International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 9 , Issue 2 , PP: 24-29, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

An Efficient Detection of Copy-Move Forgery Using Phase Correlation

L. Chitirap Paavai 1 * , V. Vadivu 2 , L. Krishnan 3 *

  • 1 Assistant Professor, Department of ECE, Knowledge Institute of Technology, Salem, Tamil Nadu, India - (vsece@kiot.ac.in)
  • 2 Assistant Professor, Department of ECE, Knowledge Institute of Technology, Salem, Tamil Nadu, India - (vvaece@kiot.ac.in)
  • 3 Assistant Professor, Department of Civil, Knowledge Institute of Technology, Salem, Tamil Nadu, India - (lkcivil@kiot.ac.in)
  • Doi: https://doi.org/10.54216/IJWAC.090203

    Received: February 05, 2025 Revised: February 20, 2025 Accepted: March 22, 2025
    Abstract

    Creating images is one of the main focuses of digital image processing. There are multiple techniques to spot image fraud. This work proposes a new approach to detect attacks that mimic Copy-Move forgeries. The proposed method applies DWT on the input image to create a reduced dimensional representation of the image. After that, the compressed image is divided into overlapping blocks. After these blocks are sorted, phase correlation is utilized as a similarity criterion to find duplicate blocks. Due to DWT usage, the lowest-level picture representation is first employed for detection. This work also covers the examination of numerous limits that are imposed to the input image, and the results are used in the analysis that follows.

    Keywords :

    Copy-Move forgery , Digital forensics , DWT , Phase correlation

    References

    [1] S. Khan and A. Kulkarni, "Reduced Time Complexity for Detection of Copy-Move Forgery using Discrete Wavelet Transform," Int. J. Comput. Appl., vol. 6, no. 7, Sep. 2010.​

    [2] T. Zhang and R.-d. Wang, "Copy move forgery detection based on SVD in digital image," in Proc. IEEE, 2009.​

    [3] B. Ahmed, T. A. Gulliver, and S. alZahir, "Blind copy-move forgery detection using SVD and KS test," SN Appl. Sci., vol. 2, no. 1377, 2020, doi: 10.1007/s42452-020-3181-6.​

    [4] J. Fridrich, D. Soukal, and J. Lukas, "Detection of copy-move forgery in digital images," in Proc. Digit. Forensic Res. Workshop, Cleveland, OH, USA, 2003.​

    [5] A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Dartmouth College, Hanover, NH, USA, Tech. Rep. TR2004-515, 2004.​

    [6] D. A. Talbert and D. Fisher, "An empirical analysis of techniques for constructing and searching k-dimensional trees," in Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., 2000, pp. 26–33.​

    [7] I.-K. Jung and S. Lacroix, "A Robust Interest Point Matching Algorithm," in Proc. Int. Conf. Comput. Vis., 2001.​

    [8] N. Sugirtham et al., "Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern," Int. J. Netw. Distrib. Comput., vol. 12, pp. 108–118, 2024, doi: 10.1007/s44227-023-00019-4.​

    [9] B. Thiyaneswaran, K. Anguraj, S. Kumarganesh, and K. Thangaraj, "Early Detection of Melanoma Images using gray level co‐occurrence matrix Features and Machine Learning Techniques for Effective Clinical Diagnosis," Int. J. Imaging Syst. Technol., vol. 31, no. 2, pp. 682–694, 2021.​

    [10] [Authors not specified], "A Hybrid SWT-SVD Based Multiresolution Features for Robust Image Copy-Move Forgery Detection," Multimed. Tools Appl., vol. [Volume], no. [Issue], pp. [Pages], 2022, doi: 10.1007/s11042-023-17279-5.​

    [11] [Authors not specified], "An approach for copy-move image multiple forgery detection based on an attention mechanism," Knowl.-Based Syst., vol. [Volume], pp. [Pages], 2022, doi: 10.1016/j.knosys.2023.109197.​

    Cite This Article As :
    Chitirap, L.. , Vadivu, V.. , Krishnan, L.. An Efficient Detection of Copy-Move Forgery Using Phase Correlation. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2025, pp. 24-29. DOI: https://doi.org/10.54216/IJWAC.090203
    Chitirap, L. Vadivu, V. Krishnan, L. (2025). An Efficient Detection of Copy-Move Forgery Using Phase Correlation. International Journal of Wireless and Ad Hoc Communication, (), 24-29. DOI: https://doi.org/10.54216/IJWAC.090203
    Chitirap, L.. Vadivu, V.. Krishnan, L.. An Efficient Detection of Copy-Move Forgery Using Phase Correlation. International Journal of Wireless and Ad Hoc Communication , no. (2025): 24-29. DOI: https://doi.org/10.54216/IJWAC.090203
    Chitirap, L. , Vadivu, V. , Krishnan, L. (2025) . An Efficient Detection of Copy-Move Forgery Using Phase Correlation. International Journal of Wireless and Ad Hoc Communication , () , 24-29 . DOI: https://doi.org/10.54216/IJWAC.090203
    Chitirap L. , Vadivu V. , Krishnan L. [2025]. An Efficient Detection of Copy-Move Forgery Using Phase Correlation. International Journal of Wireless and Ad Hoc Communication. (): 24-29. DOI: https://doi.org/10.54216/IJWAC.090203
    Chitirap, L. Vadivu, V. Krishnan, L. "An Efficient Detection of Copy-Move Forgery Using Phase Correlation," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 24-29, 2025. DOI: https://doi.org/10.54216/IJWAC.090203