510Accesses
Abstract
Copy-move forgery (CMF), which copies a part of an image and pastes it into another region, is one of the most common methods for digital image tampering. For CMF detection (CMFD), we propose a fast and robust approach that can handle several geometric transformations including rotation, scaling, sheering, and reflection. In the proposed CMFD design, keypoints and their descriptors are extracted from the image based on the Scale Invariant Feature Transform (SIFT). Then, an improved matching operation that can handle multiple copy-move forgeries is performed to detect matched pairs located in duplicated regions. Next, the geometric transformation between duplicated regions is estimated using a subset of reliable matched pairs which are obtained using the SIFT scale space representation. In our simulation, we present comparative results between the proposed algorithm and state-of-the-art ones with proven performance guarantees.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.








Similar content being viewed by others
References
Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659–669
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110
Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. Comput Vis Image Understand 110(3):346–359
Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: IEEE international conference on acoustics, speech and signal processing, pp 1053–1056
Beis JS, Lowe DG (1997) Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: IEEE conference on computer vision and pattern recognition, pp 1000–1006
Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245
Chen C, Ni J, Huang J (2013) Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans Image Process 22(2):4699–4710
Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: IEEE international workshop on information forensics and security, pp 1–6
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854
Cullen CG (1990) Matrices and linear transformations, 2nd edn. Dover Books on Mathematics
Emam M, Han Q, Zhang H (2017) Two-stage keypoint detection scheme for region duplication forgery detection in digital images. J Forensic Sci.https://doi.org/10.1111/1556-4029.13456
Farid H (2006) Exposing digital forgeries in scientific images Multimedia secur. (MM&sec), pp 29–36
Fridrich AJ, Soukal BD, Lukas AJ (2003) Detection of copy-move forgery in digital images. Digital Forensic Research Workshop
Hartley RI, Zisserman A (2004) Multiple view geometry in computer vision. Cambridge University Press
Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia workshop on computational intelligence and industrial application, vol 2, pp 272–276
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184
Imran M, Harvey BA (2017) Block based blind & secure gray image watermarking technique based on discrete wavelet transform and singular value decomposition. KSII Trans Internet Inf Syst 11(2):883–900
Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: International conference on computer science and software engineering, vol 3, pp 926–930
Khan ES, Kulkarni EA (2010) An efficient method for detection of copy-move forgery using discrete wavelet transform. Int J Comput Sci Eng 2(5):1801–1806
Kirchner M, Schöttle P, Riess C (2015) Thinking beyond the block: block matching for copy-move forgery detection revisited. Media Watermarking, Security, and Forensics
Kwon GR, Lama RK, Pyun JY, Park CS (2015) Multimedia digital rights management based on selective encryption for flexible business model. Multimedia Tools and Applications.https://doi.org/10.1007/s11042-015-2563-z
Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: Canadian conference on computer and robot vision, pp 64–71
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518
Li W, Yu N (2010) Rotation robust detection of copy-move forgery. In: IEEE international conference on image processing, pp 2113–2116
Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Signal Process 5(5):188–197
Liu B, Pun C-M, Yuan X-C (2014) Digital image forgery detection using JPEG features and local noise discrepancies. Sci World J 2014:1–12
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110
Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189
Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1115–1125
Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57
Murali S, Chittapur GB, Prabhakara HS, Anami BS (2012) Comparison and analysis of photo image forgery detection techniques. Int J Comput Sci Appl 2(6):45–56
Mushtaq S, Mir AH (2014) Digital image forgeries and passive image authentication techniques: a survey. International Journal of Advanced Science and Technology 73:15–32
Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867
Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867
Park C-S, Kim C, Lee J, Kwon G-R (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimedia Tools and Applications.https://doi.org/10.1007/s11042-016-3575-z
Peng F, Nie Y-Y, Long M (2011) A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Sci Int 212(1):e21–e25
Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515
Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133–162
Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using Zernike moments. Lect Notes Comput Sci 6387:51–65
Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci 8(4):199–205
Wang J, Liu G, Zhang Z, Dai Y, Wang Z (2009) Fast and robust forensics for image region-duplication forgery. Acta Automatica Sinica 35(12):1488–1495
Wang M, et al. (2014) Countering anti-forensics to wavelet-based compression. In: IEEE international conference on image processing (ICIP), pp 5382–5386
Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z-L (2016) A new keypoint-based copy-move forgery detection for small smooth regions. Multimedia Tools and Applications.https://doi.org/10.1007/s11042-016-4140-5
Wu Y, Zhang T, Hou X, Xu C (2016) New blind steganalysis framework combining image retrieval and outlier detection. KSII Trans Internet Inf Syst 10(12):6206–6219
Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: International conference on image processing (ICIP), vol 2, pp 690–683
Acknowledgements
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2016R1C1B1009682). This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2017-2016-0-00312) supervised by the IITP(Institute for Information & communications Technology Promotion).
Author information
Authors and Affiliations
Department of Computer Education, Sungkyunkwan University, Seoul, South Korea
Chun-Su Park
Department of Software, Sejong University, Seoul, South Korea
Joon Yeon Choeh
- Chun-Su Park
You can also search for this author inPubMed Google Scholar
- Joon Yeon Choeh
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toJoon Yeon Choeh.
Rights and permissions
About this article
Cite this article
Park, CS., Choeh, J. Fast and robust copy-move forgery detection based on scale-space representation.Multimed Tools Appl77, 16795–16811 (2018). https://doi.org/10.1007/s11042-017-5248-y
Received:
Revised:
Accepted:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative