Document Type : Research Note


1 Computer Engineering Department, Yazd University, Yazd, Iran.

2 Computer Engineering Department, Meybod University, Meybod, Yazd, Iran.



Image is a powerful communication tool that is widely used in various applications, such as forensic medicine and court, where the validity of the image is crucial. However, with the development and availability of image editing tools, image manipulation can be easily performed for a specific purpose. Copy-move forgery is one of the simplest and most common methods of image manipulation. There are two traditional methods to detect this type of forgery: block-based and key point-based. In this study, we present a hybrid approach of block-based and key point-based methods using meta-heuristic algorithms to find the optimal configuration. For this purpose, we first search for pair blocks suspected of forgery using the genetic algorithm with the maximum number of matched key points as the fitness function. Then, we find the accurate forgery blocks using simulating annealing algorithm and producing neighboring solutions around suspicious blocks. We evaluate the proposed method on CoMoFod and COVERAGE datasets, and obtain the results of accuracy, precision, recall and IoU with values of 96.87, 92.15, 95.34 and 93.45 respectively. The evaluation results show the satisfactory performance of the proposed method.


Main Subjects

[1] F. Z. Mehrjardi, A. M. Latif, M. S. Zarchi, and R. Sheikhpour, “A survey on deep learning-based image forgery detection,” Pattern Recognition, Vol. 144, pp. 1-31, 2023.
[2] Z. J. Barad and M. M. Goswami, “Image forgery detection using deep learning: A survey,” In 6th international conference on advanced computing and communication systems (ICACCS), 2020, pp. 571-576.
[3] A. H. Saber, M. A. Khan, and B. G. Mejbel, “A survey on image forgery detection using different forensic approaches,” Adv Sci Technol Eng Syst J, Vol. 5, No. 3, pp. 361-370, 2020.
[4] F. Z. Mehrjardi, A. M. Latif, and M. S. Zarchi, “Copy-move forgery detection and localization using deep-learning,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 37, No. 9, pp. 1-21, 2023.
[5] I. A. Zedan, M. M. Soliman, K. M. Elsayed, and H. M. Onsi, “Copy Move Forgery Detection Techniques: A Comprehensive Survey of Challenges and Future Directions,” International Journal of Advanced Computer Science and Applications, Vol. 12, No. 7, 2021.
[6] F. H. Pugar, S. Muzahidin, and A. M. Arymurthy, “Copy-Move Forgery Detection using SWT-DCT and Four Square Mean Features,” In International Conference on Electrical Engineering and Informatics (ICEEI), 2019, pp. 63-68.
[7] M. H. Alkawaz, G. Sulong, T. Saba, and A. Rehman, “Detection of copy-move image forgery based on discrete cosine transform,” Neural Computing and Applications, Vol. 30, pp. 183-192, 2018.
[8] Y. Wang, L. Tian, and C. Li, “LBP-SVD based copy move forgery detection algorithm,” In IEEE international symposium on Multimedia (ISM), 2017, pp. 553-556.
[9] K. M. Hosny, H. M. Hamza, and N. A. Lashin, “Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators,” The Imaging Science Journal, Vol. 66, No. 6, pp. 330-345, 2018.
[10] T. Mahmood, T. Nawaz, R. Ashraf, M. Shah, Z. Khan, A. Irtaza, and Z. Mehmood, “A survey on block-based copy move image forgery detection techniques,” In International Conference on Emerging Technologies (ICET), 2015, pp. 1-6.
[11] C. C. Chen, W. Y. Lu, and C. H. Chou, “Rotational copy-move forgery detection using SIFT and region growing strategies,” Multimedia Tools and Applications, vol. 78, pp. 18293-18308, 2019.
[12] A. Badr, A. Youssif, and M. A. Wafi, “A robust copy-move forgery detection in digital image forensics using SURF,” In 8th International Symposium on Digital Forensics and Security (ISDFS), 2020, pp. 1-6.
[13] M. Bilal, H. A. Habib, Z. Mehmood, T. Saba, and M. Rashid, “Single and multiple copy–move forgery detection and localization in digital images based on the sparsely encoded distinctive features and DBSCAN clustering,” Arabian Journal for Science and Engineering, Vol. 45, pp. 2975-2992, 2020.
[14] C. Lin, W. Lu, X. Huang, K. Liu, W. Sun, and H. Lin, “Region duplication detection based on hybrid feature and evaluative clustering,” Multimedia Tools and Applications, Vol. 78, pp. 20739-20763, 2019.
[15] T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah, and M. T. Mahmood, “Copy-move forgery detection technique for forensic analysis in digital images,” Mathematical Problems in Engineering, 2016.
[16] Y. Zhu, X. J. Shen, and H. P. Chen, “Covert copy-move forgery detection based on color LBP,” Acta Automatica Sinica, Vol. 43, N. 3, pp. 390-397, 2017.
[17] S. Kumar, S. Mukherjee, and A. K. Pal, “An improved reduced feature-based copy-move forgery detection technique,” Multimedia Tools and Applications, Vol. 82, No. 1, pp. 1431-1456, 2023.
[18] H. A. Alberry, A. A. Hegazy, and G. I. Salama, “A fast SIFT-based method for copy move forgery detection,” Future Computing and Informatics Journal, Vol. 3, No. 2, pp. 159-165, 2018.
[19] C. Wang, Z. Zhang, and X. Zhou, “An image copy-move forgery detection scheme based on A-KAZE and SURF features,” Symmetry, Vol. 10, No. 12, 2018.
[20] B. Fatima, A. Ghafoor, S. S. Ali, and M. M. Riaz, “FAST, BRIEF and SIFT based image copy-move forgery detection technique,” Multimedia Tools and Applications, Vol. 81, No. 30, pp. 43805-43819, 2022.
[21] I. J. Sreelakshmy, and B. C. Kovoor, “Hybrid Method for Copy-Move Forgery Detection in Digital Images,” In Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), 2019, pp. 119-127.
[22] V. Mehta, A. K. Jaiswal, and R. Srivastava, “Copy-move image forgery detection using DCT and ORB feature set,” In Futuristic Trends in Networks and Computing Technologies: Second International Conference, FTNCT 2019, Chandigarh, India, 2020, pp. 532-544.
[23] S. Katoch, S. S. Chauhan, and V. Kumar, “A review on genetic algorithm: past, present, and future,” Multimedia Tools and Applications, Vol. 80, pp. 8091-8126, 2021.
[24] M. A. Albadr, S. Tiun, M. Ayob, and F. Al-Dhief, “Genetic algorithm based on natural selection theory for optimization problems,” Symmetry, Vol. 12, No. 11, 2020.
[25] Z. Mehrnahad, A. M. Latif, J. Z. Ahmadabadi, “A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties,” Journal of AI and Data Mining, Vol. 11, No. 2, pp. 195-211, 2023.
[26] A. H. Zhou, L. P. Zhu, B. Hu, S. Deng, Y. Song, H. Qiu, and S. Pan, “Traveling-salesman-problem algorithm based on simulated annealing and gene-expression programming,” Information, Vol. 10, No. 1, 2018.
[27] D. Karaboga and B. A. Akay, “Comparative study of artificial bee colony algorithm,” Applied mathematics and computation, Vol. 214, No. 1, pp. 108- 132, 2009.
[28] F. N. A. Baharudin, N. A. Ab. Aziz, M. R. Abdul Malek, A. K. Ghazali, and Z. Ibrahim, “Indoor Comfort and Energy Consumption Optimization Using an Inertia Weight Artificial Bee Colony Algorithm,” Algorithms, Vol. 15, No. 11, 2022.
[29] B. Wen, Y. Zhu, R. Subramanian, T. T. Ng, X. Shen, and S. Winkler, “COVERAGE—A novel database for copy-move forgery detection,” In IEEE international conference on image processing (ICIP), 2016, pp. 161- 165.
[30] D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, “CoMoFoD—New database for copy-move forgery detection,” In Proceedings ELMAR-2013, 2013, pp. 49-54.
[31] O. M. Al-Qershi and B. E. Khoo, “Evaluation of copy-move forgery detection: datasets and evaluation metrics,” Multimedia Tools and Applications, Vol. 77, pp. 31807-31833, 2018.
[32] T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah, and M. T. Mahmood, “Copy-move forgery detection technique for forensic analysis in digital images,” Mathematical Problems in Engineering, 2016.
[33] M. F. Hashmi, A. R. Hambarde, and A. G. Keskar, “Copy move forgery detection using DWT and SIFT features,” In 13th International conference on intellient systems design and applications, 2013, 188-193.