Volume 9 , Issue 2 , PP: 24-29, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
L. Chitirap Paavai 1 * , V. Vadivu 2 , L. Krishnan 3 *
Doi: https://doi.org/10.54216/IJWAC.090203
Creating images is one of the main focuses of digital image processing. There are multiple techniques to spot image fraud. This work proposes a new approach to detect attacks that mimic Copy-Move forgeries. The proposed method applies DWT on the input image to create a reduced dimensional representation of the image. After that, the compressed image is divided into overlapping blocks. After these blocks are sorted, phase correlation is utilized as a similarity criterion to find duplicate blocks. Due to DWT usage, the lowest-level picture representation is first employed for detection. This work also covers the examination of numerous limits that are imposed to the input image, and the results are used in the analysis that follows.
Copy-Move forgery , Digital forensics , DWT , Phase correlation
[1] S. Khan and A. Kulkarni, "Reduced Time Complexity for Detection of Copy-Move Forgery using Discrete Wavelet Transform," Int. J. Comput. Appl., vol. 6, no. 7, Sep. 2010.
[2] T. Zhang and R.-d. Wang, "Copy move forgery detection based on SVD in digital image," in Proc. IEEE, 2009.
[3] B. Ahmed, T. A. Gulliver, and S. alZahir, "Blind copy-move forgery detection using SVD and KS test," SN Appl. Sci., vol. 2, no. 1377, 2020, doi: 10.1007/s42452-020-3181-6.
[4] J. Fridrich, D. Soukal, and J. Lukas, "Detection of copy-move forgery in digital images," in Proc. Digit. Forensic Res. Workshop, Cleveland, OH, USA, 2003.
[5] A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Dartmouth College, Hanover, NH, USA, Tech. Rep. TR2004-515, 2004.
[6] D. A. Talbert and D. Fisher, "An empirical analysis of techniques for constructing and searching k-dimensional trees," in Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., 2000, pp. 26–33.
[7] I.-K. Jung and S. Lacroix, "A Robust Interest Point Matching Algorithm," in Proc. Int. Conf. Comput. Vis., 2001.
[8] N. Sugirtham et al., "Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern," Int. J. Netw. Distrib. Comput., vol. 12, pp. 108–118, 2024, doi: 10.1007/s44227-023-00019-4.
[9] B. Thiyaneswaran, K. Anguraj, S. Kumarganesh, and K. Thangaraj, "Early Detection of Melanoma Images using gray level co‐occurrence matrix Features and Machine Learning Techniques for Effective Clinical Diagnosis," Int. J. Imaging Syst. Technol., vol. 31, no. 2, pp. 682–694, 2021.
[10] [Authors not specified], "A Hybrid SWT-SVD Based Multiresolution Features for Robust Image Copy-Move Forgery Detection," Multimed. Tools Appl., vol. [Volume], no. [Issue], pp. [Pages], 2022, doi: 10.1007/s11042-023-17279-5.
[11] [Authors not specified], "An approach for copy-move image multiple forgery detection based on an attention mechanism," Knowl.-Based Syst., vol. [Volume], pp. [Pages], 2022, doi: 10.1016/j.knosys.2023.109197.