You are on page 1of 33

 There are various types of digital forgeries out of which Copy-

Move attack is one. In Copy- Move Attack a part of the image is


copied and pasted on another part generally to conceal unwanted
portions of the image.

 Copy Move Forgery Detection (CMFD) follows block based


matching technique to detect Copy-Move attacks in a digital
image. First, the original image is divided into fixed-size blocks,
Clustering the blocks by intersection area among blocks and
extracting exactly similar clusters.

 This method successfully detects the forged part when Copy Move
regions are same and when the forged image is saved in a major
graphic file format, such as JPEG or PNG.
1
 The Existing system uses active techniques such as watermarking
or digital signatures to solve the authentication problem in images
and to make it free from tampering.

 In Active Method certain information is embedded inside an image


during the creation or before the image is being disseminated to
the public. The information can be used to either detect the source
of an image or to detect possible modification of an image.

2
 This system have limitations because they require human attention or
specially equipped cameras such as Digital cameras with watermarking
technology in it.

 This system also requires the information of the original image to detect
forgery in a image.

 This systems depends completely on watermarks and original image


information, but by using technically advanced digital photography tools,
one can edit, manipulate or tamper the images easily without living
obvious visual clues, for which the system fails to detect in most of the
cases.

3
 Sophisticated tools
 3D Max, Photoshop
 Automated lighting, and processing that conceal forgery

 Increase of large size images


 High-definition images
 Much more costly to process

4
 Copy-Move forgery detection system can detect copy-move type
forgery in digital images without any data about the original image
and without any watermarks in the image

 Copy-Move Forgery detection works based on block matching


technique which is one of the passive technique of forgery
detection. In this PERFECT Match algorithm is implemented to
detect tampering in digital images.

5
 Getting the image and forming it into blocks.

 Finding the similar blocks.

 Clustering only identical twins.

 Mark similar clusters with color.

 Display Detected regions

6
 To eliminate the details of the image, the whole image is first
blurred.
 Then the image is converted into degraded palette where the whole
picture is converted into small pixels of colors palette.

 A block of size b x b is slid starting form top left corner to the


bottom right corner on the image from which the pixel values are
stored in an array.
7
 From the sorted array all the blocks are compared and those
adjacent blocks with very small absolute color difference are
extracted.

 Cluster them by their intersection area and extract similar clusters


from it.

 From that identical twin clusters are extracted by calculating the


distance between each point in a twin cluster and eliminate the non
identical twin clusters.

 Mark the Exactly Identical twin clusters by coloring each pixel

 Display detected regions in an image 8


9
 The system Should detect forgeries done in
multiple regions in an image

 The system should detect large and very small


copy move regions in an image.

10
 Hardware Requirements
Processor : Pentium 4 or more
Clock Speed : 1.8 GHz
Ram : 512 MB or more
Disk Space : 20 GB or more

 Software Requirements:
Operating system : Windows XP or more.
Language : Python 2.6, MATLAB 2009b or more.

11
12
13
14
15
16
17
18
19
20
21
22
23
24
 Detecting Tampering done on big size

25
 Working on Small regions

26
 Working for Multiple Copy Move Regions

27
 Will not detect Textured areas

28
 In courtrooms the trustworthiness of photographs has an essential
role as they are used as evidences thus CMFD can be used to know
its trustworthiness.

 In the medical field, physicians make critical decisions based on


digital images so CMFD can be used to provide proper treatment.

 In forensics for detecting tampered evidences in investigation


CMFD can be used to know the tampering in an image.

29
 A new methodology is proposed by which the user can detect copy
move type forgeries done with the intention to conceal certain
details or to duplicate certain aspects of an image.

 Contributions :
 Outperforms contemporary algorithms in speed of detection

 Robust to various attacks: multiple copy-move forgery,


Detecting very small and very big regions in an image.

 Different way of representing blocks (Rectangle), reducing


memory requirements

30
 The future enhancements that are required for this system
are to improve the detecting process, the system needs to
be expanded for detecting all types of forgery such as
retouching and tampering in textured regions.

31
 J. Fridrich, “Methods for "Methods for Tamper Detection in Digital
Images", Proc. ACM Workshop on Multimedia and Security, Orlando,
FL, October 30−31, 2009, pp. 19−23.

 Bayram S, Sencar HT, Memon N. An efficient and robust method for


detecting copy-move forgery. In: Proc. ICASSP09; 2009. p. 1053–6.
CASIA image tampering detection evaluation database (CASIA TIDE)
V1.0.2009.

 Pujari, V. S., & Sohani, M. (2012a). A Comparative Analysis on Copy


Move Forgery Detection in Spatial Domain Method Using Lexicographic
and Non Lexicographic techniques. IJECCE, 3(1), 136-139

 Parative Study of Image Forgery and Copy-Move Techniques Advances


in Computer Science, Engineering & Applications (pp. 715-723):
Springer.
32
THANK YOU

33

You might also like