Forensic approach for distinguishing between source and destination regions in copy-move forgery
The copy-move forgery involves copying a semantically part from an image and pasting it into a different location within the same image to change the context of the image and deceive people. The copy-move forensic detectors authenticate the image and localize similar regions without identifying whic...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2023-08, Vol.82 (20), p.31181-31210 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 31210 |
---|---|
container_issue | 20 |
container_start_page | 31181 |
container_title | Multimedia tools and applications |
container_volume | 82 |
creator | Iseed, Saed Yacoub Mahmoud, Khaled Walid |
description | The copy-move forgery involves copying a semantically part from an image and pasting it into a different location within the same image to change the context of the image and deceive people. The copy-move forensic detectors authenticate the image and localize similar regions without identifying which region is original or forged. Because the forged region is replicated from another region of the same image, its characteristics have been inherited, making it difficult to distinguish between the original and forged regions. This paper proposes two approaches as a second stage, after localizing duplicated regions, to distinguish between source and destination regions. The adjacent pixels in images are non-independent and have some correlations that would be destroyed due to modifying the image. The deviation of these correlations would expose traces left due to the image forgery and is evaluated by the Joint Probability Matrix (JPM) in the first approach and by the Local Binary Pattern (LBP) in the second approach. Both approaches employ Jensen Shannon Divergence (JSD) to measure the correlation between feature vectors and generate similarity scores to distinguish between the source and the destination regions. The proposed approaches were demonstrated by employing the GRIP dataset with six post-processing operations to conceal forgery. The experiments exhibit a high accuracy rate of 96.25%. |
doi_str_mv | 10.1007/s11042-023-14824-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2842277408</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2842277408</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-bf8548284ffa18b8893b642db866b72831490e283628f438c4ab2df77bda4ee93</originalsourceid><addsrcrecordid>eNp9UD1PwzAUtBBIlMIfYLLEbPBXYmdEFQUkJBaYjZ3YbSpqBzsF9d_zSpDYmO4Nd_fuDqFLRq8ZpeqmMEYlJ5QLwqTmktAjNGOVEkQpzo7hFpoSVVF2is5K2VDK6orLGXpbpuxj6VtshyEn265xSBl3fRn7uNr1ZQ2AnR-_vI-4pF1uPbaxw50_MOzYp4izXwEU3EfcpmFPtunTH2xWPu_P0Umw78Vf_OIcvS7vXhYP5On5_nFx-0RawZqRuKArCK5lCJZpp3UjXC1553RdO8W1YLKhHrDmOkihW2kd74JSrrPS-0bM0dXkCy0-dhDObCBshJcGXDlXSlINLD6x2pxKyT6YIfdbm_eGUXNY0kxLGljS_CxpKIjEJCpAjlDqz_of1Td0WHdp</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2842277408</pqid></control><display><type>article</type><title>Forensic approach for distinguishing between source and destination regions in copy-move forgery</title><source>Springer Nature - Complete Springer Journals</source><creator>Iseed, Saed Yacoub ; Mahmoud, Khaled Walid</creator><creatorcontrib>Iseed, Saed Yacoub ; Mahmoud, Khaled Walid</creatorcontrib><description>The copy-move forgery involves copying a semantically part from an image and pasting it into a different location within the same image to change the context of the image and deceive people. The copy-move forensic detectors authenticate the image and localize similar regions without identifying which region is original or forged. Because the forged region is replicated from another region of the same image, its characteristics have been inherited, making it difficult to distinguish between the original and forged regions. This paper proposes two approaches as a second stage, after localizing duplicated regions, to distinguish between source and destination regions. The adjacent pixels in images are non-independent and have some correlations that would be destroyed due to modifying the image. The deviation of these correlations would expose traces left due to the image forgery and is evaluated by the Joint Probability Matrix (JPM) in the first approach and by the Local Binary Pattern (LBP) in the second approach. Both approaches employ Jensen Shannon Divergence (JSD) to measure the correlation between feature vectors and generate similarity scores to distinguish between the source and the destination regions. The proposed approaches were demonstrated by employing the GRIP dataset with six post-processing operations to conceal forgery. The experiments exhibit a high accuracy rate of 96.25%.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-14824-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer Science ; Copying ; Data Structures and Information Theory ; Forgery ; Multimedia Information Systems ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2023-08, Vol.82 (20), p.31181-31210</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-bf8548284ffa18b8893b642db866b72831490e283628f438c4ab2df77bda4ee93</citedby><cites>FETCH-LOGICAL-c319t-bf8548284ffa18b8893b642db866b72831490e283628f438c4ab2df77bda4ee93</cites><orcidid>0000-0002-7751-2659</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-14824-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-14824-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Iseed, Saed Yacoub</creatorcontrib><creatorcontrib>Mahmoud, Khaled Walid</creatorcontrib><title>Forensic approach for distinguishing between source and destination regions in copy-move forgery</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The copy-move forgery involves copying a semantically part from an image and pasting it into a different location within the same image to change the context of the image and deceive people. The copy-move forensic detectors authenticate the image and localize similar regions without identifying which region is original or forged. Because the forged region is replicated from another region of the same image, its characteristics have been inherited, making it difficult to distinguish between the original and forged regions. This paper proposes two approaches as a second stage, after localizing duplicated regions, to distinguish between source and destination regions. The adjacent pixels in images are non-independent and have some correlations that would be destroyed due to modifying the image. The deviation of these correlations would expose traces left due to the image forgery and is evaluated by the Joint Probability Matrix (JPM) in the first approach and by the Local Binary Pattern (LBP) in the second approach. Both approaches employ Jensen Shannon Divergence (JSD) to measure the correlation between feature vectors and generate similarity scores to distinguish between the source and the destination regions. The proposed approaches were demonstrated by employing the GRIP dataset with six post-processing operations to conceal forgery. The experiments exhibit a high accuracy rate of 96.25%.</description><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Copying</subject><subject>Data Structures and Information Theory</subject><subject>Forgery</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9UD1PwzAUtBBIlMIfYLLEbPBXYmdEFQUkJBaYjZ3YbSpqBzsF9d_zSpDYmO4Nd_fuDqFLRq8ZpeqmMEYlJ5QLwqTmktAjNGOVEkQpzo7hFpoSVVF2is5K2VDK6orLGXpbpuxj6VtshyEn265xSBl3fRn7uNr1ZQ2AnR-_vI-4pF1uPbaxw50_MOzYp4izXwEU3EfcpmFPtunTH2xWPu_P0Umw78Vf_OIcvS7vXhYP5On5_nFx-0RawZqRuKArCK5lCJZpp3UjXC1553RdO8W1YLKhHrDmOkihW2kd74JSrrPS-0bM0dXkCy0-dhDObCBshJcGXDlXSlINLD6x2pxKyT6YIfdbm_eGUXNY0kxLGljS_CxpKIjEJCpAjlDqz_of1Td0WHdp</recordid><startdate>20230801</startdate><enddate>20230801</enddate><creator>Iseed, Saed Yacoub</creator><creator>Mahmoud, Khaled Walid</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-7751-2659</orcidid></search><sort><creationdate>20230801</creationdate><title>Forensic approach for distinguishing between source and destination regions in copy-move forgery</title><author>Iseed, Saed Yacoub ; Mahmoud, Khaled Walid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-bf8548284ffa18b8893b642db866b72831490e283628f438c4ab2df77bda4ee93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Copying</topic><topic>Data Structures and Information Theory</topic><topic>Forgery</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Iseed, Saed Yacoub</creatorcontrib><creatorcontrib>Mahmoud, Khaled Walid</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Iseed, Saed Yacoub</au><au>Mahmoud, Khaled Walid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Forensic approach for distinguishing between source and destination regions in copy-move forgery</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-08-01</date><risdate>2023</risdate><volume>82</volume><issue>20</issue><spage>31181</spage><epage>31210</epage><pages>31181-31210</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The copy-move forgery involves copying a semantically part from an image and pasting it into a different location within the same image to change the context of the image and deceive people. The copy-move forensic detectors authenticate the image and localize similar regions without identifying which region is original or forged. Because the forged region is replicated from another region of the same image, its characteristics have been inherited, making it difficult to distinguish between the original and forged regions. This paper proposes two approaches as a second stage, after localizing duplicated regions, to distinguish between source and destination regions. The adjacent pixels in images are non-independent and have some correlations that would be destroyed due to modifying the image. The deviation of these correlations would expose traces left due to the image forgery and is evaluated by the Joint Probability Matrix (JPM) in the first approach and by the Local Binary Pattern (LBP) in the second approach. Both approaches employ Jensen Shannon Divergence (JSD) to measure the correlation between feature vectors and generate similarity scores to distinguish between the source and the destination regions. The proposed approaches were demonstrated by employing the GRIP dataset with six post-processing operations to conceal forgery. The experiments exhibit a high accuracy rate of 96.25%.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-14824-0</doi><tpages>30</tpages><orcidid>https://orcid.org/0000-0002-7751-2659</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2023-08, Vol.82 (20), p.31181-31210 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2842277408 |
source | Springer Nature - Complete Springer Journals |
subjects | Computer Communication Networks Computer Science Copying Data Structures and Information Theory Forgery Multimedia Information Systems Special Purpose and Application-Based Systems |
title | Forensic approach for distinguishing between source and destination regions in copy-move forgery |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T18%3A35%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Forensic%20approach%20for%20distinguishing%20between%20source%20and%20destination%20regions%20in%20copy-move%20forgery&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Iseed,%20Saed%20Yacoub&rft.date=2023-08-01&rft.volume=82&rft.issue=20&rft.spage=31181&rft.epage=31210&rft.pages=31181-31210&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-14824-0&rft_dat=%3Cproquest_cross%3E2842277408%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2842277408&rft_id=info:pmid/&rfr_iscdi=true |