A passive authentication scheme for copy-move forgery based on package clustering algorithm

Copy-move forgery as one of popular methods is widely used to tamper digital images. Passive authentication is extensively used to detect the copy-move forgery images. This paper proposes a passive authentication scheme for copy-move forgery based on the discrete cosine transform (DCT) and the package clustering algorithm. The copy regions and paste regions can be automatically detected in doctored digital images. This scheme works by first applying the DCT to small fixed image blocks to obtain their features and the size of feature vectors are reduced. Moreover, the package clustering algorithm is applied to replace the general lexicographic order technologies to improve the detection precision. The similar blocks can be found by comparing the feature vectors in each package. The experimental results represent that the proposed scheme can locate irregular and meaningful tampered regions and multiply duplicated regions in a suspicious image. The duplicated regions can also be located in digital images that are distorted by adding white Gaussian noise, Gaussian blurring and their mixed operations.

[1]  Vasif V. Nabiyev,et al.  LBP-DCT Based Copy Move Forgery Detection Algorithm , 2015, ISCIS.

[2]  Yuenan Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.

[3]  Yue Chen,et al.  A novel chaos-based fragile watermarking for image tampering detection and self-recovery , 2013, Signal Process. Image Commun..

[4]  Li Kang,et al.  Copy-move forgery detection in digital image , 2010, 2010 3rd International Congress on Image and Signal Processing.

[5]  Girija Chetty,et al.  A novel image watermarking scheme using Extreme Learning Machine , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).

[6]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[7]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[8]  Sun Xingming,et al.  DWT-PCA (EVD) Based Copy-move Image Forgery Detection , 2011 .

[9]  Qi Han,et al.  PCET based copy-move forgery detection in images under geometric transforms , 2015, Multimedia Tools and Applications.

[10]  Kumar Sunil,et al.  DCT-PCA Based Method for Copy-Move Forgery Detection , 2014 .

[11]  Babu M. Mehtre,et al.  Detection of Copy-Move Forgery in Images Using Segmentation and SURF , 2015, SIRS.

[12]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[13]  Chi-Man Pun,et al.  Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy-Move Forgery Detection , 2016, Inf. Sci..

[14]  Dongming Wang,et al.  Blur Detection of Digital Forgery Using Mathematical Morphology , 2007, KES-AMSTA.

[15]  M. Jayamohan,et al.  Scale Invariant Detection of Copy-Move Forgery Using Fractal Dimension and Singular Values , 2015, SIRS.

[16]  Mohsen Mohammadi,et al.  A New Approach for Copy‐Move Detection Based on Improved Weber Local Descriptor , 2015, Journal of forensic sciences.

[17]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[18]  Shih-Fu Chang Blind Passive Media Forensics: Motivation and Opportunity , 2007, MCAM.

[19]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[21]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[22]  Shih-Fu Chang,et al.  Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .