Loading…

Copy-move forgery detection technique based on discrete cosine transform blocks features

With the increasing number of software applications that allow altering digital images and their ease of use, they weaken the credibility of an image. This problem, together with the ease of distributing information through the Internet (blogs, social networks, etc.), has led to a tendency for infor...

Full description

Saved in:
Bibliographic Details
Published in:Neural computing & applications 2021-05, Vol.33 (10), p.4713-4727
Main Authors: Armas Vega, Esteban Alejandro, González Fernández, Edgar, Sandoval Orozco, Ana Lucila, García Villalba, Luis Javier
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the increasing number of software applications that allow altering digital images and their ease of use, they weaken the credibility of an image. This problem, together with the ease of distributing information through the Internet (blogs, social networks, etc.), has led to a tendency for information to be accepted as true without its veracity being questioned. Image counterfeiting has become a major threat to the credibility of the information. To deal with this threat, forensic image analysis is aimed at detecting and locating image forgeries using multiple clues that allows it to determine the veracity or otherwise of an image. In this paper, we present a method for the authentication of images. The proposed method performs detection of copy-move alterations within an image, using the discrete cosine transform. The characteristics obtained from these coefficients allow us to obtain transfer vectors, which are grouped together. Through the use of a tolerance threshold, it is possible to determine whether there are regions copied and pasted within the analysed image. The results obtained from the experiments reported in this paper demonstrate the effectiveness of the proposed method. For the evaluation of the proposed methods, experiments were carried out with public databases of falsified images that are widely used in the literature.
ISSN:0941-0643
1433-3058
DOI:10.1007/s00521-020-05433-1