Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images

Authors

  • Esha Tripathi Institute of Engineering & Technology, AKTU Lucknow, 226021, INDIA
  • Upendra Kumar Institute of Engineering & Technology, AKTU Lucknow, 226021, INDIA
  • Surya Prakash Tripathi R R Institute of Modern Technology, AKTU Lucknow, 226201, INDIA

Keywords:

Copy-move tampering, image forensic, discrete cosine transform, clustering, Fuzzy C means, copy-move forgery detection

Abstract

Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed.

Downloads

Download data is not yet available.

Downloads

Published

17-10-2023

How to Cite

Tripathi, E., Kumar, U., & Tripathi, S. P. (2023). Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images. International Journal of Integrated Engineering, 15(4), 201-225. https://penerbit.uthm.edu.my/ojs/index.php/ijie/article/view/10973