A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review
In the current age, the wide use of digital images has led to the manipulations of content that misrepresent information with malicious goals. This issue demands the requirement of digital image investigation to authenticate the source and certify the trustworthiness of images. One image manipulatio...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Springer
2022
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/42638/1/A%20comprehensive%20evaluation%20procedure%20for%20copy-move.pdf http://umpir.ump.edu.my/id/eprint/42638/2/A%20comprehensive%20evaluation%20procedure%20for%20copy-move%20forgery%20detection%20methods_Results%20from%20a%20systematic%20review_ABS.pdf http://umpir.ump.edu.my/id/eprint/42638/ https://doi.org/10.1007/s11042-022-12010-2 https://doi.org/10.1007/s11042-022-12010-2 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ump.umpir.42638 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.426382024-10-03T04:25:12Z http://umpir.ump.edu.my/id/eprint/42638/ A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review Nor Bakiah, Abd Warif Mohd Yamani Idna, Idris Ainuddin, Wahid Abdul Wahab Nor Syahidatul Nadiah, Ismail Rosli, Salleh QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) In the current age, the wide use of digital images has led to the manipulations of content that misrepresent information with malicious goals. This issue demands the requirement of digital image investigation to authenticate the source and certify the trustworthiness of images. One image manipulation technique is called copy-move forgery (CMF), which duplicates one or more regions in an image before it is pasted to another location within the same image. In this paper, a systematic review is conducted to assess the performance evaluation techniques implemented by current CMF detection methods’ approaches. Five research questions are generated to find and solve the related issues on the evaluation levels. At present, CMF detection performance is evaluated either through image-level, pixel-level, or both level evaluations. Image-level evaluation identifies an image either as forged or not while all images in pixel-level evaluation are treated as forged images to localise the CMF regions. The study shows that both image and pixel-level evaluations are dependent and must be incorporated together to ensure a fair evaluation is conducted. A comprehensive evaluation procedure that covers both evaluations is proposed as a guide to future research. The procedure is then examined with seven state-of-the-art CMF detection methods based on keypoint, block, and combination approaches using three available CMF datasets that consist of multiple CMF attacks. The results are measured using multiple F-score values: image scores, pixel scores, and a multiplication of both of these to get the overall percentages of the detection. The results show that the block-based approach is able to obtain the highest percentages of detection in almost all cases of attacks in CMF. Springer 2022-05 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/42638/1/A%20comprehensive%20evaluation%20procedure%20for%20copy-move.pdf pdf en http://umpir.ump.edu.my/id/eprint/42638/2/A%20comprehensive%20evaluation%20procedure%20for%20copy-move%20forgery%20detection%20methods_Results%20from%20a%20systematic%20review_ABS.pdf Nor Bakiah, Abd Warif and Mohd Yamani Idna, Idris and Ainuddin, Wahid Abdul Wahab and Nor Syahidatul Nadiah, Ismail and Rosli, Salleh (2022) A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review. Multimedia Tools and Applications, 81 (11). pp. 15171-15203. ISSN 1380-7501. (Published) https://doi.org/10.1007/s11042-022-12010-2 https://doi.org/10.1007/s11042-022-12010-2 |
institution |
Universiti Malaysia Pahang Al-Sultan Abdullah |
building |
UMPSA Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang Al-Sultan Abdullah |
content_source |
UMPSA Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English English |
topic |
QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) |
spellingShingle |
QA75 Electronic computers. Computer science QA76 Computer software T Technology (General) TA Engineering (General). Civil engineering (General) Nor Bakiah, Abd Warif Mohd Yamani Idna, Idris Ainuddin, Wahid Abdul Wahab Nor Syahidatul Nadiah, Ismail Rosli, Salleh A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review |
description |
In the current age, the wide use of digital images has led to the manipulations of content that misrepresent information with malicious goals. This issue demands the requirement of digital image investigation to authenticate the source and certify the trustworthiness of images. One image manipulation technique is called copy-move forgery (CMF), which duplicates one or more regions in an image before it is pasted to another location within the same image. In this paper, a systematic review is conducted to assess the performance evaluation techniques implemented by current CMF detection methods’ approaches. Five research questions are generated to find and solve the related issues on the evaluation levels. At present, CMF detection performance is evaluated either through image-level, pixel-level, or both level evaluations. Image-level evaluation identifies an image either as forged or not while all images in pixel-level evaluation are treated as forged images to localise the CMF regions. The study shows that both image and pixel-level evaluations are dependent and must be incorporated together to ensure a fair evaluation is conducted. A comprehensive evaluation procedure that covers both evaluations is proposed as a guide to future research. The procedure is then examined with seven state-of-the-art CMF detection methods based on keypoint, block, and combination approaches using three available CMF datasets that consist of multiple CMF attacks. The results are measured using multiple F-score values: image scores, pixel scores, and a multiplication of both of these to get the overall percentages of the detection. The results show that the block-based approach is able to obtain the highest percentages of detection in almost all cases of attacks in CMF. |
format |
Article |
author |
Nor Bakiah, Abd Warif Mohd Yamani Idna, Idris Ainuddin, Wahid Abdul Wahab Nor Syahidatul Nadiah, Ismail Rosli, Salleh |
author_facet |
Nor Bakiah, Abd Warif Mohd Yamani Idna, Idris Ainuddin, Wahid Abdul Wahab Nor Syahidatul Nadiah, Ismail Rosli, Salleh |
author_sort |
Nor Bakiah, Abd Warif |
title |
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review |
title_short |
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review |
title_full |
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review |
title_fullStr |
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review |
title_full_unstemmed |
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review |
title_sort |
comprehensive evaluation procedure for copy-move forgery detection methods : results from a systematic review |
publisher |
Springer |
publishDate |
2022 |
url |
http://umpir.ump.edu.my/id/eprint/42638/1/A%20comprehensive%20evaluation%20procedure%20for%20copy-move.pdf http://umpir.ump.edu.my/id/eprint/42638/2/A%20comprehensive%20evaluation%20procedure%20for%20copy-move%20forgery%20detection%20methods_Results%20from%20a%20systematic%20review_ABS.pdf http://umpir.ump.edu.my/id/eprint/42638/ https://doi.org/10.1007/s11042-022-12010-2 https://doi.org/10.1007/s11042-022-12010-2 |
_version_ |
1822924695113039872 |
score |
13.235362 |