Image region duplication detection based on circular window expansion and phase correlation.

Region duplication forgery is one of the tampering techniques that are frequently used, where a part of an image is copied and pasted into another part of the same image. In this paper, a phase correlation method based on polar expansion and adaptive band limitation is proposed for region duplication forgery detection. Our method starts by calculating the Fourier transform of the polar expansion on overlapping windows pair, and then an adaptive band limitation procedure is implemented to obtain a correlation matrix in which the peak is effectively enhanced. After estimating the rotation angle of the forgery region, a searching algorithm in the sense of seed filling is executed to display the whole duplicated region. Experimental results show that the proposed approach can detect duplicated region with high accuracy and robustness to rotation, illumination adjustment, blur and JPEG compression while rotation angle is estimated precisely for further calculation.

[1]  B. L. Shivakumar,et al.  Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Current Methods , 2010 .

[2]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[3]  Nirupam Sarkar,et al.  An Efficient Differential Box-Counting Approach to Compute Fractal Dimension of Image , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[4]  H. Farid A Survey of Image Forgery Detection , 2008 .

[5]  H. Farid Seeing is not believing , 2009, IEEE Spectrum.

[6]  Ismail Avcibas,et al.  SVD based image manipulation detection , 2010, 2010 IEEE International Conference on Image Processing.

[7]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[8]  Hiroshi Nakajima,et al.  PAPER Special Section on Applications and Implementations of Digital Signal Processing A Fingerprint Matching Algorithm Using Phase-Only Correlation , 2004 .

[9]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[10]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[11]  David Letscher,et al.  Detecting filtered cloning in digital images , 2007, MM&Sec.

[12]  Jing Zhang,et al.  A new approach for detecting Copy-Move forgery in digital images , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[13]  Edoardo Ardizzone,et al.  Copy-move forgery detection via texture description , 2010, MiFor '10.

[14]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[15]  H. Farid Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act , 2004 .

[16]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[17]  Jiwu Huang,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[18]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[19]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[20]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[21]  Asoke K. Nandi,et al.  Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics , 2011, Signal Process..

[22]  Hany Farid,et al.  Exposing digital forgeries in scientific images , 2006, MM&Sec '06.

[23]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[24]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[25]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.