Analysis of Splicing Manipulation in Digital Images using Dyadic Wavelet Transform (DyWT) and Scale Invariant Feature Transform (SIFT) Methods

  • Zumratul Muhidin Universitas Teknologi Mataram
  • Muh. Nasirudin Karim Universitas Teknologi Mataram
  • Muhamad Masjun Efendi Universitas Teknologi Mataram

Abstract

In the digital age, image manipulation is common, often done before publication on social media. However, this can lead to negative impacts, including visual deception. This research aims to detect splicing type image manipulation using Dyadic Wavelet Transform (DyWT) and Scale Invariant Feature Transform (SIFT) methods. The process starts with image decomposition using DyWT to obtain LL sub-images, followed by local feature extraction using SIFT. An application built on desktop-based Matlab source was developed to detect splicing forgery in digital images. The test used 20 images, this image dataset was taken from canon 5d mark II camera and Vivo X80 mobile phone. Each 10 original images, and 10 edited images. These 10 original images are left as they are without making changes, editing or manipulation, while the other 10 images are changed, edited or manipulated using editing software, the results of this editing are uploaded to social media, such as Facebook and Instagram, which will later be used as datasets in testing. The results show that the splicing technique is detected accurately, and processing is faster on images with low pixel resolution. The DyWT and SIFT methods are effective in detecting post-processing attacks such as rotation and rescaling, although they have drawbacks. DyWT struggles in detecting subtle changes and noise, while SIFT is less effective on non-geometric manipulations. Overall, both methods face challenges in detecting complex manipulations and require significant computational resources, especially on high-resolution images.

References

[1] J. Charpe and A. Bhattacharya, “Revealing image forgery through image manipulation detection,” Glob. Conf. Commun. Technol. GCCT 2015, no. Gcct, pp. 723–727, 2015, doi: 10.1109/GCCT.2015.7342759.
[2] I. T. Ahmed, B. T. Hammad, and N. Jamil, “A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features,” Indones. J. Electr. Eng. Comput. Sci., vol. 22, no. 2, pp. 1177–1190, 2021, doi: 10.11591/IJEECS.V22.I2.PP1177-1190.
[3] M. H. Andrian Saputra, “Fenomena Ujaran Kebencian Di Medsos,” Republika. republika.co.id, Jakarta, pp. 1–3, 2022. [Online]. Available: https://islamdigest.republika.co.id/berita/rinxua430/fenomena-ujaran-kebencian-di-medsos
[4] S. S. Narayanan and G. Gopakumar, “Recursive Block Based Keypoint Matching for Copy Move Image Forgery Detection,” 2020 11th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2020, 2020, doi: 10.1109/ICCCNT49239.2020.9225658.
[5] M. T. Jijina, L. Koshy, and G. S. Warrier, “Detection of Recoloring and Copy-Move Forgery in Digital Images,” Proc. - 2020 5th Int. Conf. Res. Comput. Intell. Commun. Networks, ICRCICN 2020, pp. 49–53, 2020, doi: 10.1109/ICRCICN50933.2020.9296173.
[6] G. Bobashev, N. G. Baldasaro, K. C. Mills, and J. L. Davis, “An Efficiency-Decay Model for Lumen Maintenance,” IEEE Trans. Device Mater. Reliab., vol. 16, no. 3, pp. 277–281, 2016, doi: 10.1109/TDMR.2016.2584926.
[7] M. S. Rana, M. M. Hasan, and S. K. S. Shuva, “Digital Watermarking Image Using Discrete Wavelet Transform and Discrete Cosine Transform with Noise Identification,” 2022 2nd Int. Conf. Intell. Technol. CONIT 2022, no. August, pp. 1–5, 2022, doi: 10.1109/CONIT55038.2022.9847745.
[8] T. Das, R. Hasan, M. R. Azam, and J. Uddin, “A Robust Method for Detecting Copy-Move Image Forgery Using Stationary Wavelet Transform and Scale Invariant Feature Transform,” Int. Conf. Comput. Commun. Chem. Mater. Electron. Eng. IC4ME2 2018, pp. 1–4, 2018, doi: 10.1109/IC4ME2.2018.8465668.
[9] P. Dingbang, C. Hao, S. Xiaochong, and L. Jianxun, “Motion blurred star image centroid optimized extraction based on prior Gaussian distribution,” Proc. 29th Chinese Control Decis. Conf. CCDC 2017, pp. 3149–3154, 2017, doi: 10.1109/CCDC.2017.7979049.
[10] Y. Fan and Helbert, “Detection of Image Splicing using Illuminant Color Estimation,” 2019.
[11] T. Julliand et al., “Automated Image Splicing Detection from Noise Estimation in Raw Images To cite this version : HAL Id : hal-01510075 Automated Image Splicing Detection from Noise Estimation in Raw Images,” 2017.
[12] T. Julliand, V. Nozick, and H. Talbot, “Automated image splicing detection from noise estimation in raw images,” IET Semin. Dig., vol. 2015, no. 5, 2015, doi: 10.1049/ic.2015.0111.
[13] D. E. Kurniawan and N. Narupi, “Teknik Penyembunyian Data Menggunakan Kombinasi Kriptografi Rijndael dan Steganografi Least Significant Bit (LSB)”, JuTISI, vol. 2, no. 3, Dec. 2016.
[14] D. E. Kurniawan, N. R. Hartadi, and P. Prasetyawan, “Analisis Hasil Teknik Penyembunyian Hak Cipta Menggunakan Transformasi DCT dan RSPPMC pada Jejaring Sosial,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 3, Art. no. 3, Aug. 2018, doi: 10.25126/jtiik.201853692.
[15] K. H. Hingrajiya and R. K. Sheth, "Comparative Study of Digital Image Forgery Detection Techniques," 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2021, pp. 83-86, doi: 10.1109/ICACITE51222.2021.9404748.
[16] E. A. Armas Vega, E. González Fernández, A. L. Sandoval Orozco and L. J. García Villalba, "Passive Image Forgery Detection Based on the Demosaicing Algorithm and JPEG Compression," in IEEE Access, vol. 8, pp. 11815-11823, 2020, doi: 10.1109/ACCESS.2020.2964516.
[17] H. Tomita and T. Minamoto, "Detection of Stained Chrysotile in Microscopic Images Using Wavelet-Based Texture Features," 2022 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), Toyama, Japan, 2022, pp. 19-24, doi: 10.1109/ICWAPR56446.2022.9947130.
Published
2024-11-12
How to Cite
MUHIDIN, Zumratul; KARIM, Muh. Nasirudin; EFENDI, Muhamad Masjun. Analysis of Splicing Manipulation in Digital Images using Dyadic Wavelet Transform (DyWT) and Scale Invariant Feature Transform (SIFT) Methods. JOURNAL OF APPLIED INFORMATICS AND COMPUTING, [S.l.], v. 8, n. 2, p. 408-412, nov. 2024. ISSN 2548-6861. Available at: <http://704209.wb34atkl.asia/index.php/JAIC/article/view/8540>. Date accessed: 28 nov. 2024. doi: https://doi.org/10.30871/jaic.v8i2.8540.
Section
Articles

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.