Segmentation-Based Image Copy-Move Forgery Detection Scheme

In this paper, we propose a scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the traditional methods is that the proposed scheme first segments the test image into semantically independent patches prior to keypoint extraction. As a result, the copy-move regions can be detected by matching between these patches. The matching process consists of two stages. In the first stage, we find the suspicious pairs of patches that may contain copy-move forgery regions, and we roughly estimate an affine transform matrix. In the second stage, an Expectation-Maximization-based algorithm is designed to refine the estimated matrix and to confirm the existence of copy-move forgery. Experimental results prove the good performance of the proposed scheme via comparing it with the state-of-the-art schemes on the public databases.

[1]  Saiqa Khan,et al.  Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform , 2011, ICWET.

[2]  Jeff A. Bilmes,et al.  A gentle tutorial of the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models , 1998 .

[3]  Andrew Zisserman,et al.  Multiple View Geometry in Computer Vision (2nd ed) , 2003 .

[4]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[5]  Paul J. Besl,et al.  A Method for Registration of 3-D Shapes , 1992, IEEE Trans. Pattern Anal. Mach. Intell..

[6]  Charless C. Fowlkes,et al.  Contour Detection and Hierarchical Image Segmentation , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  Pascal Fua,et al.  SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Vladimir Itsykson,et al.  Clone detection: Why, what and how? , 2010, 2010 6th Central and Eastern European Software Engineering Conference (CEE-SECR).

[9]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[10]  Hany Farid,et al.  Exposing digital forgeries in scientific images , 2006, MM&Sec '06.

[11]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[13]  Edoardo Ardizzone,et al.  Copy-move forgery detection via texture description , 2010, MiFor '10.

[14]  Alexander M. Bronstein,et al.  Partial Similarity of Shapes Using a Statistical Significance Measure , 2009, IPSJ Trans. Comput. Vis. Appl..

[15]  Asoke K. Nandi,et al.  Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[17]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[18]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[19]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[20]  Qi Liu,et al.  Implementation of automatic gas monitoring in a domestic energy management system , 2012, IEEE Transactions on Consumer Electronics.

[21]  Ahmad Faraahi,et al.  DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[22]  Pravin Kakar,et al.  Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Chi-Man Pun,et al.  Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies , 2014, TheScientificWorldJournal.

[24]  Christopher Hunt,et al.  Notes on the OpenSURF Library , 2009 .

[25]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[26]  Alexander M. Bronstein,et al.  Regularized Partial Matching of Rigid Shapes , 2008, ECCV.

[27]  Qi Liu,et al.  DEHEMS: creating a digital environment for large-scale energy management at homes , 2013, IEEE Transactions on Consumer Electronics.

[28]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[29]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[30]  Jiwu Huang,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[31]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[32]  Alexander M. Bronstein,et al.  Not only size matters: Regularized partial matching of nonrigid shapes , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[33]  Cordelia Schmid,et al.  A Comparison of Affine Region Detectors , 2005, International Journal of Computer Vision.

[34]  Stefano Soatto,et al.  Quick Shift and Kernel Methods for Mode Seeking , 2008, ECCV.

[35]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[36]  Andrea Vedaldi,et al.  Vlfeat: an open and portable library of computer vision algorithms , 2010, ACM Multimedia.

[37]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[38]  Jitendra Malik,et al.  Learning to detect natural image boundaries using local brightness, color, and texture cues , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.