Multi-scale feature extraction and adaptive matching for copy-move forgery detection

A copy-move forgery detection scheme by using multi-scale feature extraction and adaptive matching is proposed in this paper. First, the host image is segmented into the non-overlapping patches of irregular shape in different scales. Then, Scale Invariant Feature Transform is applied to extract feature points from all patches, to generate the multi-scale features. An Adaptive Patch Matching algorithm is subsequently proposed for finding the matching that indicate the suspicious forged regions in each scale. Finally, the suspicious regions in all scales are merged to generate the detected forgery regions in the proposed Matched Keypoints Merging algorithm. Experimental results show that the proposed scheme performs much better than the existing state-of-the-art copy-move forgery detection algorithms, even under various challenging conditions, including the geometric transforms, such as scaling and rotation, and the common signal processing, such as JPEG compression and noise addition; in addition, the special cases such as the multiple copies and the down-sampling are also evaluated, the results indicate the very good performance of the proposed scheme.

[1]  Qi Han,et al.  PCET based copy-move forgery detection in images under geometric transforms , 2015, Multimedia Tools and Applications.

[2]  Asoke K. Nandi,et al.  Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[4]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Ye Zhu,et al.  Copy-move forgery detection based on scaled ORB , 2015, Multimedia Tools and Applications.

[6]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[7]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[8]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[9]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[10]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[11]  Wang Zhi-quan,et al.  Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .

[12]  Pascal Fua,et al.  SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[14]  Qi Han,et al.  Feature point-based copy-move forgery detection: covering the non-textured areas , 2014, Multimedia Tools and Applications.

[15]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[17]  Pravin Kakar,et al.  Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.

[18]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[19]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[20]  P. Rakesh Kumar,et al.  Image Forgery Detection Using Adaptive Over Segmentation and Feature Point Matching , 2016 .

[21]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[22]  Zhiquan Wang,et al.  Fast and Robust Forensics for Image Region-duplication Forgery: Fast and Robust Forensics for Image Region-duplication Forgery , 2010 .

[23]  Hongyuan Li,et al.  Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[24]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[25]  Jiwu Huang,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[26]  Mauro Barni,et al.  Forensic Analysis of SIFT Keypoint Removal and Injection , 2014, IEEE Transactions on Information Forensics and Security.

[27]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[28]  Christopher Hunt,et al.  Notes on the OpenSURF Library , 2009 .

[29]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[30]  L. S. S. Baboo,et al.  Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[31]  Chi-Man Pun,et al.  Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy-Move Forgery Detection , 2016, Inf. Sci..

[32]  R. S. Shaji,et al.  A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor , 2016 .

[33]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.