Copy-Move Image Forgery Detection (CMFD) using Hybrid Approach
DOI:
https://doi.org/10.15662/IJEETR.2026.0802117Keywords:
Copy-move forgery, CenSurE, CNN, image processing, hybrid model, feature detectionAbstract
Copy-move image forgery is a common type of image manipulation where a part of an image is copied and pasted into another area of the same image, making it difficult to detect fake content. Detecting such forgeries is important in areas like digital forensics, security, and media verification. This project proposes a hybrid approach for detecting copy-move image forgery using CenSurE keypoint detection and Convolutional Neural Network (CNN). The CenSurE algorithm is used to detect keypoints and extract important features from the image efficiently, helping to identify duplicated regions.After feature extraction, a CNN model is used to classify and confirm whether the image is original or forged. The combination of CenSurE and CNN improves both detection speed and accuracy compared to using a single method. The system is tested using a dataset of original and tampered images, and the results show improved performance in terms of accuracy and reliability. This work proves that hybrid techniques are effective for real-world image forgery detection
References
1. I. Shallal, L. R. Haddada, and N. E. B. Amara, “Image Forgery Detection with Focus on Copy-Move: An Overview, Real World Challenges and Future Directions,” Applied Sciences, vol. 15, no. 21, 2025.
2. M. Verma and D. Singh, “Survey on Image Copy-Move Forgery Detection,” Multimedia Tools and Applications, vol. 83, pp. 23761–23797, 2024.
3. A. Diwan, D. Kumar, R. Mahadeva, H. C. S. Perera, and J. Alawatugoda, “Unveiling Copy-Move Forgeries: Enhancing Detection with SuperPoint Keypoint Architecture,” IEEE Access, vol. 11, pp. 86132–86148, 2023.
4. A. J. Fridrich, D. Soukal, and A. J. Lukas, “Detection of copy-move forgery in digital images,” in Proc. DFRWS, 2003.
5. S. R. Dubey and A. Jalal, “Copy-move forgery detection using keypoint-based features,” J. Vis. Commun. Image Represent., vol. 45, pp. 1–12, 2017.
6. M. Zandi, A. Mahmoudi-Aznaveh, and A. Talebpour, “Iterative copy-move forgery detection based on a new interest point detector,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2499–2512, 2016.
7. H. Huang, W. Guo, and Y. Zhang, “Detection of copy-move forgery in digital images using SIFT algorithm,” in Proc. IEEE Pacific-Asia Workshop, 2008.
8. Y. Rao and J. Ni, “A deep learning approach to detection of splicing and copy-move forgeries,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 3, pp. 688–699, 2019.
9. J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in Proc. CVPR, 2015.
10. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proc. CVPR, 2016.
11. A. Krizhevsky, I. Sutskever, and G. Hinton, “ImageNet classification with deep convolutional neural networks,” in Proc. NIPS, 2012.
12. M. Bayar and M. Stamm, “A deep learning approach to universal image manipulation detection,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 1, pp. 123–133, 2018.
13. Y. Li and S. Lyu, “Exposing deepfake videos by detecting face warping artifacts,” in Proc. CVPR Workshops, 2019.
14. S. Wankhede and M. Atique, “Copy-move forgery detection using hybrid approach,” Int. J. Comput. Appl., vol. 179, no. 39, pp. 20–25, 2018.
15. M. Cozzolino, G. Poggi, and L. Verdoliva, “Efficient dense-field copy-move forgery detection,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2284–2297, 2015.
16. C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746
17. C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2
18. C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9
19. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025
20. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428
21. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w
22. C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.
23. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.
24. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.
25. [10] C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007
26. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721
27. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022
28. D. Lowe, “Distinctive image features from scale-invariant keypoints,” Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, 2004.
29. T. Tuytelaars and K. Mikolajczyk, “Local invariant feature detectors: A survey,” Found. Trends Comput. Graph. Vis., vol. 3, no. 3, pp. 177–280, 2008.
30. R. Szeliski, Computer Vision: Algorithms and Applications, Springer, 2010.
31. P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in Proc. CVPR, 2001.
32. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in Proc. ICLR, 2015
33. Anand, L. (2023). An Intelligent AI and ML–Driven Cloud Security Framework for Financial Workflows and Wastewater Analytics. International Journal of Humanities and Information Technology, 5(02), 87-94.
34. Murugeshwari, B., Sudharson, K., Panimalar, S. P., Shanmugapriya, M., & Abinaya, M. (2020). SAFE–Secure Authentication in Federated Environment using CEG Key code.
35. Sugumar, R. (2025). Cyber-Secure Cloud Architecture Integrating Network and API Controls for Risk-Aware SAP Healthcare Data Platforms. International Journal of Humanities and Information Technology, 7(4), 53-60.
36. Sharma, K. P., Kumar, I., Singh, P. P., Anbazhagan, K., Albarakati, H. M., Bhatt, M. W., ... & Rana, A. (2024). Advancing spacecraft rendezvous and docking through safety reinforcement learning and ubiquitous learning principles. Computers in Human Behavior, 153, 108110.
37. Anand, L., Tyagi, R., & Mehta, V. (2024, January). Food recognition using deep learning for recipe and restaurant recommendation. In Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (pp. 269-279). Springer Nature Singapore.
38. Soundappan, S. J. (2020). Big Data Analytics in Healthcare: Applications for Pandemic Forecastin. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 3(1), 2248-2253.
39. Anbazhagan, K. (2024). Trustworthy and Adaptive AI Systems for Enterprise Analytics Cybersecurity and Decision Optimization Using API-First and Cloud-Native Architectures. International Journal of Technology, Management and Humanities, 10(03), 65-74.
40. Mathew, A. (2021). Edge Computing and its convergence with blockchain in 6G: Security challenges. Int. J. Comput. Sci. Mob. Comput, 10(8), 8-14.
41. Gopinathan, V. R. (2025). AI-Powered Kubernetes Orchestration for Complex Cloud-Native Workloads. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(6), 13215-13225.
42. Mathew, A. (2023). Learning Metaverse Powered by Artificial Intelligence. Recent Progress in Science and Technology Vol. 4, 4, 134-141.
43. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64. https://doi.org/10.36346/sarjet.2020.v02i06.003
44. Sugumar, R. (2025). Secure and Explainable AI Systems in Cloud-Based Applications: Bridging Trust and Performance. International Journal of Engineering & Extended Technologies Research (IJEETR), 7(4), 10328-10335.
45. Mathew, A., & Alex, H. (2023). From Code to Cure: The Role of AI in Accelerating Drug Discovery. Advances and Challenges in Science and Technology Vol. 2, 94-102.
46. Vimal, V. R., John Justin Thangaraj, S., Narayanan, L. K., Alagu Thangam, S., Loganayagi, S., & Balakrishnan, S. (2025, April). Enhanced Phishing Detection and Classification Using an Ensemble Machine Learning Approach for URL Analysis. In International Conference on Information and Communication Technology for Intelligent Systems (pp. 229-239). Springer Nature Singapore.
47. Mathew, A. (2021). Obfuscation Techniques for Magecart Detection and Prevention. International Journal of Computer Science and Mobile Computing, 10(2), 39-44.
48. Soundappan, S. J. (2026). Building Trustworthy AI: Explainability and Security in Modern Cloud-Native Data-Driven Ecosystem Platforms. International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 570-579.
49. Sahid, M. H., Pratama, D. A., Abd Rahman, M., Vardhani, A. K., Kulsum, D. U., Tanaka, J., ... & Renaldi, T. (2026). Kesehatan Masyarakat Di Era Digital. CV Eureka Media Aksara.
50. Mathew, A. (2021). Deep reinforcement learning for cybersecurity applications. Int J Comput Sci Mob Compu, 10(12), 32-38.
51. Gopinathan, V. R. (2023). Cloud-First AI Security Architecture for Protecting Enterprise Digital Ecosystems and Financial Networks. International Journal of Research and Applied Innovations, 6(6), 10031-10039.
52. Inbavalli, M., & Arasu, T. (2015). Efficient Analysis of Frequent Item Set Association Rule Mining Methods. International Journal of Scientific & Engineering Research, 6(4).





