Volume 17 , Issue 1 , PP: 409-424, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Heba Adnan Raheem 1 *
Doi: https://doi.org/10.54216/JISIoT.170129
In the area of digital information, establishing the authenticity of an image has grown to have greater significance as more and more persons have access to sophisticated image editing technologies. There is however a challenge in detecting such a forgery since it is usually very realistic and it is hard to know the difference between the real images and the fake ones. This paper aims at creation of a mechanism of identifying forged images based on Multiple Image Splicing Dataset (MISD) as a reference point. The suggested system will help to improve the results of the forgery detection, paying particular attention to the images processing during some of the pre-processing steps Firstly, converting colors into the hue-based histograms and RGB histograms, and hue-based histograms in an HSV, in comparison between the original and forged image, its HSV histogram, and its grayscale histogram, etc. Lastly, compute MSE and SSIM original and forged image. The implementation results showed that average value of MSE and SSIM metrics on Multiple Image Splicing Dataset (MISD) equal to 184.82 and 0.65 respectively that means the suggested method proved the efficiency of the technique to identify forged images as quickly as possible but still retain accuracy.
Image forgery , Image splicing , Feature extraction , MSE , SSIM
[1] A. Khayeat, "Copy-move forgery detection in digital images," Ph.D. dissertation, Cardiff Univ., Cardiff, U.K., 2017.
[2] A. Cepak and T. J. Mesyn, "Fakes, forgery, and Facebook," in Handbook of Visual Communication, 1st ed., S. Josephson, J. D. Kelly, and K. Smith, Eds. New York, NY, USA: Routledge, 2020, pp. 465–480.
[3] S. M. Pizer et al., "Adaptive histogram equalization and its variations," Computer Vision, Graphics, and Image Processing, vol. 39, no. 3, pp. 355–368, 1987.
[4] R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. Upper Saddle River, NJ, USA: Prentice-Hall Inc., 2007.
[5] D. G. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, 2004.
[6] R. C. Gonzalez and R. E. Woods, Digital Image Processing, 4th ed. New York, NY, USA: Pearson Education, 2018.
[7] B. S. Kumar, S. Karthi, K. Karthika, and R. Cristin, "A systematic study of image forgery detection," Journal of Computational and Theoretical Nanoscience, vol. 15, no. 8, pp. 2560–2564, 2018.
[8] Kaur and J. Rani, "Digital image forgery and techniques of forgery detection: A brief review," International Journal of Technical Research and Science, vol. 1, no. 4, pp. 18–24, 2016.
[9] Q. C. Yang and C. L. Huang, "Copy-move forgery detection in digital image," in Advances in Multimedia Information Processing – PCM 2009 (Lecture Notes in Computer Science, vol. 5879), P. Muneesawang et al., Eds. Berlin, Germany: Springer, 2009.
[10] V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841–1854, Dec. 2012.
[11] Tao, C. Li, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122–138, 2014.
[12] Fridrich, "Robust bit extraction from images," in Proceedings of the IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, Jun. 1999, vol. 2, pp. 536–540.
[13] K. Doke and S. M. Patil, "Digital signature scheme for image," International Journal of Computer Applications, vol. 49, no. 16, pp. 1–6, 2012.
[14] B. Shwetha and S. V. Sathyanarayana, "Digital image forgery detection techniques: A survey," ACCENTS Transactions on Information Security, vol. 2, no. 5, pp. 22–31, 2017.
[15] C.-M. Pun, X.-C. Yuan, and X.-L. Bi, "Image forgery detection using adaptive oversegmentation and feature point matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705–1716, Aug. 2015.
[16] Fridrich, D. Soukal, and J. Lukas, "Detection of copy-move forgery in digital images," in Proceedings of the Digital Forensic Research Workshop (DFRWS), vol. 3, no. 2, pp. 652–663, 2003.
[17] Z. Zhang, C. Wang, and X. Zhou, "A survey on passive image copy-move forgery detection," Journal of Information Processing Systems, vol. 14, no. 1, pp. 6–31, 2018.
[18] R. Sekhar and R. S. Shaji, "A study on segmentation-based copy-move forgery detection using DAISY descriptor," in Proceedings of the International Conference on Soft Computing Systems (Advances in Intelligent Systems and Computing, vol. 398), L. Suresh and B. Panigrahi, Eds. New Delhi, India: Springer, 2016.
[19] N. Dalal and B. Triggs, "Histograms of oriented gradients for human detection," in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), San Diego, CA, USA, 2005, vol. 1, pp. 886–893.
[20] D. W. Scott, "Scott’s rule," WIREs Computational Statistics, vol. 2, no. 4, pp. 497–502, Jul./Aug. 2010.
[21] Z. Xu, Y. Liu, S. Du, P. Wu, and J. Li, "DFOB: Detecting and describing features by octagon filter bank for fast image matching," Signal Processing: Image Communication, vol. 41, pp. 61–71, 2016.
[22] Zhang, Y. Li, S. Niu, Z. Cao, and X. Wang, "Improved fully convolutional network for digital image region forgery detection," Computers, Materials & Continua, vol. 60, no. 1, pp. 287–303, 2019.
[23] H. A. Jalab, T. Subramaniam, R. W. Ibrahim, H. Kahtan, and N. F. M. Noor, "New texture descriptor based on modified fractional entropy for digital image splicing forgery detection," Entropy, vol. 21, no. 4, p. 371, 2019.
[24] B. Ahmed, T. A. Gulliver, and S. alZahir, "Image splicing detection using Mask R-CNN," Signal, Image and Video Processing, vol. 14, no. 5, pp. 1035–1042, 2020.
[25] M. Islam, G. Karmakar, J. Kamruzzaman, and M. Murshed, "A robust forgery detection method for copy–move and splicing attacks in images," Electronics, vol. 9, no. 9, p. 1500, 2020.
[26] H. Siddiqi et al., "Image splicing-based forgery detection using discrete wavelet transform and edge weighted local binary patterns," Security and Communication Networks, vol. 2021, Art. no. 4270776, 2021.
[27] X. Bi, Z. Zhang, Y. Liu, B. Xiao, and W. Li, "Multi-task wavelet corrected network for image splicing forgery detection and localization," in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), Jul. 2021, pp. 1–6.
[28] Habibi and H. Hassanpour, "Splicing image forgery detection and localization based on color edge inconsistency using statistical dispersion measures," International Journal of Engineering, vol. 34, no. 2, pp. 443–451, 2021.
[29] D. Kadam, S. Ahirrao, and K. Kotecha, "Multiple image splicing dataset (MISD): A dataset for multiple splicing," Data, vol. 6, no. 10, p. 102, 2021.
[30] M. Hosny, A. M. Mortda, N. A. Lashin, and M. M. Fouda, "A new method to detect splicing image forgery using convolutional neural network," Applied Sciences, vol. 13, no. 3, p. 1272, 2023.
[31] H. Ding, L. Chen, Q. Tao, Z. Fu, L. Dong, and X. Cui, "DCU-Net: A dual-channel U-shaped network for image splicing forgery detection," Neural Computing and Applications, vol. 35, no. 7, pp. 5015–5031, 2023.
[32] Dammak, M. Mejdoub, and C. Ben Amar, "Histogram of dense subgraphs for image representation," IET Image Processing, vol. 9, no. 3, pp. 184–191, 2015.
[33] H. Mohammed, D. H. Badr, and F. Ali, "Detection of image forgery using information standard method with SVM," Journal of Physics: Conference Series, vol. 1818, no. 1, p. 012212, 2021.