Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Fast and robust copy-move forgery detection based on scale-space representation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Copy-move forgery (CMF), which copies a part of an image and pastes it into another region, is one of the most common methods for digital image tampering. For CMF detection (CMFD), we propose a fast and robust approach that can handle several geometric transformations including rotation, scaling, sheering, and reflection. In the proposed CMFD design, keypoints and their descriptors are extracted from the image based on the Scale Invariant Feature Transform (SIFT). Then, an improved matching operation that can handle multiple copy-move forgeries is performed to detect matched pairs located in duplicated regions. Next, the geometric transformation between duplicated regions is estimated using a subset of reliable matched pairs which are obtained using the SIFT scale space representation. In our simulation, we present comparative results between the proposed algorithm and state-of-the-art ones with proven performance guarantees.

This is a preview of subscription content,log in via an institution to check access.

Access this article

Log in via an institution

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659–669

    Article  Google Scholar 

  2. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110

    Article  Google Scholar 

  3. Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. Comput Vis Image Understand 110(3):346–359

    Article  Google Scholar 

  4. Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: IEEE international conference on acoustics, speech and signal processing, pp 1053–1056

  5. Beis JS, Lowe DG (1997) Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: IEEE conference on computer vision and pattern recognition, pp 1000–1006

  6. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245

    Article  Google Scholar 

  7. Chen C, Ni J, Huang J (2013) Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans Image Process 22(2):4699–4710

    Article MathSciNet MATH  Google Scholar 

  8. Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: IEEE international workshop on information forensics and security, pp 1–6

  9. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854

    Article  Google Scholar 

  10. Cullen CG (1990) Matrices and linear transformations, 2nd edn. Dover Books on Mathematics

  11. Emam M, Han Q, Zhang H (2017) Two-stage keypoint detection scheme for region duplication forgery detection in digital images. J Forensic Sci.https://doi.org/10.1111/1556-4029.13456

  12. Farid H (2006) Exposing digital forgeries in scientific images Multimedia secur. (MM&sec), pp 29–36

  13. Fridrich AJ, Soukal BD, Lukas AJ (2003) Detection of copy-move forgery in digital images. Digital Forensic Research Workshop

  14. Hartley RI, Zisserman A (2004) Multiple view geometry in computer vision. Cambridge University Press

  15. Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia workshop on computational intelligence and industrial application, vol 2, pp 272–276

  16. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184

    Article  Google Scholar 

  17. Imran M, Harvey BA (2017) Block based blind & secure gray image watermarking technique based on discrete wavelet transform and singular value decomposition. KSII Trans Internet Inf Syst 11(2):883–900

    Google Scholar 

  18. Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: International conference on computer science and software engineering, vol 3, pp 926–930

  19. Khan ES, Kulkarni EA (2010) An efficient method for detection of copy-move forgery using discrete wavelet transform. Int J Comput Sci Eng 2(5):1801–1806

    Google Scholar 

  20. Kirchner M, Schöttle P, Riess C (2015) Thinking beyond the block: block matching for copy-move forgery detection revisited. Media Watermarking, Security, and Forensics

  21. Kwon GR, Lama RK, Pyun JY, Park CS (2015) Multimedia digital rights management based on selective encryption for flexible business model. Multimedia Tools and Applications.https://doi.org/10.1007/s11042-015-2563-z

  22. Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: Canadian conference on computer and robot vision, pp 64–71

  23. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518

    Article  Google Scholar 

  24. Li W, Yu N (2010) Rotation robust detection of copy-move forgery. In: IEEE international conference on image processing, pp 2113–2116

  25. Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Signal Process 5(5):188–197

    Google Scholar 

  26. Liu B, Pun C-M, Yuan X-C (2014) Digital image forgery detection using JPEG features and local noise discrepancies. Sci World J 2014:1–12

    Google Scholar 

  27. Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110

    Article  Google Scholar 

  28. Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189

    Article  Google Scholar 

  29. Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1115–1125

    Article  Google Scholar 

  30. Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57

    Article  Google Scholar 

  31. Murali S, Chittapur GB, Prabhakara HS, Anami BS (2012) Comparison and analysis of photo image forgery detection techniques. Int J Comput Sci Appl 2(6):45–56

    Google Scholar 

  32. Mushtaq S, Mir AH (2014) Digital image forgeries and passive image authentication techniques: a survey. International Journal of Advanced Science and Technology 73:15–32

    Article  Google Scholar 

  33. Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867

    Article  Google Scholar 

  34. Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867

    Article  Google Scholar 

  35. Park C-S, Kim C, Lee J, Kwon G-R (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimedia Tools and Applications.https://doi.org/10.1007/s11042-016-3575-z

  36. Peng F, Nie Y-Y, Long M (2011) A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Sci Int 212(1):e21–e25

    Article  Google Scholar 

  37. Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515

  38. Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133–162

    Article  Google Scholar 

  39. Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using Zernike moments. Lect Notes Comput Sci 6387:51–65

    Article  Google Scholar 

  40. Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci 8(4):199–205

    Google Scholar 

  41. Wang J, Liu G, Zhang Z, Dai Y, Wang Z (2009) Fast and robust forensics for image region-duplication forgery. Acta Automatica Sinica 35(12):1488–1495

    Article  Google Scholar 

  42. Wang M, et al. (2014) Countering anti-forensics to wavelet-based compression. In: IEEE international conference on image processing (ICIP), pp 5382–5386

  43. Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z-L (2016) A new keypoint-based copy-move forgery detection for small smooth regions. Multimedia Tools and Applications.https://doi.org/10.1007/s11042-016-4140-5

  44. Wu Y, Zhang T, Hou X, Xu C (2016) New blind steganalysis framework combining image retrieval and outlier detection. KSII Trans Internet Inf Syst 10(12):6206–6219

    Google Scholar 

  45. Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: International conference on image processing (ICIP), vol 2, pp 690–683

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2016R1C1B1009682). This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2017-2016-0-00312) supervised by the IITP(Institute for Information & communications Technology Promotion).

Author information

Authors and Affiliations

  1. Department of Computer Education, Sungkyunkwan University, Seoul, South Korea

    Chun-Su Park

  2. Department of Software, Sejong University, Seoul, South Korea

    Joon Yeon Choeh

Authors
  1. Chun-Su Park

    You can also search for this author inPubMed Google Scholar

  2. Joon Yeon Choeh

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toJoon Yeon Choeh.

Rights and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, CS., Choeh, J. Fast and robust copy-move forgery detection based on scale-space representation.Multimed Tools Appl77, 16795–16811 (2018). https://doi.org/10.1007/s11042-017-5248-y

Download citation

Keywords

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Advertisement


[8]ページ先頭

©2009-2025 Movatter.jp