An Overview of Picture Imitation Detection (Types and Methods)

Similar documents
Wavelet-based Image Splicing Forgery Detection

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Tampering and Copy-Move Forgery Detection Using Sift Feature

Introduction to Video Forgery Detection: Part I

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

Forgery Detection using Noise Inconsistency: A Review

A Novel Method for Enhancing Satellite & Land Survey Images Using Color Filter Array Interpolation Technique (CFA)

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Image Forgery Detection Using Svm Classifier

Literature Survey on Image Manipulation Detection

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Tampering Detection Algorithms: A Comparative Study

Applications of Flash and No-Flash Image Pairs in Mobile Phone Photography

Guided Image Filtering for Image Enhancement

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Image Extraction using Image Mining Technique

Video Synthesis System for Monitoring Closed Sections 1

A Study on Image Enhancement and Resolution through fused approach of Guided Filter and high-resolution Filter

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Digital Image Forgery Identification Using Motion Blur Variations as Clue

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

International Journal of Innovative Research in Engineering Science and Technology APRIL 2018 ISSN X

Retrieval of Large Scale Images and Camera Identification via Random Projections

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

A Spatial Mean and Median Filter For Noise Removal in Digital Images

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

Image Enhancement using Histogram Equalization and Spatial Filtering

International Journal of Advanced Research in Computer Science and Software Engineering

Different-quality Re-demosaicing in Digital Image Forensics

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Image Manipulation Detection using Convolutional Neural Network

FPGA implementation of DWT for Audio Watermarking Application

Correlation Based Image Tampering Detection

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

S SNR 10log. peak peak MSE. 1 MSE I i j

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Copy-Move Image Forgery Detection using SVD

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

Effective Pixel Interpolation for Image Super Resolution

Impeding Forgers at Photo Inception

Edge-Raggedness Evaluation Using Slanted-Edge Analysis

Content Based Image Retrieval Using Color Histogram

A Comparison of Histogram and Template Matching for Face Verification

Classification in Image processing: A Survey

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Neuro-Fuzzy based First Responder for Image forgery Identification

Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

Midterm Examination CS 534: Computational Photography

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

THE IMAGE REGISTRATION TECHNIQUE FOR HIGH RESOLUTION REMOTE SENSING IMAGE IN HILLY AREA

Colour Recognition in Images Using Neural Networks

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING

A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter

Image analysis. CS/CME/BioE/Biophys/BMI 279 Oct. 31 and Nov. 2, 2017 Ron Dror

EEL 6562 Image Processing and Computer Vision Box Filter and Laplacian Filter Implementation

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images

ABSTRACT I. INTRODUCTION

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS

Main Subject Detection of Image by Cropping Specific Sharp Area

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

A Novel Approach for MRI Image De-noising and Resolution Enhancement

Quality Measure of Multicamera Image for Geometric Distortion

Lossless Image Watermarking for HDR Images Using Tone Mapping

ABSTRACT. Keywords: Color image differences, image appearance, image quality, vision modeling 1. INTRODUCTION

Image Smoothening and Sharpening using Frequency Domain Filtering Technique

Automation of JPEG Ghost Detection using Graph Based Segmentation

Digital Image Processing. Lecture # 6 Corner Detection & Color Processing

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis

Optimized Quality and Structure Using Adaptive Total Variation and MM Algorithm for Single Image Super-Resolution

Audio Fingerprinting using Fractional Fourier Transform

Digital Image Processing

Laser Printer Source Forensics for Arbitrary Chinese Characters

A Survey Based on Region Based Segmentation

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Color and More. Color basics

Image Forgery. Forgery Detection Using Wavelets

Contrast Enhancement Techniques using Histogram Equalization: A Survey

A Study of Slanted-Edge MTF Stability and Repeatability

A Recognition of License Plate Images from Fast Moving Vehicles Using Blur Kernel Estimation

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

Multiresolution Analysis of Connectivity

Digital Watermarking Using Homogeneity in Image

Camera identification from sensor fingerprints: why noise matters

Comparision of different Image Resolution Enhancement techniques using wavelet transform

Transcription:

International Journal for Modern Trends in Science and Technology Volume: 03, Issue No: 04, April 2017 ISSN: 2455-3778 http://www.ijmtst.com An Overview of Picture Imitation Detection (Types and Methods) Gauraw Jumnake 1 Dr.Sanjay Thakur 2 1PG Scholar, Lord Krishna College of Technology, Indor, Madhya Pradesh, India. 2Principal & Professor, Lord Krishna College of Technology, Indor, Madhya Pradesh, India. To Cite this Article Gauraw Jumnake, Dr.Sanjay Thakur, An Overview of Picture Imitation Detection (Types and Methods), International Journal for Modern Trends in Science and Technology, Vol. 03, Issue 04, 2017, pp. 26-30. ABSTRACT The trait of images has a necessary role in several areas, including: rhetorical investigation, criminal investigation, police investigation systems, intelligence services, medical imaging, and journalism. The art of constructing image dissimulation incorporates a long history. But, in today s digital age, it's attainable to terribly simply modification the data delineated by a picture while not departure any obvious traces of meddling. Despite this, no system nonetheless exists that accomplishes effectively and accurately the image meddling detection task. Regardless of whether the photo is novel or controlled, there is quick augmentation in carefully controlled distortions in standard media and on the Internet. This example demonstrates real vulnerabilities and reductions the validity of computerized pictures. In this way, making systems to check the trustworthiness and realness of the propelled pictures is basic, especially considering that the photos are presented as confirmation in a courtroom, as news things, as a piece of remedial records, or as cash related reports. In this sense, picture phony identification is one of the basic target of picture crime scene investigation. KEYWORDS: Image splicing, Copy move, DCT-PCA, SURF, SLIC, SIFT, Resampling, Image Retouching Copyright 2017 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION The digital info revolution and problems involved with multimedia system security have conjointly generated many approaches to digital forensics and change of state detection. Generally, these approaches can be divided into active and passive blind approaches. the realm of active strategies merely may be divided into the information concealing approach (e.g., watermarks) and therefore the digital signature approach. we have a tendency to target blind strategies, as they're considered a brand new direction and in distinction to active strategies, they add absence of any protective techniques and while not victimisation any previous info concerning the image. To sight the traces of change of state, blind strategies use the image perform and therefore the indisputable fact that forgeries will bring into the image specific detectable changes. When digital watermarks or signatures don't seem to be obtainable, the blind approach is that the solely method the way to create the choice concerning the trustiness of the investigated image. Image forensics may be a burgeoning analysis field and promise a big improvement in forgery detection within the never ending competition between image forgery creators and image forgery detectors. A. Resampling When two or lot of pictures area unit spliced along, to make top quality and consistent image 26 International Journal for Modern Trends in Science and Technology

forgeries, nearly always geometric transformations like scaling, rotation or skewing area unit required.geometric transformations generally need a resampling and interpolation step. Thus, having obtainable refined resampling/interpolation detectors is extremely valuable. B. Near-duplication In a common type of digital image forgery, called copy move forgery, a part of the image is copied and pasted into the another part of the same image, typically with the intention to hide an object or a region. The copy move forgery brings into the image several near duplicated image regions. C. Noise inconsistence analysis A commonly used tool to conceal traces of tampering is addition of locally random noise to the altered image regions. This operation may cause inconsistencies in the images noise. Therefore, the detection of various noise levels in an image may signify tampering. II. COMMON IMAGE FORGING METHODS A. Image splicing Image conjunction is a picture piece of writing methodology to repeat a region of a picture and paste it onto another image, and it's ordinarily followed by post process like local/global blurring, compression, and resizing. Image conjunction may be a forgery manner to repeat and paste regions among separate image sources, typically disbursed by digital image piece of writing tools like Photoshop. it's usually used as associate degree initial step of collage, that is incredibly in style in digital image content piece of writing. The conjunction tampered image can be employed in news reports, photography contest, key proof within the educational papers, and so on, that might bring bound negative influences. As a result, it's a vital issue to develop reliable conjunction detection ways. In the forgery method, the manually introduced transitions of edges and corners ar completely different from those within the natural pictures. The variations ar ordinarily represented by the inconsistency and abnormality, and that they ar used for conjunction detection. within the frequency domain, a natural signal typically has weak higher-order applied math correlations, and bound unnatural correlations are going to be introduced if this signal is gone through a nonlinearity (which would virtually for certain occur in tampering). methodology to notice the abrupt conjunction separation mistreatment the 2 similar matchig options. They studied the consequences of image conjunction on magnitude and part characteristics of 2 similar matching (normal twin spectrum). The distinction between means that of magnitudes of a take a look at image s bi-coherence and its estimating authentic vision s bi-coherence and therefore the distinction between negative part entropy of these 2 were used as options. projected a technique supported computing the inverse camera response functions by analyzing the sides in several patches of the image and corroboratory their consistency. B. copy move Copy-move forgery may be a specific form of image meddling wherever part of a section of the image is traced and glued on another part typically to hide unwanted parts of the image. Hence, the goal in sight ion of copy-move forgeries is to detect image areas that are same or extraordinarily similar. During this paper, we tend to review many ways planned to realize this goal. These ways generally use block-matching procedures, that 1st divide the image into overlapping blocks and extract options from every block; forward similar blocks can yield similar options. Later, an identical step takes place wherever the aim is to search out the duplicated blocks supported their feature vectors. A forgery detection call is formed provided that similar options are detected inside constant distance of options associated to connected blocks. We tend to examine many completely different block primarily based options planned for this purpose in relevance their time quality and hardiness to common process scaling up/down, compression, and rotation. We are going to additionally embody comparative results for higher analysis. C. Image retouching Retouching is that the method of obtaining a picture prepared for final presentation. this could take a spread of techniques and method, may be terribly delicate or dramatic however each image that you just see utilized in advertising are going to be subjected to some variety of improvement, even the $64000 Beauty campaigns from Dove/Unilever can have undergone some retouching or digital improvement like dirt removal and sharpening. But retouching in during an exceedingly in a terribly sense has been around since the very starting of photography. Before photography became the norm, retouching occurred within the 27 International Journal for Modern Trends in Science and Technology

dark area with over and below exposure, dodging and blurring, masking and split-toning. the most distinction recently is that anyone will enhance their photography be it mistreatment prepared created filters found in apps like instagram and hipstamatic or on their pc mistreatment programs like Adobe Photoshop. The ability in retouching for advertising is 2 fold. It breaks down in to 2 main areas though these will overlap. Image Manipulation (or artistic Retouching) and Technical Retouching (sometimes called color Profiling) Image Manipulation that the general public are going to be tuned in to through the extremely criticized shots of celebrities on magazine covers wherever skin is smoothened out, eyes and teeth colorless, breasts increased, legs created dilutant and customarily tidied up. On product shots, broken boxes are mounted, on cars the surfaces are smoothened out and highlights additional, scoundrel reflections of the creative person are removed. The trick with this kind of retouching is to grasp what it's the consumer needs and so get approval from all the interested parties like your own artistic Director at first, the Agency, the consumer and their internal groups like legal and whole stewards. the opposite ability is to decide on the proper retoucher for the duty at hand, a beauty specialist may not be right for a product shot and automotive specialists are during a retouch suite of their own. later on prices will vary dramatically that is why it's basic to induce the proper person for the duty. you wish a mixture of ability, expertise and speed to determine this as accurately as attainable. The other version of retouching is a lot of technical. lots of this if not all will currently be achieved mistreatment automatic techniques and is a lot of normally called color identification however the operator should have a basic information of what they're doing. Technical retouching assists the ultimate replica of a file, it takes under consideration however the ultimate image are going to be reproduced, like whether or not it'll be displayed on a screen for net or digital billboards, or if it's to be written, on what reasonably stock and mistreatment what inks. as an example the yellow ink utilized in North America is slightly hotter with slightly a lot of red in it than European yellow inks. thus an effort that has been approved in Europe can got to have a small reduction within the reds to make sure that it prints precisely the same within the USA. Totally different stocks absorb the ink otherwise thus there ar most ink limits per form of paper. III. IMITATION (FAKE) IMAGE DETECTION A. Method I (DCT PCA) Copy-move forgery detection is performed through the DCT and Gaussian RBF kernel PCA victimization the square blocks. The explanation to use the DCT for block illustration is that the hardiness against many post process operations, as an example, compression, blurring, scaling, and noise, because it may be a common apply in image forgery that the counterfeited pictures invariably endure varied po st process operations. Hence, it makes the forgery detection terribly troublesome. though the DCT is effective against mentioned transformations, still there square measure things wherever the block representations through DCT are nominal; as an example, if rotation operation is applied over the cast regions, the DCT representations results square measure affected in addition. to beat this limitation we have a tendency to apply Gaussian RBF kernel PCA over the DCT frequency coefficients because of their rotation invariant nature compared against PCA [25]. Another motivation to use kernel PCA with DCT is that the nonlinear nature of RBF kernel PCA and linear nature of DCT. Hence, it makes the feature illustration a lot of numerous and additionally seems as a higher alternative compared to PCA that's additionally linear in nature like DCT. Gaussian RBF kernels have another blessings like having fewer hyper parameters therefore, they square measure numerically easier as kernel values are finite between zero and one. B. Method II (SIFT) Scale Invariant Feature rework could be a digital image descriptor for image-based matching and recognition that was developed by David Lowe. The descriptors along side connected image descriptors area unit in the main used for pc vision associated with purpose matching between totally different views of a 3-D scene and view-based visual perception. The SIFT descriptor is invariant to translations, rotations and scaling transformations within the image domain and conjointly sturdy to moderate perspective transformations and illumination variations. so SIFT descriptor is incredibly helpful in follow for image matching and visual perception underneath real-world 28 International Journal for Modern Trends in Science and Technology

conditions. The SIFT descriptor contains a technique for detective work interest purposes from a grey-level image at that statistics of native gradient directions of image intensities area unit accumulated to relinquish a summarizing description of the native image structures during a native neighborhood around every interest point, with the intention that this descriptor ought to be used for matching corresponding interest points between totally different pictures. Later, the SIFT descriptor has conjointly been applied at dense grids (dense SIFT) that are shown to guide to higher performance for tasks like object categorization, texture classification, image alignment and bio science. The SIFT descriptor has conjointly been extended from grey-level to color pictures and from 2-D spatial pictures to 2+1-D spatio-temporal video. an outline of the formula is bestowed here. There area unit in the main four major stages of computation concerned in SIFT formula. First image is reworked into ripple domain and SIFT is applied on the reworked image to get the options. As ripple produces multispectral parts, options area unit additional predominant. so once getting interest purpose feature descriptor we have a tendency to select finding matching between these feature descriptors to conclude whether or not meddling is finished to the given image or not. Our works ensure that SIFT options area unit Associate in Nursing best resolution attributable to their high machine potency and sturdy performance. Two ripple rework (DyWT) In connected work, we've got seen that a lot of previous techniques use DWT for copy-move forgery detection. DWT has its own disadvantage find it irresistible is shift invariantand so less best for information analysis. Mallat and Zhong [8] introduced the DyWT to beat the downside of DWT. DyWT is shift invariant and is totally different from DWT as a result of in DyWT there's no down-sampling like that of DWT. The DyWT of a picture is computed victimization the formula [1]. 3.2. Scale Invariant Feature rework (SIFT) A four stage filtering approach is employed within the SIFT formula [9] a) Detection of Scale area Extreme a that area unit the interest key purposes b) Localization of key-points by taking under consideration solely the stable key points c) Orientation Assignment to the chosen key points d) Key-point Descriptor once obtaining key point matching could it's going to it should} happen that to region of a picture may have constant options licitly. therefore we have a tendency to next select cluster of key purpose and forgery detection and in final step estimates geometric transformation if meddling has been done to the given image. 3.3. formula combining DyWT and SIFT so as to see copy-move forgery; initial of all we have a tendency to apply two ripple rework on the given image which is able to decompose the given image in four components LL, LH, HL, and HH. Since most of the data is contained in LL half so we have a tendency to apply SIFT feature extraction on LL half as a result we've got the feature descriptor vectors of the interest points, and eventually, we have a tendency to select finding the match between these feature descriptor vectors to mark the solid regions. C. Method III (SLIC) The important plan owed SLIC is to use k-means during a native manner by reducing the potential member pixels for every cluster to an area neighborhood. SLIC uses one, world termination criterion, the improved SLIC to use an area termination criterion for every cluster to avoid revisiting clusters and image areas with none major changes since the last iteration. Preemptively stops the evolution of section boundaries in homogenous image regions. adjustive Over-Segmentation isemployed that determines the initial block size supported the feel of the host image. once the feel of the image is sleek, the initial size of the super-pixels is comparatively giant, which may guarantee not solely that the super-pixels can get near thesides, however additi onally can contain adequate feature points to be used for forgery detection. Larger super-pixels imply a smaller range of blocks, which may scale back the procedure expense once the blocks area unit matched with one another. The distinct riffle remodel (DWT) is employed to research the distribution of the host image. Roughly, once low-frequency energy accounts for the bulk of the frequency energy, the image can seem to be smooth; otherwise, if the low-frequency energy accounts for less than a minority of the frequency energy, the host image seems to be an in depth image. during this project, four-level DWT is performed, exploitation the 'Haar' riffle, on the host image to calculate the low-frequency energy 29 International Journal for Modern Trends in Science and Technology

ELF and high frequency energy extremely high frequency then the share of the low distribution Jabat al-tahrir al-filistiniyyah is calculated, in keeping with that the initial size S of the super-pixels is outlined. IV. THE FUTURE Today's innovation permits advanced media to be changed and controlled in ways that were just unimaginable a quarter century. Tomorrow's innovation will more likely than not take into consideration us to control advanced media in ways that today appear to be inconceivable. Furthermore, as this innovation keeps on developing it will turn out to be progressively more essential for the art of computerized crime scene investigation to attempt to keep pace. There is little uncertainty that as we keep on developing methods for uncovering photographic fakes, new strategies will be created to improve and harder to identify fakes. And keeping in mind that some of the measurable devices might be less demanding to trick than others, a few instruments will be troublesome for the normal client to bypass. For instance, once aggravated, the shading channel exhibit addition can be re-produced by just setting a picture onto its unique cross section and re-adding each shading channel. On the other hand, redressing for conflicting lighting is non-unimportant in a standard photograph altering programming. As with the spam/hostile to spam and infection/against infection diversion, a weapons contest between the counterfeiter and scientific examiner is to some degree unavoidable. The field of picture legal sciences however has and will keep on making it harder and additional tedious (yet never unimaginable) to make a fraud that can't be recognized. [4] Elmagarmid, A.K., Ipeirotis, P.G.: Duplicate Record Detection: A Survey. IEEE Transactions on Knowledge and Data Engineering 19(1) (January 2007) [5] Digital image processing Book by Gonzalez [6] S.Bravo-Solorioand A.K.Nandi,"Exposing duplicated regions affected by reflection, rotation and scaling," in Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, 2011, pp. 1880-1883. [7] H. Huang, W. Guo, and Y. Zhang, Detection of copy move forgery in digital images using SIFT algorithm, in Proc. Pacific-Asia Workshop Comput. Intell. Ind. Appl. (PACIIA), Dec. 2008, pp. 272 276. [8] X. Pan and S. Lyu, Region duplication detection using image Characteristic matching, IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 857 867, Dec. 2010. [9] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, A SIFT-based forensic method for copy move attack detection and transformation recovery, IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1099 1110, Sep. 2011. [10] X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, Image copy move forgery detection based on SURF, in Proc. Int. Conf. Multimedia Inf. Netw. Secur. (MINES), Nov. 2010, pp. 889 892. [11] P. Kakar and N. Sudha, Exposing postprocessed copy paste forgeries through transform-invariant Characteristic s, IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1018 1028, Jun. 2012. [12] B. L. Shivakumar and S. S. Baboo, Detection of region duplication forgery in digital images using SURF, IJCSI Int. J. Comput. Sci. Issues, vol. 8, issue 4. no. 1, pp. 199 205, 2011. [13] D. G. Lowe, Object recognition from local scale-invariant Characteristic s, in Proc. 7th IEEE Int. Conf. Comput. Vis., Sep. 1999, pp. 1150 1157. [14] H. Bay, T. Tuytelaars, and L. Van Gool, SURF: Speeded up robust Characteristic s, in Computer Vision. Berlin, Germany: Springer-Verlag, 2006, pp. 404 417. REFERENCES [1] International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 03 Issue: 12 Dec -2016 www.irjet.net p-issn: 2395-0072 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1350 IMAGE FORGERY DETECTION USING IMPROVED SLIC [2] Digital Image forgery detection using SIFT feature Assam University Silchar, Assam 978-1-4673-6708-0/15/$31.00 2015 IEEE [3] Ientilucci, E.J.: Using the Singular Value Decompostion., Chester F. Carlson Center for Imaging Science, Rochester Institute of Technology, May 29 (2003) 30 International Journal for Modern Trends in Science and Technology