Analysis of Copy-move Manipulation in Digital Images using Scale Invariant Feature Transform (SIFT) and SVD-matching Methods
Abstract
In recent years, more and more data has been created in digital form, allowing for easier control over storage and manipulation thanks to technological advancements. Unfortunately, these advancements also bring with them many risks, especially those related to the security of digital files. One of the concerns of many organisations is digital forgery, as it is increasingly easy to create fake images without leaving obvious traces of manipulation. One form of image forgery known as ‘copy-move’ is considered one of the most difficult problems in forgery detection. In this case, a portion of an image is copied and pasted at another location in the same image to hide unwanted objects in the scene. In this paper, we propose a method that automatically detects duplication areas within the same image. Duplication detection is performed by identifying local characteristics of the image (key points) using the Scale Invariant Feature Transform (SIFT) method and matching identical features using the Singular Value Decomposition (SVD) method. The results obtained show that our proposed hybrid method is robust to geometric transformations and is able to detect duplication areas with high performance.
Downloads
References
I. T. Ahmed, B. T. Hammad, and N. Jamil, “Image Copy-Move Forgery Detection Algorithms Based on Spatial Feature Domain,” Proceeding - 2021 IEEE 17th Int. Colloq. Signal Process. Its Appl. CSPA 2021, no. March, pp. 92–96, 2021, doi: 10.1109/CSPA52141.2021.9377272.
A. Aimen, A. Kaur, and S. Sidheekh, “Scale Invariant Fast PHT based Copy-Move Forgery Detection,” 2020 11th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2020, 2020, doi: 10.1109/ICCCNT49239.2020.9225276.
M. Salman and A. Uhl, “Countering anti-forensics of SIFT-based copy-move detection,” Proc. - Int. Conf. Pattern Recognit., pp. 2701–2707, 2020, doi: 10.1109/ICPR48806.2021.9413012.
B. G. Rosy Dewi Arianti Saptoyo, “Kominfo Temukan 12.547 Konten Hoaks 5 Tahun Terakhir.” kompas, Jakarta, 2024. [Online]. Available: https://www.kompas.com/
Hanifah Triari Husna, “Sampai Mei 2023, Kominfo Identifikasi 11.642 Konten Hoaks.” kominfo, Jakarta, 2023. [Online]. Available: https://aptika.kominfo.go.id/
R. S. Khalaf and A. Varol, “Digital forensics: Focusing on image forensics,” 7th Int. Symp. Digit. Forensics Secur. ISDFS 2019, pp. 1–5, 2019, doi: 10.1109/ISDFS.2019.8757557.
R. Ashraf, M. S. Mehmood, T. Mahmood, J. Rashid, M. W. Nisar, and M. Shah, “An Efficient Forensic Approach for Copy-move Forgery Detection via Discrete Wavelet Transform,” 1st Annu. Int. Conf. Cyber Warf. Secur. ICCWS 2020 - Proc., 2020, doi: 10.1109/ICCWS48432.2020.9292372.
X. Bi, Z. Zhang, Y. Liu, B. Xiao, and W. Li, “Multi-Task Wavelet Corrected Network for Image Splicing Forgery Detection and Localization,” Proc. - IEEE Int. Conf. Multimed. Expo, 2021, doi: 10.1109/ICME51207.2021.9428466.
T. Nazir, A. Irtaza, A. Javed, H. Malik, A. Mehmood, and M. Nawaz, “Digital Image Forensic Analysis using Hybrid Features,” 2021 Int. Conf. Artif. Intell. ICAI 2021, pp. 33–36, 2021, doi: 10.1109/ICAI52203.2021.9445228.
K. Sunitha and A. N. Krishna, “Efficient Keypoint based Copy Move Forgery Detection Method using Hybrid Feature Extraction,” 2nd Int. Conf. Innov. Mech. Ind. Appl. ICIMIA 2020 - Conf. Proc., no. Icimia, pp. 670–675, 2020, doi: 10.1109/ICIMIA48430.2020.9074951.
M. S. Rana, M. M. Hasan, and S. K. S. Shuva, “Digital Watermarking Image Using Discrete Wavelet Transform and Discrete Cosine Transform with Noise Identification,” 2022 2nd Int. Conf. Intell. Technol. CONIT 2022, no. August, pp. 1–5, 2022, doi: 10.1109/CONIT55038.2022.9847745.
W. Y. Min, E. Romanova, Y. Lisovec, and A. M. San, “Application of statistical data processing for solving the problem of face recognition by using principal components analysis method,” Proc. 2019 IEEE Conf. Russ. Young Res. Electr. Electron. Eng. ElConRus 2019, no. 1, pp. 2208–2212, 2019, doi: 10.1109/EIConRus.2019.8657240.
J. Flusser, S. Farokhi, C. Höschl, T. Suk, B. Zitová, and M. Pedone, “Recognition of images degraded by Gaussian blur,” IEEE Trans. Image Process., vol. 25, no. 2, pp. 790–806, 2016, doi: 10.1109/TIP.2015.2512108.
B. Fan et al., “A performance evaluation of local features for image-based 3D reconstruction,” IEEE Trans. Image Process., vol. 28, no. 10, pp. 4774–4789, 2019, doi: 10.1109/TIP.2019.2909640.
J. Thayyil and K. Edet Bijoy, “Digital Image Forgery Detection using Graph Fourier Transform,” Int. Conf. Futur. Technol. Control Syst. Renew. Energy, ICFCR 2020, pp. 1–5, 2020, doi: 10.1109/ICFCR50903.2020.9249969.
A. Kaur, S. Walia, and K. Kumar, “Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods,” 2018 11th Int. Conf. Contemp. Comput. IC3 2018, pp. 1–5, 2018, doi: 10.1109/IC3.2018.8530489.
K. Ramirez-Gutierrez, Mariko-Nakano, G. Sanchez-Perez, and H. Perez-Meana, “Copy-move forgery detection algorithm using frequency transforms, surf and mser,” 2019 7th Int. Work. Biometrics Forensics, IWBF 2019, pp. 1–6, 2019, doi: 10.1109/IWBF.2019.8739168.
J. He, Y. Xie, X. Luan, X. Niu, and X. Zhang, “A TV logo detection and recognition method based on SURF feature and bag-of-words model,” 2016 2nd IEEE Int. Conf. Comput. Commun. ICCC 2016 - Proc., pp. 370–374, 2017, doi: 10.1109/CompComm.2016.7924725.
D. Mahalakshmi and C. Science, “Copy - Move Image Forgery Detection System Using Hybrid Method,” Int. J. Eng. Sci. Invent. Res. Dev., vol. III, no. XI, pp. 692–698, 2017.
W. Song, X. Hu, J. Fu, Q. Zhou, T. Zhou, and P. Si, “The method of hybrid-laser image spot extracts based on HSV space SVD for power transmission line detection,” 2016 IEEE Int. Conf. Inf. Autom. IEEE ICIA 2016, no. August, pp. 1361–1364, 2017, doi: 10.1109/ICInfA.2016.7832031.
S. Bhosale, G. Thube, P. Jangam, and R. Borse, “Employing SVD and wavelets for digital image forensics and tampering detection,” Proc. 2012 Int. Conf. Adv. Mob. Networks, Commun. Its Appl. MNCApps 2012, pp. 135–138, 2012, doi: 10.1109/MNCApps.2012.35.
A. Kashyap, M. Agarwal, and H. Gupta, “Detection of copy-move image forgery using SVD and cuckoo search algorithm,” Int. J. Eng. Technol., vol. 7, no. 2, pp. 79–87, 2018, doi: 10.14419/ijet.v7i2.13.11604.
Copyright (c) 2025 Muhamad Masjun Efendi, Nukman Nukman
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).