IMAGE FORGERY DETECTION USING SUPPORT VECTOR MACHINES: DEVELOPMENT AND EVALUATION | IJET – Volume 12 Issue 1 | IJET-V12I1P38

International Journal of Engineering and Techniques (IJET) Logo

International Journal of Engineering and Techniques (IJET)

Open Access • Peer Reviewed • High Citation & Impact Factor • ISSN: 2395-1303

Volume 12, Issue 1  |  Published: February 2026

Author:Ekta Bala

DOI: https://zenodo.org/records/18642289  â€˘  PDF: Download

Abstract

The revolution in digital imaging technologies has changed our lives. In comparison to textual information, information through an image is more direct and instant. With the help of sophisticated software, a real-like image can be generated and a real photographic image can be manipulated. Hence it is possible that some image forgers can maliciously tamper the digital image to distort the truth. To restore trust in digital images, the investigation of forgery in images is essential. When the content of a digital image is modified or the whole image is created using a computer graphics software for wrong motives, such an image is commonly referred to as a forged image, and the process of creating such forged image is known as digital image forgery. In this dissertation, a systematic and complete solution is provided to authenticate a digital image. For this, two commonly performed image forgery types viz. copy-move forgery and image splicing forgery have been investigated in this thesis. Further, it is also required to develop are liable method to detect image forgery in photographic images. Various concepts such as Tetrolet transform, Gaussian-Hermite moments, Neuro-fuzzy classifier, etc. are explored and used in the proposed approaches. Experimental validation of all the proposed methods has been performed on various available image datasets and the results are compared to the existing technique on the behalf of certain performance parameters including Compression, Robustness, Accuracy and F1 score.

Keywords

{{keywords}}

Conclusion

Tampering images is not new. Availability of digital image technology and image processing software makes it easy for anyone to create a forgery. Not surprisingly, tampered images and videos are showing up everywhere, from courtrooms to scientific journals, and these images can have a profound effect on society. There is a clear need for tools to detect forgeries, and the field of digital image forensics has emerged to address this problem without any pre-requirements. Five techniques for detecting different forms of tampering in manipulated digital images have been presented – Exact Block Matching Method and Robust Block Matching Method, JPEG Compression Analysis Method and Geometry Based Method. Detection of forgeries in digital video – Frame Duplication and Region Duplication detection have also been presented.

References

[1]Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel and Mohan S. Kankanhalli, A Survey on Digital Camera Image Forensic Methods, IEEE International Conference on Multimedia and Expo, Beijing, China, pages 16- 19, 2007. [2]”Photo Tampering Throughout History”, http://www.fourandsix.com/ [3]Tehseen Shahid, Atif Bin Mansoor, Copy-Move Forgery Detection Algorithm for Digital Images and a New Accuracy Metric, International Journal of Recent Trends in Engineering, Vol 2, No. 2, November 2009, pp 159-161. [4]www.verifeyed.com [5]Alessandro Piva, An Overview on Image Forensics, Hindawi Publishing Corporation ISRN Signal Processing Volume 2013, Article ID 496701. [6]Michihiro Kobayashi, Takahiro Okabe, and Yoichi Sato, Detecting Forgery From Static-Scene Video Based onInconsistency in Noise Level Functions, IEEE Transactions On Information Forensics and Security, Vol. 5, No. 4, December 2010, pp.883-892. [7]Christian Rey, Jean-Luc Dugelay, A Survey of Watermarking Algorithms for Image Authentication, EURASIP Journal on Applied Signal Processing, Hindawi Publishing Corporation 2002:6, 613–621. [8]Babak Mahdian, Stanislav Saic, A Bibliography on Blind Methods for Identifying Image Forgery, Signal Processing: Image Communication 25, pp. 389–399, Elsivier. [9]Hany Farid, Image Forgery Detection – A Survey, IEEE Signal Processing Magazine, Vol. 2, No.26, 2009, pp. 16–25. [10]Jessica Fridrich, David Soukal, and Jan Lukas, Detection of Copy-Move Forgery in Digital Images, Proceedings of Digital Forensic ResearchWorkshop, IEEE Computer Society, Cleveland, OH, USA, August 2003, pp. 55–61. [11]Zhang W., Cao X., Zhang J., Zhu J. & Wang P., Detecting Photographic Composites Using Shadows, Proc. IEEE International Conference on Multimedia and Expo ICME 2009, pp. 1042-1045. [12]Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukas, Determining Image Origin and Integrity Using Sensor Noise, IEEE Transactions on Information Forensics and Security, 2008, Vol. 3(1), pp. 74-90. [13]Davide Cozzolino, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva, Springer-Verlag Berlin Heidelberg, SSPR & SPR 2012, LNCS 7626, 2012, pp. 693–700. [14]LUO Weiqi, QU Zhenhua, PAN Feng, HUANG Jiwu, A Survey of Passive Technology for Digital Image Forensics, Frontiers of Computer Science in China, 2007, 2(1): pp. 1−11. Osamah M. Al-Qershi, Bee Ee Khoo, Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-art, Forensic Science International 231 (2013) 284–295.

Cite this article

APA
Ekta Bala (february 2026). IMAGE FORGERY DETECTION USING SUPPORT VECTOR MACHINES: DEVELOPMENT AND EVALUATION. International Journal of Engineering and Techniques (IJET), 12(1). https://zenodo.org/records/18642289
Ekta Bala, “IMAGE FORGERY DETECTION USING SUPPORT VECTOR MACHINES: DEVELOPMENT AND EVALUATION,” International Journal of Engineering and Techniques (IJET), vol. 12, no. 1, February 2026, doi: https://zenodo.org/records/18642289.
Submit Your Paper