HSV Based Image Forgery Detection for Copy-Move Attack


Article Preview

As the great development of digital photography and relevant post-processing technology, digital image forgery becomes easily in terms of operating thus may be improperly utilized in news photography in which any forgery is strictly prohibited or the other scenario, for instance, as an evidence in the court. Therefore, digital image forgery detection technique is needed. In this paper, attention has been focused on copy-move forgery that one region is copied and then pasted onto other zones to create duplication or cover something in an image. A novel method based on HSV color space feature is proposed and experimental result will be given and it shows the effectiveness and accurateness of proposed methodology.



Edited by:

X.D. Xu, Bin Li, Q.M. Lu, X.Y. Yan and J.L. Li






B. Liu and C. M. Pun, "HSV Based Image Forgery Detection for Copy-Move Attack", Applied Mechanics and Materials, Vols. 556-562, pp. 2825-2828, 2014

Online since:

May 2014





* - Corresponding Author

[1] Wolfgang, R.B.; Delp, E.J.; , A watermark for digital images, Image Processing, 1996. Proceedings., International Conference on , vol. 3, no., pp.219-222 vol. 3, 16-19 Sep (1996).

[2] Hartung, F.; Kutter, M.; , Multimedia watermarking techniques, Proceedings of the IEEE , vol. 87, no. 7, pp.1079-1107, Jul (1999).

[3] M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. NewYork: Marcel Dekker, (2004).

DOI: 10.1201/9780203913512

[4] Farid, H.; , Image forgery detection, Signal Processing Magazine, IEEE , vol. 26, no. 2, pp.16-25, March (2009).

DOI: 10.1109/msp.2008.931079

[5] J. A. Redi, W. Taktak, and J. -L. Dugelay, Digital image forensics: A booklet for beginners, Multimedia Tools Applicat., vol. 51, no. 1, p.133–162, (2011).

DOI: 10.1007/s11042-010-0620-1

[6] Granty, R.E.J.; Aditya, T.S.; Madhu, S.S.; , Survey on passive methods of image tampering detection, Communication and Computational Intelligence (INCOCCI), 2010 International Conference on , vol., no., pp.431-436, 27-29 Dec. (2010).

[7] David G. Lowe, Object recognition from local scale-invariant features, International Conference on Computer Vision, Corfu, Greece (September 1999), pp.1150-1157.

DOI: 10.1109/iccv.1999.790410

[8] Hailing Huang; Weiqiang Guo; Yu Zhang; , Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm, " Computational Intelligence and Industrial Application, 2008. PACIIA , 08. Pacific-Asia Workshop on , vol. 2, no., pp.272-276, 19-20 Dec. (2008).

DOI: 10.1109/paciia.2008.240

[9] Amerini, I.; Ballan, L.; Caldelli, R.; Del Bimbo, A.; Serra, G.; , A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery, Information Forensics and Security, IEEE Transactions on , vol. 6, no. 3, pp.1099-1110, Sept. (2011).

DOI: 10.1109/tifs.2011.2129512

[10] X. Pan and S. Lyu, Detecting image region duplication using SIFT features, in Proc. IEEE ICASSP, Dallas, TX, (2010).

[11] J. Fridrich, D. Soukal, and J. Lukas, Detection of Copy-Move Forgery in Digital Images, in Proceedings of Digital Forensic Research Workshop, August (2003).

In order to see related information, you need to Login.