Sign In to Follow Application
View All Documents & Correspondence

System And Method For Automated Copy Move Forgery Detection In Intricate Image Contexts Using Vgg16

Abstract: Abstract The disclosure outlines a digital image forensics methodology designed to detect copy-move forgery in images. This method begins with a data preprocessing module that standardizes the quality and format of input images for consistency. Following this, a feature extraction module using a VGG16 convolutional neural network analyses the pre-processed images, creating a detailed feature database. A sliding window mechanism that works in tandem with the feature extraction module for region-specific analysis, focusing on areas where forgery is suspected. Additionally, a feature matching module compares features across different image regions to identify potential forgery. A detection accuracy module is also included, enhancing the system's ability to maintain high detection accuracy while minimizing false positives and negatives. This integration of modules enables the system to effectively identify and confirm instances of copy-move forgery, providing a valuable tool in digital image forensics. Fig. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
24 December 2023
Publication Number
03/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

MARWADI UNIVERSITY
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
MS. PARITA MER
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
MS. RESHMA SUNIL
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
DR. ANJALI DIWAN
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
PROF. (DR.) R. B. JADEJA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA

Inventors

1. MS. PARITA MER
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
2. MS. RESHMA SUNIL
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
3. DR. ANJALI DIWAN
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
4. PROF. (DR.) R. B. JADEJA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA

Specification

Description:SYSTEM AND METHOD FOR AUTOMATED COPY-MOVE FORGERY DETECTION IN INTRICATE IMAGE CONTEXTS USING VGG16
Field of the Invention
[0001] The disclosure falls primarily within the ambit of digital image forensics, with a specific focus on the detection of copy-move forgery. Said detection is a specialized subfield of digital image forensics, is concerned with identifying instances where parts of an image have been duplicated and reinserted within the same image, often to mislead or deceive viewers.
Background
[0002] The background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] In the realm of digital image forensics, the detection of image manipulation, particularly copy-move forgery, has become increasingly vital due to the ease with which digital images can be altered using sophisticated editing tools. Copy-move forgery, where a portion of an image is copied and pasted within the same image, often to conceal an element or create a deceptive context, poses a significant challenge in fields ranging from media to legal investigations. Traditional methods for detecting such forgeries often relied on manual inspection or rudimentary digital tools, which were not only time-consuming but also prone to inaccuracies.
[0004] The evolution of digital image forensics has been marked by the integration of advanced computational techniques. Early approaches involved pixel-based analysis, where algorithms were designed to detect inconsistencies in lighting, shadows, or pixel patterns. Said methods, however, were limited in their effectiveness, especially in complex image contexts with varied textures or patterns. Additionally, they struggled with images that had undergone post-processing such as compression or resizing, common occurrences in digital media.
[0005] Subsequently, the focus shifted towards feature-based methods, which offered more robust and sophisticated analysis. Said methods involved extracting features like edges, corners, or more complex patterns from the image and then analyzing said features for signs of tampering. While more effective than pixel-based approaches, said methods too had limitations, particularly in terms of computational efficiency and the ability to handle high-resolution images.
[0006] The breakthrough came with the advent of machine learning and, more specifically, deep learning techniques in image analysis. Convolutional Neural Networks (CNNs), a class of deep learning algorithms, emerged as a powerful tool for image recognition and analysis tasks. Their ability to learn and extract hierarchical features from images made them particularly suited for detecting subtle forms of image manipulation, including copy-move forgery.
[0007] Moreover, prior art systems did not address the limitations of approaches by being resilient to common image transformations like scaling, rotation, and noise addition. Their inability to maintain high detection accuracy across various image types and transformations is questionable in digital image forensics.
[0008] Thus, the development of automated copy-move forgery detection system using VGG16 represents a significant aspect in digital image forensics. The system encapsulates the transition from manual and rudimentary methods to sophisticated, AI-driven approaches, offering a highly effective tool for maintaining the integrity of digital imagery in an age where image manipulation is both easy and common. Said system not only enhance the accuracy of forgery detection but also significantly reduce the time and resources required for forensic analysis, making them invaluable in various domains where image authenticity is critical.
Summary
[0009] The disclosure falls primarily within the ambit of digital image forensics, with a specific focus on the detection of copy-move forgery. Said detection is a specialized subfield of digital image forensics, is concerned with identifying instances where parts of an image have been duplicated and reinserted within the same image, often to mislead or deceive viewers. The CMF-VGG16 model employs the VGG16 deep learning architecture, a prominent convolutional neural network (CNN) known for the efficacy in computer vision tasks. The integration of VGG16 in CMF-VGG16 underscores the model's reliance on advanced deep learning and neural network strategies, enabling to proficiently analyze complex image contexts for the detection of copy-move forgeries. The capability situates the CMF-VGG16 model at the intersection of computer vision and artificial intelligence, marking the significance in the evolving field of image-based forensic analysis and digital manipulation detection.
[00010] The following presents a simplified summary of various aspects of this disclosure in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements nor delineate the scope of such aspects. Its purpose is to present some concepts of this disclosure in a simplified form as a prelude to the more detailed description that is presented later.
[00011] The following paragraphs provide additional support for the claims of the subject application.
[00012] The digital image forensics system designed for detecting copy-move forgery represents a significant advancement in the field of digital image analysis and manipulation detection. Central to the system is a series of interconnected modules, each specializing in a different aspect of image processing and analysis, thereby ensuring a high degree of accuracy and reliability in detecting forgeries.
[00013] At the forefront of the system is the data preprocessing module, which includes noise reduction algorithms, which are instrumental in enhancing the clarity and detail of images, setting the stage for more precise feature extraction.
[00014] The feature extraction module that utilizes the VGG16 convolutional neural network. The module is tailored to analyze pre-processed images and create a comprehensive database of features that reflect the unique characteristics of each image. The VGG16 architecture is further enhanced with an adaptive learning mechanism, enabling the system to adjust the parameters based on the type of input images, thereby optimizing feature extraction for a wide range of image contexts.
[00015] The sliding window mechanism, which is integrated with the feature extraction module. The mechanism allows for a detailed, region-specific analysis of images, facilitating a localized examination of potential forgeries. The flexibility of the sliding window, adjustable in size and shape, enhances the system's capability to detect forgeries in images with diverse compositions and structures.
[00016] The feature matching module, operationally connected to the feature extraction module, plays a pivotal role in comparing features across different regions of the image to identify similarities that indicate forgery. The module includes a user-adjustable similarity threshold setting, providing customizable sensitivity in forgery detection.
[00017] To ensure the highest standards of accuracy, the system includes a detection accuracy module. The module is calibrated to maintain high detection accuracy and reliability across diverse image transformations and types, effectively reducing false positives and negatives. The module incorporates machine learning algorithms that learn from previous detections, continually improving the system's efficiency. Additionally, said module features an image transformation resilience capability, allowing accurate forgery detection even in transformed images like those scaled, cropped, or color-adjusted.
[00018] Further enhancing the system's utility is a reporting module linked to the detection accuracy module. The module is configured to generate detailed reports on detected forgeries, including specifics like the location, extent, and nature of the forgery within the image. Thus, the system represents a comprehensive solution for detecting copy-move forgeries, combining advanced image processing techniques with machine learning and artificial intelligence, thereby marking a significant leap forward in digital image forensics.
[00019] The method for detecting copy-move forgery in digital images represents a comprehensive approach combining advanced image processing and machine learning to address the growing issue of digital image manipulation.
[00020] Once the images are pre-processed, the method employs a VGG16 convolutional neural network for feature extraction. The step is pivotal as the VGG16 network is renowned for the effectiveness in deep learning tasks related to image recognition. The network processes the pre-processed images to create a comprehensive database of features, capturing the unique characteristics of each image. The feature database is vital as said database provides the foundational data needed for identifying potential forgeries.
Brief Description of the Drawings
[00021] The features and advantages of the present disclosure would be more clearly understood from the following description taken in conjunction with the accompanying drawings in which:
[00022] FIG. 1 pictorially portrays an architectural paradigm of a digital image forensics system for detecting copy-move forgery, according to some embodiments of the present disclosure.
[00023] FIG. 2 figuratively illustrates an exemplary schematic flow diagram of a method for detecting copy-move forgery in digital images, according to some embodiments of the present disclosure.
Detailed Description
[00024] In the following detailed description of the invention, reference is made to the accompanying drawings that form a part hereof, and in which is shown, by way of illustration, specific embodiments in which the invention may be practiced. In the drawings, like numerals describe substantially similar components throughout the several views. These embodiments are described in sufficient detail to claim those skilled in the art to practice the invention. Other embodiments may be utilized and structural, logical, and electrical changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims and equivalents thereof.
[00025] The use of the terms “a” and “an” and “the” and “at least one” and similar referents in the context of describing the invention (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The use of the term “at least one” followed by a list of one or more items (for example, “at least one of A and B”) is to be construed to mean one item selected from the listed items (A or B) or any combination of two or more of the listed items (A and B), unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
[00026] The disclosure falls primarily within the ambit of digital image forensics, with a specific focus on the detection of copy-move forgery. Said detection is a specialized subfield of digital image forensics, is concerned with identifying instances where parts of an image have been duplicated and reinserted within the same image, often to mislead or deceive viewers.
[00027] Pursuant to the "Detailed Description" section herein, whenever an element is explicitly associated with a specific numeral for the first time, such association shall be deemed consistent and applicable throughout the entirety of the "Detailed Description" section, unless otherwise expressly stated or contradicted by the context.
[00028] In today's digital age, the manipulation of images has become increasingly common. Whether for malicious purposes or creative

expression, individuals often alter or copy portions of images to create a desired effect. While image manipulation can be a legitimate practice, said manipulation can also be used for fraudulent activities, such as spreading misinformation or tampering with evidence. Detecting such manipulations is a critical task in the field of digital image forensics, and said manipulation requires advanced technology and techniques to ensure the integrity of digital visual content. The comprehensive discussion delves into a sophisticated digital image forensics system designed to tackle one of the most prevalent forms of image manipulation such as copy-move forgery. The system 100 comprises several key components, each contributing to the effectiveness in identifying and detecting instances of copy-move forgery in images.
[00029] According to a figurative elucidation of FIG. 1, showcasing an architectural setup of the system 100 that can comprise functional elements, yet not limited to a data preprocessing module 102, a feature extraction module 104, a sliding window mechanism 106, a feature matching module 108 and a detection accuracy module 110. A person ordinarily skilled in art would prefer those elements or components of the system 100, to be functionally or operationally coupled with each other, in accordance with the embodiments of present disclosure.
[00030] In yet another embodiment, the foundation of any effective digital image forensics system is the quality and consistency of the input data. The data preprocessing module plays a pivotal role in ensuring that the input images are standardized in terms of quality and format.
[00031] One of the primary functions of the data preprocessing module is to address image noise, which can distort or obscure relevant information within the image. Noise reduction algorithms are employed to filter out unwanted noise, resulting in images that are clearer and more suitable for precise feature extraction. By reducing noise, the system can focus on extracting meaningful features from the images, ultimately improving the accuracy of forgery detection. For example, consider a scenario where a digital photograph has been taken in low-light conditions, resulting in significant noise. Without proper noise reduction, the system might misinterpret the noise as features indicative of forgery, leading to false positives. The data preprocessing module's noise reduction algorithms mitigate the issue, ensuring that the subsequent stages of analysis are based on clean and reliable data.
[00032] Once the input images have been standardized and noise has been reduced, the next critical step in the digital image forensics process is feature extraction. The feature extraction module, in the system, utilizes a VGG16 convolutional neural network (CNN). The deep learning architecture is well-suited for the task of analyzing preprocessed images and creating a comprehensive feature database that reflects the unique characteristics of each image.
[00033] In yet another embodiment, the VGG16 CNN is known for the ability to capture intricate details and patterns within images, making the CNN a powerful tool for image forensics. Said CNN can extract a wide range of features, from low-level textures to high-level objects and shapes. The versatility enables the system to identify subtle irregularities or inconsistencies that may be indicative of copy-move forgery.
[00034] In yet another embodiment, the important aspect of the feature extraction module is the adaptive learning mechanism. The mechanism allows the system to adjust the parameters based on the type of input images said mechanism encounters. Image contexts can vary significantly, from natural landscapes to close-up portraits, each requiring a tailored approach to feature extraction. By adapting to the specific characteristics of the input image, the system optimizes the ability to detect forgeries effectively. For instance, consider the case of two images. A first image is a highly detailed photograph of a cityscape, and the second image is a simple abstract artwork. The feature extraction module can adapt the feature extraction strategy to suit each image's unique context, ensuring that said extraction strategy doesn't miss subtle indications of copy-move forgery while avoiding false alarms based on artistic variations.
[00035] To further enhance the ability to detect copy-move forgery, the system incorporates a sliding window mechanism, which is seamlessly integrated with the feature extraction module. The mechanism allows for a detailed, region-specific analysis of the images, enabling the system to conduct localized examinations of potential forgeries.
[00036] In yet another embodiment, the sliding window can be adjusted in terms of size and shape, providing flexibility in the analysis of different image regions. By resizing and reshaping the window, the system can focus on specific areas of interest within the image, making the system more adept at identifying copied or manipulated regions. For example, consider a composite image where a portion of a landscape photograph has been copied and pasted into another part of the same image. By employing a small, rectangular sliding window, the system can meticulously scrutinize different sections of the image, identifying regions that exhibit signs of forgery. The granular approach enhances the system's detection capabilities, particularly in scenarios where forgeries are meticulously concealed within the image.
[00037] In yet another embodiment, the heart of the forgery detection process lies within the feature matching module. The module is operationally connected to the feature extraction module and is tasked with the critical role of comparing features across different image regions to identify similarities that are indicative of forgery.
[00038] In yet another embodiment, the feature matching module employs sophisticated algorithms that analyze the extracted features and assess their similarity. When two or more regions within an image exhibit a high degree of similarity in terms of their features, said feature matching module raises suspicion of copy-move forgery. The module systematically compares features across all regions of the image, creating a comprehensive map of potential forgeries.
[00039] One key feature of the feature matching module is the customizable sensitivity. The matching module includes a similarity threshold setting that can be adjusted by the user, allowing for personalized fine-tuning of the detection process. Users can set the threshold to be more lenient, increasing sensitivity and detecting even subtle forgeries, or more stringent, reducing the likelihood of false alarms. For instance, in a legal investigation where the highest level of accuracy is paramount, the user may choose to set a stringent similarity threshold to minimize false positives. Conversely, in situations where a broader detection net is desirable, such as in social media content moderation, a more lenient threshold may be appropriate to catch a wider range of potential forgeries.
[00040] Ensuring the reliability of forgery detection across diverse image transformations and types is a fundamental challenge in digital image forensics. The detection accuracy module serves as the linchpin in the regard. The detection accuracy module is connected to both the feature extraction and feature matching modules, orchestrating the system's overall accuracy and reliability.
[00041] In yet another embodiment, the detection accuracy module is calibrated to maintain high detection accuracy even when faced with a multitude of image transformations and types. Said transformations can include scaling, cropping, color adjustments, and various forms of manipulation that attempt to obfuscate the forgery. By continuously adapting and improving the algorithms, the module reduces the incidence of both false positives and false negatives in forgery detection. For instance, consider a scenario where an image has undergone multiple transformations, including resizing, rotation, and color correction.
[00042] Said transformations can make challenging to detect the presence of copy-move forgery accurately. However, the detection accuracy module leverages machine learning algorithms that learn from previous forgery detections. The learning process enables the system to continually enhance the accuracy and efficiency over time, becoming more adept at identifying forgeries despite complex image transformations.
[00043] In addition to the core detection capabilities, the system incorporates a reporting module, which is linked to the detection accuracy module. The reporting module generates detailed reports on detected forgeries, including information about the location, extent, and nature of the forgery within the image.
[00044] When a potential copy-move forgery is identified, the reporting module records essential details about the forgery, such as the coordinates of the copied regions and the extent of the manipulation. The information is invaluable in forensic investigations, as the information allows investigators to understand the nature of the forgery and make informed decisions regarding the implications. For instance, consider a legal case where a digital image is submitted as evidence. The reporting module can produce a comprehensive report that not only highlights the presence of a copy-move forgery but also provides a visual representation of the manipulated areas. The visual evidence can be critical in court proceedings, helping to establish the authenticity of the image and the credibility of the evidence presented.
[00045] In yet another embodiment, the evolution of digital image forensics is driven by the dynamic nature of image manipulation techniques. To stay ahead of forgers and maintain high detection accuracy, the system incorporates machine learning algorithms within the detection accuracy module.
[00046] Said machine learning algorithms continually learn from previous forgery detections and adapt their detection strategies accordingly. The adaptive learning process allows the system to recognize emerging patterns and trends in image manipulation techniques. As a result, the system becomes more proficient at detecting forgeries that employ methods and evasion tactics. For instance, as forgers develop new ways to blend copied regions seamlessly into the surrounding image, the machine learning algorithms can identify said emerging techniques and adjust their feature extraction and matching criteria to detect them effectively.
[00047] In yet another embodiment, the significant challenge in digital image forensics is the ability to accurately detect forgeries in images that have undergone various transformations. Image transformations can include resizing, cropping, rotation, color adjustments, and more. Forgers often employ said transformations to make their manipulations less conspicuous.
[00048] To address the challenge, the system incorporates an image transformation resilience feature within the detection accuracy module. The feature enables the system to maintain the accuracy and reliability even in the presence of extensive image transformations. For instance, consider a scenario where a copy-move forgery involves resizing a region of an image to make said image appear different from the original. Without image transformation resilience, the system might struggle to identify the manipulated region due to the scale difference. However, the feature allows the system to account for such transformations and accurately pinpoint the forgery.
[00049] To provide a comprehensive analysis of images, the feature extraction module is configured to perform both global and local feature extraction. The dual approach enables the system to analyze the entire image as well as focus on specific areas of interest. Global feature extraction involves examining the image as a whole, capturing overarching patterns, and identifying inconsistencies or anomalies that may be indicative of forgery.
[00050] Local feature extraction, on the other hand, zooms in on specific regions or objects within the image. Said local feature extraction enables the system to conduct a more detailed examination of areas that are likely targets for copy-move forgery. By extracting local features, the system can identify subtle irregularities that may go unnoticed during global analysis. For example, in a photograph of a crowded street, global feature extraction may help identify broad inconsistencies in lighting and perspective. However, local feature extraction can zoom in on specific individuals or objects within the image, detecting even minor alterations or duplications of said elements.
[00051] Referring to one or more preceding embodiments, the digital image forensics system described here represents a robust and versatile tool for detecting copy-move forgery in digital images. By standardizing input data, employing advanced feature extraction techniques, utilizing a sliding window mechanism, and incorporating customizable features like similarity threshold settings and image transformation resilience, the system offers a comprehensive solution for identifying digital image manipulations. Additionally, the integration of machine learning ensures ongoing improvement and adaptability, keeping pace with evolving forgery techniques. Whether in legal investigations, content moderation, or maintaining the integrity of digital visual content, the system plays a vital role in upholding the trustworthiness of digital imagery.
[00052] Referring to a pictorial depiction put forth in FIG. 2, representing a flow chart of the method 200 that can comprise steps of, yet not restricted to, (at step 202) preprocessing digital images to standardize quality and format, (at step 204) extracting features from the pre-processed images, (at step 206) conducting a detailed, region-specific analysis of the images, (at step 208) comparing features across different image regions and (at step 210) maintaining high detection accuracy and reliability across diverse image transformations and types. Said steps of the method 200 can be performed or executed, collectively or selectively, randomly or sequentially or in a combination thereof, in accordance with the embodiments of current disclosure.
[00053] In yet another embodiment, the initial step involves standardizing the quality and format of digital images. The initial step is enable consistency when dealing with various types of images, such as JPEG, PNG, or RAW formats. Preprocessing includes resizing images, normalizing brightness and contrast, and converting images into a uniform format. The standardization is essential for accurate feature extraction in later stages. For example, tools like Adobe Photoshop or GIMP can be used for the purpose. For example, an image in a RAW format might be converted to JPEG with standardized dimensions and color settings.
[00054] VGG16 is a convolutional neural network (CNN) model known for the effectiveness in image recognition tasks. VGG16 consists of 16 layers and is trained on millions of images. Feature extraction process step involves passing the preprocessed images through the VGG16 model to extract distinctive features. Said features could include edges, textures, color distributions, and other unique aspects of the image.
[00055] In yet another embodiment, the extracted features are stored in a database. Each image gets a unique feature profile, reflecting the individual characteristics. For example, consider an image of a landscape. VGG16 would analyze and record features like the texture of the trees, the pattern of the sky, and the contours of the mountains.
[00056] Sliding window mechanism involves dividing each image into smaller regions or 'windows'. Each window is analyzed separately for features. As each window passes through the feature extraction module, creates a more detailed and localized feature map of the image. For example, in a cityscape photo, different windows might focus on buildings, streets, or vehicles, capturing detailed features of each area. Feature matching module compares features across different regions of the image. Said matching module looks for similarities that are unnatural or unlikely to occur organically.
[00057] If two distinct regions have unusually similar features, said regions might indicate that a part of the image has been copied and pasted, a common technique in forgery. For instance, if two people in a crowd have identical faces down to pixel-level features, suggests that one face was copied and pasted onto another person’s body.
[00058] Detection accuracy module ensures the system remains reliable across various image transformations (like scaling, rotation) and different image types. By fine-tuning the algorithm, the system minimizes errors where legitimate images are flagged as forgeries (false positives) or actual forgeries go undetected (false negatives). The system adapts to different lighting conditions, angles, and photographic styles, ensuring robust forgery detection.
[00059] Referring to the preceding embodiment, the VGG16 model, named after the Visual Geometry Group at the University of Oxford, is a significant deep convolutional neural network architecture in computer vision. The VGG16 model is known for the 16-layer structure, comprising 13 convolutional and 3 fully connected layers. The uniform design of VGG16, which utilizes 3x3 convolutional filters and max-pooling layers, has been pivotal in image classification, object detection, and image segmentation tasks. The proficiency in feature extraction makes ideal for transfer learning across a wide range of image-related applications, establishing VGG16 as a foundational element in deep learning and computer vision.
[00060] In the context of CMF-VGG16, the model is primarily aimed at detecting copy-move forgeries in digital images, a pressing issue in digital image forensics. Copy-move forgery, where parts of an image are copied and pasted within the same image to deceive viewers, demands a sophisticated detection mechanism due to possible variations like scaling and rotation. CMF-VGG16 leverages the feature extraction capabilities of VGG16 to automate and accurately identify such duplications, enhancing the integrity of digital visual content.
[00061] In yet another embodiment, the process involves initial data preprocessing for consistency, followed by using VGG16 for feature extraction to create a detailed feature database. The model then performs a meticulous analysis of different image regions using a sliding window technique, combining both localized and global feature extraction. Feature matching identifies regions with similar features, and precise similarity assessments, coupled with optimal thresholding techniques, distinguish between genuine and forged areas. Post-processing refines said results, ensuring accurate identification of manipulated regions.
[00062] CMF-VGG16's systematic workflow significantly aids in detecting copy-move forgeries, making said workflow a valuable asset in image authenticity verification and digital forensics. The model's ability to handle complex image alterations and the adaptability for integration into various platforms further enhance the utility and impact in safeguarding digital media integrity.
[00063] Referring to one or more preceding embodiments, the described method 200 represents a comprehensive approach to detecting copy-move forgery in digital images. The method combines advanced neural network technology with detailed image analysis, ensuring high accuracy and reliability in identifying forgeries. By preprocessing images, extracting detailed features using VGG16, performing region-specific analyses, comparing features across regions, and maintaining high detection accuracy, the method tackles the sophisticated challenge of digital image forgery.
[00064] Example embodiments herein have been described above with reference to block diagrams and flowchart illustrations of methods and apparatuses. It will be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by various means including hardware, software, firmware, and a combination thereof. For example, in one embodiment, each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations can be implemented by computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks.
[00065] Throughout the present disclosure, the term ‘processing means’ or ‘microprocessor’ or ‘processor’ or ‘processors’ includes, but is not limited to, a general purpose processor (such as, for example, a complex instruction set computing (CISC) microprocessor, a reduced instruction set computing (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, a microprocessor implementing other types of instruction sets, or a microprocessor implementing a combination of types of instruction sets) or a specialized processor (such as, for example, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), or a network processor).
[00066] The term “non-transitory storage device” or “storage” or “memory,” as used herein relates to a random access memory, read only memory and variants thereof, in which a computer can store data or software for any duration.
[00067] Operations in accordance with a variety of aspects of the disclosure is described above would not have to be performed in the precise order described. Rather, various steps can be handled in reverse order or simultaneously or not at all.
[00068] While several implementations have been described and illustrated herein, a variety of other means and/or structures for performing the function and/or obtaining the results and/or one or more of the advantages described herein may be utilized, and each of such variations and/or modifications is deemed to be within the scope of the implementations described herein. More generally, all parameters, dimensions, materials, and configurations described herein are meant to be exemplary and that the actual parameters, dimensions, materials, and/or configurations will depend upon the specific application or applications for which the teachings is/are used. Those skilled in the art will recognize, or be able to ascertain using no more than routine experimentation, many equivalents to the specific implementations described herein. It is, therefore, to be understood that the foregoing implementations are presented by way of example only and that, within the scope of the appended claims and equivalents thereto, implementations may be practiced otherwise than as specifically described and claimed. Implementations of the present disclosure are directed to each individual feature, system, article, material, kit, and/or method described herein. In addition, any combination of two or more such features, systems, articles, materials, kits, and/or methods, if such features, systems, articles, materials, kits, and/or methods are not mutually inconsistent, is included within the scope of the present disclosure.

Claims
I/We Claim:
1. A digital image forensics system for detecting copy-move forgery, comprising:
a data preprocessing module configured to standardize the quality and format of input images, ensuring consistency across various image types;
a feature extraction module utilizing a VGG16 convolutional neural network, designed to analyze the preprocessed images and create a comprehensive feature database reflecting the unique characteristics of each image;
a sliding window mechanism integrated with the feature extraction module for conducting a detailed, region-specific analysis of the images, allowing for localized examination of potential forgeries;
a feature matching module operationally connected to the feature extraction module, wherein the feature matching module tasked with comparing features across different image regions to identify similarities indicative of forgery; and
a detection accuracy module connected to both the feature extraction and feature matching modules, wherein the detection accuracy module is calibrated to maintain high detection accuracy and reliability across diverse image transformations and types, effectively reducing the incidence of false positives and negatives in forgery detection.
2. The system of claim 1, wherein the data preprocessing module further includes noise reduction algorithms to filter out image noise, enhancing the clarity and detail of the input images for more precise feature extraction.
3. The system of claim 1, wherein the feature extraction module using the VGG16 convolutional neural network further includes an adaptive learning mechanism that adjusts its parameters based on the type of input images, optimizing feature extraction for various image contexts.
4. The system of claim 1, wherein the sliding window mechanism is adjustable in size and shape, allowing for flexible analysis of different image regions, thereby improving the detection of forgeries in images with varying compositions and structures.
5. The system of claim 1, where the feature matching module includes a similarity threshold setting that can be adjusted by the user, allowing for customizable sensitivity in the detection of copy-move forgeries.
6. The system of claim 1, further comprising a reporting module linked to the detection accuracy module, configured to generate detailed reports on detected forgeries, including the location, extent, and nature of the forgery within the image.
7. The system of claim 1, wherein the detection accuracy module incorporates machine learning algorithms that learn from previous forgery detections to continually improve the accuracy and efficiency of the system over time.
8. The system of claim 1, further including an image transformation resilience feature in the detection accuracy module, capable of accurately detecting forgeries even in images that have undergone transformations such as scaling, cropping, and color adjustments.
9. The system of claim 1, wherein the feature extraction module is further configured to perform both global and local feature extraction, enabling a more comprehensive analysis of the entire image as well as detailed examination of specific areas of interest.
10. A method for detecting copy-move forgery in digital images, the method comprising:
preprocessing digital images to standardize quality and format, ensuring consistency across various image types;
extracting features from the preprocessed images using a VGG16 convolutional neural network to create a feature database reflecting unique image characteristics;
conducting a detailed, region-specific analysis of the images using a sliding window mechanism integrated with the feature extraction module;
comparing features across different image regions to identify similarities indicative of forgery using a feature matching module; and
maintaining high detection accuracy and reliability across diverse image transformations and types, effectively reducing the incidence of false positives and negatives, using a detection accuracy module.

Abstract
The disclosure outlines a digital image forensics methodology designed to detect copy-move forgery in images. This method begins with a data preprocessing module that standardizes the quality and format of input images for consistency. Following this, a feature extraction module using a VGG16 convolutional neural network analyses the pre-processed images, creating a detailed feature database. A sliding window mechanism that works in tandem with the feature extraction module for region-specific analysis, focusing on areas where forgery is suspected. Additionally, a feature matching module compares features across different image regions to identify potential forgery. A detection accuracy module is also included, enhancing the system's ability to maintain high detection accuracy while minimizing false positives and negatives. This integration of modules enables the system to effectively identify and confirm instances of copy-move forgery, providing a valuable tool in digital image forensics.
Fig. 1
, Claims:Claims
I/We Claim:
1. A digital image forensics system for detecting copy-move forgery, comprising:
a data preprocessing module configured to standardize the quality and format of input images, ensuring consistency across various image types;
a feature extraction module utilizing a VGG16 convolutional neural network, designed to analyze the preprocessed images and create a comprehensive feature database reflecting the unique characteristics of each image;
a sliding window mechanism integrated with the feature extraction module for conducting a detailed, region-specific analysis of the images, allowing for localized examination of potential forgeries;
a feature matching module operationally connected to the feature extraction module, wherein the feature matching module tasked with comparing features across different image regions to identify similarities indicative of forgery; and
a detection accuracy module connected to both the feature extraction and feature matching modules, wherein the detection accuracy module is calibrated to maintain high detection accuracy and reliability across diverse image transformations and types, effectively reducing the incidence of false positives and negatives in forgery detection.
2. The system of claim 1, wherein the data preprocessing module further includes noise reduction algorithms to filter out image noise, enhancing the clarity and detail of the input images for more precise feature extraction.
3. The system of claim 1, wherein the feature extraction module using the VGG16 convolutional neural network further includes an adaptive learning mechanism that adjusts its parameters based on the type of input images, optimizing feature extraction for various image contexts.
4. The system of claim 1, wherein the sliding window mechanism is adjustable in size and shape, allowing for flexible analysis of different image regions, thereby improving the detection of forgeries in images with varying compositions and structures.
5. The system of claim 1, where the feature matching module includes a similarity threshold setting that can be adjusted by the user, allowing for customizable sensitivity in the detection of copy-move forgeries.
6. The system of claim 1, further comprising a reporting module linked to the detection accuracy module, configured to generate detailed reports on detected forgeries, including the location, extent, and nature of the forgery within the image.
7. The system of claim 1, wherein the detection accuracy module incorporates machine learning algorithms that learn from previous forgery detections to continually improve the accuracy and efficiency of the system over time.
8. The system of claim 1, further including an image transformation resilience feature in the detection accuracy module, capable of accurately detecting forgeries even in images that have undergone transformations such as scaling, cropping, and color adjustments.
9. The system of claim 1, wherein the feature extraction module is further configured to perform both global and local feature extraction, enabling a more comprehensive analysis of the entire image as well as detailed examination of specific areas of interest.
10. A method for detecting copy-move forgery in digital images, the method comprising:
preprocessing digital images to standardize quality and format, ensuring consistency across various image types;
extracting features from the preprocessed images using a VGG16 convolutional neural network to create a feature database reflecting unique image characteristics;
conducting a detailed, region-specific analysis of the images using a sliding window mechanism integrated with the feature extraction module;
comparing features across different image regions to identify similarities indicative of forgery using a feature matching module; and
maintaining high detection accuracy and reliability across diverse image transformations and types, effectively reducing the incidence of false positives and negatives, using a detection accuracy module.

Documents

Application Documents

# Name Date
1 202321088539-REQUEST FOR EARLY PUBLICATION(FORM-9) [24-12-2023(online)].pdf 2023-12-24
2 202321088539-POWER OF AUTHORITY [24-12-2023(online)].pdf 2023-12-24
3 202321088539-OTHERS [24-12-2023(online)].pdf 2023-12-24
4 202321088539-FORM-9 [24-12-2023(online)].pdf 2023-12-24
5 202321088539-FORM FOR SMALL ENTITY(FORM-28) [24-12-2023(online)].pdf 2023-12-24
6 202321088539-FORM 1 [24-12-2023(online)].pdf 2023-12-24
7 202321088539-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [24-12-2023(online)].pdf 2023-12-24
8 202321088539-EDUCATIONAL INSTITUTION(S) [24-12-2023(online)].pdf 2023-12-24
9 202321088539-DRAWINGS [24-12-2023(online)].pdf 2023-12-24
10 202321088539-DECLARATION OF INVENTORSHIP (FORM 5) [24-12-2023(online)].pdf 2023-12-24
11 202321088539-COMPLETE SPECIFICATION [24-12-2023(online)].pdf 2023-12-24
12 202321088539-FORM 18 [29-12-2023(online)].pdf 2023-12-29
13 Abstact.jpg 2024-01-15
14 202321088539-RELEVANT DOCUMENTS [09-10-2024(online)].pdf 2024-10-09
15 202321088539-POA [09-10-2024(online)].pdf 2024-10-09
16 202321088539-FORM 13 [09-10-2024(online)].pdf 2024-10-09
17 202321088539-FER.pdf 2025-05-05
18 202321088539-FORM-8 [20-06-2025(online)].pdf 2025-06-20
19 202321088539-FER_SER_REPLY [20-06-2025(online)].pdf 2025-06-20
20 202321088539-DRAWING [20-06-2025(online)].pdf 2025-06-20
21 202321088539-CORRESPONDENCE [20-06-2025(online)].pdf 2025-06-20
22 202321088539-CLAIMS [20-06-2025(online)].pdf 2025-06-20
23 202321088539-ABSTRACT [20-06-2025(online)].pdf 2025-06-20

Search Strategy

1 202321088539_SearchStrategyNew_E_SearchHistory(16)E_24-03-2025.pdf