Image copy–move forgery detection based on sped-up robust features descriptor and adaptive minimal–maximal suppression

Abstract. Region duplication is a simple and effective operation to create digital image forgeries, where a continuous portion of pixels in an image is copied and pasted to a different location in the same image. Many prior copy–move forgery detection methods suffer from their inability to detect the duplicated region, which is subjected to various geometric transformations. A keypoint-based approach is proposed to detect the copy–move forgery in an image. Our method starts by extracting the keypoints through a fast Hessian detector. Then the adaptive minimal–maximal suppression (AMMS) strategy is developed for distributing the keypoints evenly throughout an image. By using AMMS and a sped-up robust feature descriptor, the proposed method is able to deal with the problem of insufficient keypoints in the almost uniform area. Finally, the geometric transformation performed in cloning is recovered by using the maximum likelihood estimation of the homography. Experimental results show the efficacy of this technique in detecting copy–move forgeries and estimating the geometric transformation parameters. Compared with the state of the art, our approach obtains a higher true positive rate and a lower false positive rate.

[1]  Ingemar J. Cox,et al.  Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.

[2]  Fei Peng,et al.  A complete passive blind image copy-move forensics scheme based on compound statistics features. , 2011, Forensic science international.

[3]  H. Farid Seeing is not believing , 2009, IEEE Spectrum.

[4]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[5]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[6]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[7]  Zoltan Kato,et al.  Parametric estimation of affine deformations of planar shapes , 2010, Pattern Recognit..

[8]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Jing-Ming Guo,et al.  Duplication forgery detection using improved DAISY descriptor , 2013, Expert Syst. Appl..

[10]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[11]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[12]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[13]  Dinu Coltuc,et al.  Low distortion transform for reversible watermarking , 2012, IEEE Transactions on Image Processing.

[14]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[15]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[16]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Trevor Hastie,et al.  The Elements of Statistical Learning , 2001 .

[18]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[19]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[20]  Bogdan-Mihai G. Gavriloaia,et al.  Exposing copy-move image tampering using forensic method based on SURF , 2013, Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013.

[21]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[22]  Luo Juan,et al.  A comparison of SIFT, PCA-SIFT and SURF , 2009 .

[23]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[24]  Partha S. Vasisht Computational Analysis of Microarray Data , 2003 .

[25]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[26]  Xingming Sun,et al.  An Efficient Forensic Method for Copy – move Forgery Detection Based on DWT-FWHT , 2013 .