

Figure 7: MSI Database.

On further visualization, we can find that the proposed

algorithm is very clearly able to detect the forged region

maintaining the shape of the duplicated portions.

Tampering Detection

The efficacy of the proposed forgery detection technique is

verified after withstanding the algorithm under various

tampering detection schemes. The tampering detection used in

the experiment is discussed below:

(1) Scaling

In scaling, the size of the tampered region is changed either

through compression or expansion by some random scaling

factor. In order to set up the experiment, the region of the

image to be copied is scaled and moved to a different portion

of the same image. The attained result is shown in Figure 9.

Page 5: Copy Move Forgery Detection through Graph Neighborhood Degree · proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427

© Research India Publications. http://www.ripublication.com

13425

Figure 8: Kodak Database.

Figure 9: Forgery Detection in Scaling Tampering.

(2) Rotation

For tampering detection through rotation, the region to be

forged is rotated by an angle θ i.e. θ = 90o is considered for

this experiment. The detected image is shown in Figure 10.

Figure 10: Forgery Detection in Rotation Tampering.

(3) Illumination Change

The intensity of the region to be duplicated is changed and

then it is pasted to another region within the same image. The

change in intensity level, changes the pixel values of the

image. The acquired tampered detection result is unveiled in

Figure 11.

(4) Multiple Cloning

In multiple cloning, multiple regions of an image are copied

and moved in the same image in order to tamper the original

image. After tampering, the image is considered for

experiment of forgery detection and the result obtained is

displayed in Figure 12.

Figure 11: Forgery Detection in Illumination Tampering.

Figure 12: Forgery Detection in Multiple Cloning Tampering.

(5) Salt & Pepper Noise

To detect tampering by the proposed algorithm, the duplicated

image is put with salt & pepper noise. This noised section of

the image is pasted within the same image. The tampered

detection result is presented in Figure 13.

Figure 13: Forgery Detection with Salt & Pepper Tampering.

Thus, under different transformations the proposed algorithm

sharply detects the forged region. The TPR and FPR of the

different tampering process are shown in Table 3.

Performance Evaluation with Other Algorithms

To judge the proposed approach, we make a performance

evaluation between the proposed approach and some state-of-

the-art Copy Move Forgery Detection (CMFD) methods. The

different CMFD methods considered for comparison are:

Yang et al. [19], Li et al. [20], Neamtu et al. [21], Pan et al.

Page 6: Copy Move Forgery Detection through Graph Neighborhood Degree · proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427

© Research India Publications. http://www.ripublication.com

13426

[22] and Popescu [23] which are applied on the images used

in this paper to obtain the results shown in Table 4.

Table 3: TPR and FPR for various Tampering Scheme Value

Tampering Scheme TPR % FPR %

Translation / Copy Move 98.66 7.34

Scaling 97.76 8.10

Rotation 97.87 8.34

Illumination Change 95.67 7.65

Multiple Cloning 95.46 8.38

Salt & Pepper 98.43 8.53

The distinct input parameters needed by the other five

methods were set as follows: In [19] good performance is

achieved using keypoint detection method and fixing the

value of threshold τ = 0.3; n = 10. In [20], the parameters

assigned were size of kernel to 1, ratio = 0.7 while in [21] the

threshold r is put to 0:7 i.e. ratio between minimum nearest

neighbor. Pan et. al. [22] adjusted five parameters: the

threshold ε = 0:5, area threshold A = 0.1%, threshold for

correlation map c = 0:3, iteration N = 100 and β = 3. In [23],

the value of blocksize b = 8, maximum frequency Nf = 30,

duplicated block Nd = 22, minimum rows search

lexicographically Nn = 5.

Table 4: Comparison of Performance on weighted average

Methods TPR % FPR %

Our Approach 97.15 7.92

Yang et. al. 95.88 9.02

Li et. al. 91.55 8.86

Pan et. al. 88.66 10.31

Neamtu et. al. 87.37 10.17

Popescu 75.49 14.81

On parallel comparison with state-of-art algorithms, our

proposed algorithm excels in performance with over 97%

TPR and amazing FPR. Since the algorithm detects forgery

scanning pixels block by block and matching the feature value

obtained through embedding procedure of the proposed

approach with the data embedded in the same block, if any

forgery has taken place, is detected very effortlessly. To

increase the TPR, the threshold value is fixed at a

considerable point where ample number of pixel values enters

into codebook to extract sufficient feature of the block so that

any forgery could be detected under any tampering

environment. From the table, it is evident that the second

highest TPR is obtained in [19]. This method used adaptive

SIFT descriptor and AHC algorithm to obtain good accuracy.

Li et. al. introduced EM based algorithm to forgery detection

and if suspicious image found, it is matched twice. The other

method present in [22] used SIFT technique while [21]

applied SURF technology. Lastly, the method used in [23]

could not perform well due to restriction of block based where

tampering effects many pixel values.

CONCLUSION

In the era where machines are gaining intelligence, the image

editing softwares developed are quite advance and acute

which gives an option to illegitimate users to create a

fictitious object to meet their selfish requirements and motive.

The images edited or manipulated with these softwares are

superlative. The differences between original and forged

images are hard to be envisaged. In order to deceive them, this

paper proposes a copy move forgery detection scheme

through graph neighborhood degree. The proposed algorithm

preprocesses the images and thereafter if any forgery or

tampering is done with the images, it will be evident after

passing it through the detection technique. The efficiency of

the algorithm is proved by running the proposed technique on

the standard image databases as well as by being able to detect

forgery under different tampering techniques. This technique

will be very useful on the devices like camera. At the time of

capturing the image, the embedding algorithm will preprocess

the image for forgery or tampering detection. This work

provides lots of opportunity for future study to detect forgery

under passive mode and complex distortion environment.

REFERENCES

[1] Fridrich, A. J., Soukal, B. D., & Luk, A. J. (2003).

Detection of copy-move forgery in digital images. In

Proceedings of Digital Forensic Research Workshop.

[2] Popescu, A. C., & Farid, H. (2004). Exposing digital

forgeries by detecting duplicated image regions.

Department Computer Science, Dartmouth College,

Technology Report TR2004-515.

[3] Kang, X., & Wei, S. (2008, December). Identifying

tampered regions using singular value decomposition

in digital image forensics. In Computer Science and

Software Engineering, 2008 International Conference

on (Vol. 3, pp. 926-930). IEEE.

[4] Wang, J., Liu, G., Zhang, Z., Dai, Y., & Wang, Z.

(2009). Fast and robust forensics for image region

duplication forgery. Acta Automatica Sinica, 35(12),

1488-1495.

[5] Khan, E. S., & Kulkarni, E. A. (2010). An efficient

method for detection of copy move forgery using

discrete wavelet transform. International Journal on

Computer Science and Engineering, 2(5), 2010.

[6] Muhammad, G., Hussain, M., & Bebis, G. (2012).

Passive copy move image forgery detection using

undecimated dyadic wavelet transform. Digital

Investigation, 9(1), 49-57.

[7] Li, G., Wu, Q., Tu, D., & Sun, S. (2007, July). A

sorted neighborhood approach for detecting

duplicated regions in image forgeries based on DWT

Page 7: Copy Move Forgery Detection through Graph Neighborhood Degree · proposed algorithm on copy-move forged images. Also, some tampering detection schemes are carried out to show the

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 18 (2018) pp. 13421-13427

© Research India Publications. http://www.ripublication.com

13427

and SVD. In Multimedia and Expo, 2007 IEEE

International Conference on (pp. 1750-1753).IEEE.

[8] Bin, Y. A. N. G., Xingming, S. U. N., Xianyi, C. H.

E. N., Zhang, J., & Xu, L. I. (2013). An Efficient

Forensic Method for Copy move Forgery Detection

Based on DWT-FWHT. Radio engineering, 22(4).

[9] Li, Y. (2013). Image copy-move forgery detection

based on polar cosine transform and approximate

nearest neighbor searching. Forensic science

international, 224(1-3), 59-67.

[10] Lee, J. C., Chang, C. P., & Chen, W. K. (2015).

Detection of copy move image forgery using

histogram of orientated gradients. Information

Sciences, 321, 250-262.

[11] Mahmoud, K., & Husien, A. (2016). Copy-move

forgery detection using Zernike and pseudo zernike

moments. Int. Arab J. Inf. Technol., 13(6A), 930-

937.

[12] Ardizzone, E., Bruno, A., & Mazzola, G. (2015).

Copy move forgery detection by matching triangles

of keypoints. IEEE Transactions on Information

Forensics and Security, 10(10), 2084-2094.

[13] Yao, Y., Shi, Y., Weng, S., & Guan, B. (2017). Deep

learning for detection of object-based forgery in

advanced video. Symmetry, 10(1), 3.

[14] Zhou, J., Ni, J., & Rao, Y. (2017, August). Block-

Based Convolutional Neural Network for Image

Forgery Detection. In International Workshop on

Digital Watermarking (pp. 65-76). Springer, Cham.

[15] University of Southern California. The USC-SIPI

Image Database; 2015. Available from:

http://sipi.usc.edu/ database/database.php

[16] The Kodak Image Database; Available from:

http://www.cs.albany.edu/xy-

pan/research/snr/Kodak.html

[17] Yang B, Sun X, Chen X, Zhang J, Li X (2014)

Exposing photographic splicing by detecting the

inconsistencies in shadows. Comput J 58:588600

[18] Yanhua Z, Sun X, Baowei W(2016) Efficient

algorithm for k-barrier coverage based on integer

linear programming. China Communications 13:1623

[19] Yang, B., Sun, X., Guo, H., Xia, Z., & Chen, X.

(2018). A copy-move forgery detection method

based on CMFD-SIFT. Multimedia Tools and

Applications, 77(1), 837-855.

[20] Li J, Li X, Yang B, Sun X (2015) Segmentation-

based image copy-move forgery detection scheme.

IEEE Transactions on Information Forensics and

Security 10:507518

[21] Neamtu C, Barca C, Achimescu E, Gavriloaia B

(2013) Exposing copy-move image tampering using

forensic method based on SURF. In: 2013

International Conference on Electronics, Computers

and Artificial Intelligence (ECAI), pp. 14

[22] Pan X, Lyu S (2010) Region duplication detection

using image feature matching. IEEE Transactions on

Information Forensics and Security 5:857867

[23] Popescu AC, Farid H (2005) Exposing digital

forgeries by detecting traces of resampling. IEEE

Trans Signal Process 53:758767