Analysis of Copy-move Manipulation in Digital Images using Scale Invariant Feature Transform (SIFT) and SVD-matching Methods

  • Muhamad Masjun Efendi Universitas Teknologi Mataram
  • Nukman Nukman Institut Teknologi dan Kesehatan Aspirasi
Keywords: Manipulation, Image, Copy-move, SIFT, SVD-matching

Abstract

In recent years, more and more data has been created in digital form, allowing for easier control over storage and manipulation thanks to technological advancements. Unfortunately, these advancements also bring with them many risks, especially those related to the security of digital files. One of the concerns of many organisations is digital forgery, as it is increasingly easy to create fake images without leaving obvious traces of manipulation. One form of image forgery known as ‘copy-move’ is considered one of the most difficult problems in forgery detection. In this case, a portion of an image is copied and pasted at another location in the same image to hide unwanted objects in the scene. In this paper, we propose a method that automatically detects duplication areas within the same image. Duplication detection is performed by identifying local characteristics of the image (key points) using the Scale Invariant Feature Transform (SIFT) method and matching identical features using the Singular Value Decomposition (SVD) method. The results obtained show that our proposed hybrid method is robust to geometric transformations and is able to detect duplication areas with high performance.

Downloads

Download data is not yet available.

References

I. T. Ahmed, B. T. Hammad, and N. Jamil, “Image Copy-Move Forgery Detection Algorithms Based on Spatial Feature Domain,” Proceeding - 2021 IEEE 17th Int. Colloq. Signal Process. Its Appl. CSPA 2021, no. March, pp. 92–96, 2021, doi: 10.1109/CSPA52141.2021.9377272.

A. Aimen, A. Kaur, and S. Sidheekh, “Scale Invariant Fast PHT based Copy-Move Forgery Detection,” 2020 11th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2020, 2020, doi: 10.1109/ICCCNT49239.2020.9225276.

M. Salman and A. Uhl, “Countering anti-forensics of SIFT-based copy-move detection,” Proc. - Int. Conf. Pattern Recognit., pp. 2701–2707, 2020, doi: 10.1109/ICPR48806.2021.9413012.

B. G. Rosy Dewi Arianti Saptoyo, “Kominfo Temukan 12.547 Konten Hoaks 5 Tahun Terakhir.” kompas, Jakarta, 2024. [Online]. Available: https://www.kompas.com/

Hanifah Triari Husna, “Sampai Mei 2023, Kominfo Identifikasi 11.642 Konten Hoaks.” kominfo, Jakarta, 2023. [Online]. Available: https://aptika.kominfo.go.id/

R. S. Khalaf and A. Varol, “Digital forensics: Focusing on image forensics,” 7th Int. Symp. Digit. Forensics Secur. ISDFS 2019, pp. 1–5, 2019, doi: 10.1109/ISDFS.2019.8757557.

R. Ashraf, M. S. Mehmood, T. Mahmood, J. Rashid, M. W. Nisar, and M. Shah, “An Efficient Forensic Approach for Copy-move Forgery Detection via Discrete Wavelet Transform,” 1st Annu. Int. Conf. Cyber Warf. Secur. ICCWS 2020 - Proc., 2020, doi: 10.1109/ICCWS48432.2020.9292372.

X. Bi, Z. Zhang, Y. Liu, B. Xiao, and W. Li, “Multi-Task Wavelet Corrected Network for Image Splicing Forgery Detection and Localization,” Proc. - IEEE Int. Conf. Multimed. Expo, 2021, doi: 10.1109/ICME51207.2021.9428466.

T. Nazir, A. Irtaza, A. Javed, H. Malik, A. Mehmood, and M. Nawaz, “Digital Image Forensic Analysis using Hybrid Features,” 2021 Int. Conf. Artif. Intell. ICAI 2021, pp. 33–36, 2021, doi: 10.1109/ICAI52203.2021.9445228.

K. Sunitha and A. N. Krishna, “Efficient Keypoint based Copy Move Forgery Detection Method using Hybrid Feature Extraction,” 2nd Int. Conf. Innov. Mech. Ind. Appl. ICIMIA 2020 - Conf. Proc., no. Icimia, pp. 670–675, 2020, doi: 10.1109/ICIMIA48430.2020.9074951.

M. S. Rana, M. M. Hasan, and S. K. S. Shuva, “Digital Watermarking Image Using Discrete Wavelet Transform and Discrete Cosine Transform with Noise Identification,” 2022 2nd Int. Conf. Intell. Technol. CONIT 2022, no. August, pp. 1–5, 2022, doi: 10.1109/CONIT55038.2022.9847745.

W. Y. Min, E. Romanova, Y. Lisovec, and A. M. San, “Application of statistical data processing for solving the problem of face recognition by using principal components analysis method,” Proc. 2019 IEEE Conf. Russ. Young Res. Electr. Electron. Eng. ElConRus 2019, no. 1, pp. 2208–2212, 2019, doi: 10.1109/EIConRus.2019.8657240.

J. Flusser, S. Farokhi, C. Höschl, T. Suk, B. Zitová, and M. Pedone, “Recognition of images degraded by Gaussian blur,” IEEE Trans. Image Process., vol. 25, no. 2, pp. 790–806, 2016, doi: 10.1109/TIP.2015.2512108.

B. Fan et al., “A performance evaluation of local features for image-based 3D reconstruction,” IEEE Trans. Image Process., vol. 28, no. 10, pp. 4774–4789, 2019, doi: 10.1109/TIP.2019.2909640.

J. Thayyil and K. Edet Bijoy, “Digital Image Forgery Detection using Graph Fourier Transform,” Int. Conf. Futur. Technol. Control Syst. Renew. Energy, ICFCR 2020, pp. 1–5, 2020, doi: 10.1109/ICFCR50903.2020.9249969.

A. Kaur, S. Walia, and K. Kumar, “Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods,” 2018 11th Int. Conf. Contemp. Comput. IC3 2018, pp. 1–5, 2018, doi: 10.1109/IC3.2018.8530489.

K. Ramirez-Gutierrez, Mariko-Nakano, G. Sanchez-Perez, and H. Perez-Meana, “Copy-move forgery detection algorithm using frequency transforms, surf and mser,” 2019 7th Int. Work. Biometrics Forensics, IWBF 2019, pp. 1–6, 2019, doi: 10.1109/IWBF.2019.8739168.

J. He, Y. Xie, X. Luan, X. Niu, and X. Zhang, “A TV logo detection and recognition method based on SURF feature and bag-of-words model,” 2016 2nd IEEE Int. Conf. Comput. Commun. ICCC 2016 - Proc., pp. 370–374, 2017, doi: 10.1109/CompComm.2016.7924725.

D. Mahalakshmi and C. Science, “Copy - Move Image Forgery Detection System Using Hybrid Method,” Int. J. Eng. Sci. Invent. Res. Dev., vol. III, no. XI, pp. 692–698, 2017.

W. Song, X. Hu, J. Fu, Q. Zhou, T. Zhou, and P. Si, “The method of hybrid-laser image spot extracts based on HSV space SVD for power transmission line detection,” 2016 IEEE Int. Conf. Inf. Autom. IEEE ICIA 2016, no. August, pp. 1361–1364, 2017, doi: 10.1109/ICInfA.2016.7832031.

S. Bhosale, G. Thube, P. Jangam, and R. Borse, “Employing SVD and wavelets for digital image forensics and tampering detection,” Proc. 2012 Int. Conf. Adv. Mob. Networks, Commun. Its Appl. MNCApps 2012, pp. 135–138, 2012, doi: 10.1109/MNCApps.2012.35.

A. Kashyap, M. Agarwal, and H. Gupta, “Detection of copy-move image forgery using SVD and cuckoo search algorithm,” Int. J. Eng. Technol., vol. 7, no. 2, pp. 79–87, 2018, doi: 10.14419/ijet.v7i2.13.11604.

Published
2025-01-17
How to Cite
[1]
M. Efendi and N. Nukman, “Analysis of Copy-move Manipulation in Digital Images using Scale Invariant Feature Transform (SIFT) and SVD-matching Methods”, JAIC, vol. 9, no. 1, pp. 168-172, Jan. 2025.
Section
Articles