A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review

Nor Bakiah, Abd Warif and Mohd Yamani Idna, Idris and Ainuddin, Wahid Abdul Wahab and Nor Syahidatul Nadiah, Ismail and Rosli, Salleh (2022) A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review. Multimedia Tools and Applications, 81 (11). pp. 15171-15203. ISSN 1380-7501. (Published)

[img] Pdf
A comprehensive evaluation procedure for copy-move.pdf
Restricted to Repository staff only

Download (4MB) | Request a copy
[img]
Preview
Pdf
A comprehensive evaluation procedure for copy-move forgery detection methods_Results from a systematic review_ABS.pdf

Download (91kB) | Preview

Abstract

In the current age, the wide use of digital images has led to the manipulations of content that misrepresent information with malicious goals. This issue demands the requirement of digital image investigation to authenticate the source and certify the trustworthiness of images. One image manipulation technique is called copy-move forgery (CMF), which duplicates one or more regions in an image before it is pasted to another location within the same image. In this paper, a systematic review is conducted to assess the performance evaluation techniques implemented by current CMF detection methods’ approaches. Five research questions are generated to find and solve the related issues on the evaluation levels. At present, CMF detection performance is evaluated either through image-level, pixel-level, or both level evaluations. Image-level evaluation identifies an image either as forged or not while all images in pixel-level evaluation are treated as forged images to localise the CMF regions. The study shows that both image and pixel-level evaluations are dependent and must be incorporated together to ensure a fair evaluation is conducted. A comprehensive evaluation procedure that covers both evaluations is proposed as a guide to future research. The procedure is then examined with seven state-of-the-art CMF detection methods based on keypoint, block, and combination approaches using three available CMF datasets that consist of multiple CMF attacks. The results are measured using multiple F-score values: image scores, pixel scores, and a multiplication of both of these to get the overall percentages of the detection. The results show that the block-based approach is able to obtain the highest percentages of detection in almost all cases of attacks in CMF.

Item Type: Article
Additional Information: Indexed by Scopus
Uncontrolled Keywords: Copy-move; Evaluation performance; Image forensics; Region duplication
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
T Technology > T Technology (General)
T Technology > TA Engineering (General). Civil engineering (General)
Faculty/Division: Faculty of Computing
Depositing User: Mr Muhamad Firdaus Janih@Jaini
Date Deposited: 03 Oct 2024 04:25
Last Modified: 03 Oct 2024 04:25
URI: http://umpir.ump.edu.my/id/eprint/42638
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item