International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014


A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara, Rohit Srivastava


Abstract: With advent of many powerful editing tools in the digital image processing; image forgery is the big concern today in Digital Forensics Industry. Image forgery can be apply either in single image by coping some region of image and pasting it to another place in the same image or in composite image by combining two or more images together. The focus of my research work is to develop a forensic system to detect both type of forgery within a single place. Many Copy-move Forgery Detection (CMFD) algorithms have been developed to detect forgery within single image but are not robust to geometric transformation. Double JPEG compression is used extensively for localization of regions for composite images forgery such as Image Slicing; In-painting etc. A proposed system is a fusion based system which will allow to detect the image tampering using both techniques i. e. CMFD and DJPG. This gives insights of using both image detection algorithms within same image and in single framework so that detection is evident at single place. A system will compute a likelihood map to indicate the forged area that is accrued due to Copy. To reduce computational cost of system features are extracted from taking the mean value of DCT (discrete cosine transform) coefficients. The proposed scheme is not only robust to copy-move forgery; but also to blurring or nosing adding and with low computational complexities.


Keywords: Digital Image Forensics, image forgery detection, manipulation detection, copy-paste forgery detection, tampering detection


Edition: Volume 3 Issue 5, May 2014,


Pages: 1404 - 1408


How to Cite this Article?

Dhara Anandpara, Rohit Srivastava, "A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches ", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=20132089, Volume 3 Issue 5, May 2014, 1404 - 1408

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Digital Image Forensics'

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1232 - 1237

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

Nivi Varghese, Charlse M Varghese

Share this Article

Downloads: 113

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1800 - 1802

Contrast Enhancement Based Image Manipulation Detection

Anju Gopinath

Share this Article

Similar Articles with Keyword 'image forgery detection'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1271 - 1274

Digital Image Forgery Detection with Motion Blur as Cue: A Survey

Pornima M. Birajdar, N.G. Dharashive

Share this Article

Downloads: 118

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 163 - 165

Survey Paper on Advanced Techniques for Image Forgery Detection

Amruta Jagtap, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'manipulation detection'

Downloads: 113

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1800 - 1802

Contrast Enhancement Based Image Manipulation Detection

Anju Gopinath

Share this Article

Downloads: 130

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 927 - 929

A Survey Paper on Revealing Image Forgery Using Image Manipulation Detection

Deepak B. Waghchaure, Ashish R. Gaikwad

Share this Article

Similar Articles with Keyword 'tampering detection'

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Similar Articles with Keyword 'Digital'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Similar Articles with Keyword 'Image'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'Forensics'

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1487 - 1489

A New Approach for Real Time Evidence Collection from Linux Environment

Neethu P Nair, Maniveena C

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1273 - 1278

Image Forgery Localization via CFA Based Feature Extraction and Poisson Matting

Priyanka Prasad

Share this Article

Similar Articles with Keyword 'image'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'forgery'

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1132 - 1138

Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks

K. Anil Kumar, Sumithra R

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1520 - 1522

Survey of Various Techniques for Signature Recognition and Verification

Sharayu S. Sangekar, D. C. Dhanwani

Share this Article

Similar Articles with Keyword 'detection'

Downloads: 134 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Similar Articles with Keyword 'manipulation'

Downloads: 98

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1380 - 1385

Selecting Effectual Peers in P2P Webs for Task Calculating

Rajalakshmi.V, Gayathri, Swathi Durga, M. Narayanan

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1943 - 1948

Color Transfer Between Images By Minimizing Corruptive Artifacts

Anjali A. Dhanve, Gyankamal J. Chhajed

Share this Article

Similar Articles with Keyword 'tampering'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article
Top