Analysis of Splicing Manipulation in Digital Images using Dyadic Wavelet Transform (DyWT) and Scale Invariant Feature Transform (SIFT) Methods
Abstract
In the digital age, image manipulation is common, often done before publication on social media. However, this can lead to negative impacts, including visual deception. This research aims to detect splicing type image manipulation using Dyadic Wavelet Transform (DyWT) and Scale Invariant Feature Transform (SIFT) methods. The process starts with image decomposition using DyWT to obtain LL sub-images, followed by local feature extraction using SIFT. An application built on desktop-based Matlab source was developed to detect splicing forgery in digital images. The test used 20 images, this image dataset was taken from canon 5d mark II camera and Vivo X80 mobile phone. Each 10 original images, and 10 edited images. These 10 original images are left as they are without making changes, editing or manipulation, while the other 10 images are changed, edited or manipulated using editing software, the results of this editing are uploaded to social media, such as Facebook and Instagram, which will later be used as datasets in testing. The results show that the splicing technique is detected accurately, and processing is faster on images with low pixel resolution. The DyWT and SIFT methods are effective in detecting post-processing attacks such as rotation and rescaling, although they have drawbacks. DyWT struggles in detecting subtle changes and noise, while SIFT is less effective on non-geometric manipulations. Overall, both methods face challenges in detecting complex manipulations and require significant computational resources, especially on high-resolution images.
Downloads
References
J. Charpe and A. Bhattacharya, “Revealing image forgery through image manipulation detection,” Glob. Conf. Commun. Technol. GCCT 2015, no. Gcct, pp. 723–727, 2015, doi: 10.1109/GCCT.2015.7342759.
I. T. Ahmed, B. T. Hammad, and N. Jamil, “A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features,” Indones. J. Electr. Eng. Comput. Sci., vol. 22, no. 2, pp. 1177–1190, 2021, doi: 10.11591/IJEECS.V22.I2.PP1177-1190.
M. H. Andrian Saputra, “Fenomena Ujaran Kebencian Di Medsos,” Republika. republika.co.id, Jakarta, pp. 1–3, 2022. [Online]. Available: https://islamdigest.republika.co.id/berita/rinxua430/fenomena-ujaran-kebencian-di-medsos
S. S. Narayanan and G. Gopakumar, “Recursive Block Based Keypoint Matching for Copy Move Image Forgery Detection,” 2020 11th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2020, 2020, doi: 10.1109/ICCCNT49239.2020.9225658.
M. T. Jijina, L. Koshy, and G. S. Warrier, “Detection of Recoloring and Copy-Move Forgery in Digital Images,” Proc. - 2020 5th Int. Conf. Res. Comput. Intell. Commun. Networks, ICRCICN 2020, pp. 49–53, 2020, doi: 10.1109/ICRCICN50933.2020.9296173.
G. Bobashev, N. G. Baldasaro, K. C. Mills, and J. L. Davis, “An Efficiency-Decay Model for Lumen Maintenance,” IEEE Trans. Device Mater. Reliab., vol. 16, no. 3, pp. 277–281, 2016, doi: 10.1109/TDMR.2016.2584926.
M. S. Rana, M. M. Hasan, and S. K. S. Shuva, “Digital Watermarking Image Using Discrete Wavelet Transform and Discrete Cosine Transform with Noise Identification,” 2022 2nd Int. Conf. Intell. Technol. CONIT 2022, no. August, pp. 1–5, 2022, doi: 10.1109/CONIT55038.2022.9847745.
T. Das, R. Hasan, M. R. Azam, and J. Uddin, “A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform,” Int. Conf. Comput. Commun. Chem. Mater. Electron. Eng. IC4ME2 2018, pp. 1–4, 2018, doi: 10.1109/IC4ME2.2018.8465668.
P. Dingbang, C. Hao, S. Xiaochong, and L. Jianxun, “Motion blurred star image centroid optimized extraction based on prior Gaussian distribution,” Proc. 29th Chinese Control Decis. Conf. CCDC 2017, pp. 3149–3154, 2017, doi: 10.1109/CCDC.2017.7979049.
Y. Fan and Helbert, “Detection of Image Splicing using Illuminant Color Estimation,” 2019.
T. Julliand et al., “Automated Image Splicing Detection from Noise Estimation in Raw Images To cite this version : HAL Id : hal-01510075 Automated Image Splicing Detection from Noise Estimation in Raw Images,” 2017.
T. Julliand, V. Nozick, and H. Talbot, “Automated image splicing detection from noise estimation in raw images,” IET Semin. Dig., vol. 2015, no. 5, 2015, doi: 10.1049/ic.2015.0111.
D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB)”, JuTISI, vol. 2, no. 3, Dec. 2016.
D. E. Kurniawan, N. R. Hartadi, and P. Prasetyawan, “Analisis Hasil Teknik Penyembunyian Hak Cipta Menggunakan Transformasi DCT dan RSPPMC pada Jejaring Sosial,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 3, Art. no. 3, Aug. 2018, doi: 10.25126/jtiik.201853692.
K. H. Hingrajiya and R. K. Sheth, "Comparative Study of Digital Image Forgery Detection Techniques," 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2021, pp. 83-86, doi: 10.1109/ICACITE51222.2021.9404748.
E. A. Armas Vega, E. González Fernández, A. L. Sandoval Orozco and L. J. García Villalba, "Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression," in IEEE Access, vol. 8, pp. 11815-11823, 2020, doi: 10.1109/ACCESS.2020.2964516.
H. Tomita and T. Minamoto, "Detection of Stained Chrysotile in Microscopic Images Using Wavelet-Based Texture Features," 2022 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), Toyama, Japan, 2022, pp. 19-24, doi: 10.1109/ICWAPR56446.2022.9947130.
Copyright (c) 2024 Zumratul Muhidin, Muh. Nasirudin Karim, Muhamad Masjun Efendi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).