• Indexed in

  • Latest News

    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2022
    Volume 11, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2022
    Volume 11, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Comparative Study of Various Forgery Detection Approach for Image Processing

    Author(s): KUMARI, Manish; SHARMA, Rajesh

    Quick view | Full article | Citations | Views: 184

    Author(s) keywords: ,

    Reference keywords: ,


    Considering the availability of powerful image analysis and editing tools, digital images are easy to change and transfer. This is necessary to link or erase any important elements from any image without escaping any valid visible signs of interfering. Including its real-life apps in different areas, the copy move forgery method is analyzed in depth. Implementation phases for the detection of image forgery are also clarified, accompanied by various approaches using copy move forgery approach.


    [1]. Schetinger, M. Iuliani, A. Piva, M. M. Oliveira, “Digital Image Forensics vs. Image Composition: An Indirect Arms Race,” pp. 1–13, 2016.
    [2]. E. Ardizzone, A. Bruno, G. Mazzola, “Copy-Move Forgery Detection by Matching Triangles of Keypoints,” IEEE Trans. Inf. Forensics Secur., Volume 10, Issue 10, pp. 2084-2094, 2015.
    [3]. H.Farid,”A survey of image forgery detection”, IEEE Signal Processing Magazine, pp. 6-25, 2006.
    [4]. Y. Y Yeap, “Image Forensic for Digital Image Copy Move Forgery Detection”, IEEE 14th International Colloquium on Signal Processing & its Applications (CSPA), 2018.
    [5]. A.Thaplia, “Digital Image Forgery - A threaten to Digital Forensics” ,IEEE,2016.
    [6]. S. K.Mahana, “Digital Image Forgery Detection of Recent Technology and Engineering” , IJRTE , Volume 8, Issue-23, 2019.
    [7]. K. Ashgar, “Review of Image Splicing Forgeries”, Volume 7, Issue 1, 2017.
    [8]. Parameswaran N., V Dr. N Sugitha, “Digital Image Forgery - A threaten to Digital Forensics” International Conference on Circuit, Power and Computing Technologies [ICCPCT], 2016.
    [9]. Yue Wu, Wael Abd-Almageed, Prem Natarajan, “Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network”, IEEE Winter Conference on Applications of Computer Vision, 2018.
    [10]. J. Fridrich, D. Soukal, and J. Lukáš, “Detection of CopyMove Forgery in Digital Images,” Int. J., Volume 3, Issue 2, pp. 652–663, 2003.
    [11]. Gill, N. K., Garg, R., Doegar, E. A., “A review paper on digital image forgery detection techniques”, 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2017.
    [12]. Gavin Lynch, Frank Y.Shih and Hong-Yuan Mark Liao, "An efficient expanding block algorithm for image copy-move forgery detection", Elsevier Inc., 2013.
    [13]. E.Ardizzone, A.Bruno and G.Mazzola, ”Copy-move forgery detection via texture description”, ACM Workshop on multimedia in forensics, security and intelligence, pp.59-64, 2010.
    [14]. B.Soloria and A.K.Nandi, ”Automated detection and localization of duplicated regions affected by reflection,rotation and scaling in image forensics”, International Journal of signal Processing, pp.1759-1770, 2011.
    [15]. Ashima Gupta, Nisheeth Saxena and S.K Vasistha, "Detecting Copy move Forgery using DCT", International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013.
    [16]. M. N. Nazli, A. Y. A. Maghari, "Comparison between image forgery detection algorithms," 2017 8th International Conference on Information Technology (ICIT), pp. 442-445, 2017.
    [17]. H. Huang, W. Guo, Y. Zhang, “Detection Of Copy-Move Forgery in Digital Images Using SIFT Algorithm”, in: IEEE Pacific-Asia Work. Comput. Intell. Ind. Appl., IEEE, pp. 272–276, 2008.
    [18]. An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform Volume 02, No. 05, 2010, 1801-1806.
    [19]. Grabner, H., Nguyen, T. T., Gruber, B., Bischof, H., “On-line boosting based car detection from aerial images”, ISPRS Journal of Photo grammetry and Remote Sensing, Volume 63, Issue 3, pp.382-396, 2008.
    [20]. R., Rajkumar, M. Singh, “Digital image forgery detection using SIFT feature”, International Symposium on Advanced Computing and Communication (ISACC), 2015.
    [21]. B.Mahdian, S.Saic, ”Blind methods for detecting image fakery”, IEEE Aerospace Electron. System Management, pp.18-24, 2010.
    [22]. B.L.Shivakumar and S.S.Baboo, ”Detecting copy-move forgery in digital images: a survey and analysis of current methods”, Global Journal of Computer Science., pp.61-65, 2010.
    [23]. Navpreet Kaur G., Ruhi Garg, A., Doegar, “A Review Paper on Digital Image Forgery Detection Techniques 8th ICCCNT, IEEE, 2017.
    [24]. Bo Liu, Chi-M. Pun, Xiao-Chen Yuan, “Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies “, Hindawi, 2014.
    [25]. O. M. Al-Qershi , B. E. Khoo, “Passive detection of copy-move forgery in digital images: State-of-the-art,” Forensic science international, Volume 231, Issue 1, pp. 284-295, 2013.
    [26]. C. Rajalakshmi, M. Germanus Alex, “Study of image tempering and review of tampering detection techniques”, Volume 8, Issue7, 2017.
    [27]. Abhishek K., Rajesh S.Parmar, Megha Agarwal, H., “ An Evaluation of Digital Image Forgery Detection Approaches “, 2017.
    [28]. J. Wadhwa, T. Ahemad, R., Dixit, “On parameterization of block based copy-move forgery detection techniques”, Conf. Res. Adapt. Converg. Syst. - RACS, pp. 125–130, 2015.
    [29]. A. C. Popescu, H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” IEEE, 2004.
    [30]. X. Kang, and S. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,” International Conference on Computer Science and Software Engineering, Volume 3, pp. 926-930, 2008.
    [31]. N. Muhammad, M. Hussain, G. Muhammad, G. Bebis, “Copy-Move Forgery Detection Using Dyadic Wavelet Transform,” Eighth International Conference on Computer Graphics, Imaging and Visualization (CGIV), pp. 103-108,2011.
    [32]. Tabassam Nawaz, AunIrtaza, R., MohsinShah, Muhammad Tariq Mahmood, “Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images“, 2016.
    [33]. Gul M., Eda S., Guzin, “Keypoint Based Copy Move Forgery Detection Techniques”, IEEE, 2017.
    [34]. Hui-Yu Huang, & Ai-Jhen Ciou, “Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation”, Springer, Volume 68, 2019.
    [35]. Songpon Teerakanok and Tetsutaro Uehara, “Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis“, Volume 9, 2019.

    Additional Information

    Article Title: Comparative Study of Various Forgery Detection Approach for Image Processing
    Author(s): KUMARI, Manish; SHARMA, Rajesh
    Date of Publication: 2021-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2021.01.02
    Issue: Volume 10, Issue 1, Year 2021
    Section: Advances in Information Security Research
    Page Range: 18-26 (9 pages)

    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.