Copy-move forgery detection in the presence of similar but genuine objects

Images often contain Similar but Genuine Objects (SGO), such as two beverage bottles, similar windows, etc. This poses a natural but unexplored challenge to existing copy-move forgery detection methods with an assumption that similar regions are always manipulated for forgery purpose. In this work, we investigate the limitations of the existing CMFD methods under the SGO setting, and propose a new one with performance improvement. Our method consists of the following key steps: first, pyramid scale space and orientation assignment are used for feature extraction to ensure scaling and rotation invariance; second, combined features are applied for effective texture description; third, similar features between two points are matched through RANSAC to reduce false matches; last, tampered regions are located and correlation coefficient are computed on those regions. The experimental results indicate that the proposed algorithm is effective in detecting SGO and copy-move forgery, and compares favorably to existing methods. Furthermore, our method exhibits robustness under geometric transformation and certain forms of post-processing.

[1]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[2]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[3]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[5]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[6]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[7]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[8]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[9]  Nenghai Yu,et al.  Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.

[10]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[11]  Jing-Ming Guo,et al.  Duplication forgery detection using improved DAISY descriptor , 2013, Expert Syst. Appl..

[12]  Xunyu Pan,et al.  Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Jie Hu,et al.  An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection , 2011, 2011 Second International Conference on Networking and Distributed Computing.

[14]  Zhen Li,et al.  A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[15]  Andrew P. Witkin,et al.  Scale-space filtering: A new approach to multi-scale description , 1984, ICASSP.

[16]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[17]  S. Mozaffari,et al.  Copy-move forgery detection using multiresolution local binary patterns. , 2013, Forensic science international.

[18]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[19]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[20]  L. S. S. Baboo,et al.  Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[21]  Stefan Winkler,et al.  COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[22]  Ye Zhu,et al.  Copy-move forgery detection based on scaled ORB , 2015, Multimedia Tools and Applications.