An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage

Abstract In looking to improve the detection performance of the keypoint-based method involving smooth tampered regions, there are three problems to be addressed, namely the nonuniform distribution of the keypoints, the discriminative power of low contrast keypoints, and the high computational cost of clustering. In this study, the classical implementation framework of the keypoint-based method is improved by introducing new techniques and algorithms in order to overcome these problems. First, to acquire uniformly distributed keypoints in the test image, we propose a new solution of selecting the keypoints by region instead of contrast. To this end, we first separate the keypoint detection and selection processes. After obtaining all discernible keypoints, we adapt the non-maximum value suppression algorithm to select keypoints by combining the contrast and density of each keypoint. Second, we apply the opponent scale-invariant feature transform descriptor to enhance the discriminative power of keypoints by adding color information. Finally, to alleviate the computational cost of clustering, we optimize the J-Linkage algorithm by altering the method of computing initial clusters and affine transformation hypotheses. For this purpose, we propose the matched pair grouping algorithm that can obtain a smaller number of initial clusters by utilizing the correspondence between the superpixels in the original and duplicated regions. Experiments performed on three representative datasets confirm that the proposed method can significantly improve the detection performance in smooth tampered regions, and considerably reduce the clustering time in the case of a mass of matched pairs, compared with the state-of-the-art methods.

[1]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[2]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[3]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[4]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[5]  Hongyuan Li,et al.  Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[6]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[7]  Andrea Fusiello,et al.  Robust Multiple Structures Estimation with J-Linkage , 2008, ECCV.

[8]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[9]  Jing-Ming Guo,et al.  Duplication forgery detection using improved DAISY descriptor , 2013, Expert Syst. Appl..

[10]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[11]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[12]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[13]  Mohamed Deriche,et al.  A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..

[14]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[15]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[16]  Jichang Guo,et al.  Image copy-move forgery detection using SURF in opponent color space , 2016 .

[17]  Pascal Fua,et al.  SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[19]  Ieee Xplore,et al.  IEEE Transactions on Pattern Analysis and Machine Intelligence Information for Authors , 2022, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[20]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[22]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Qi Han,et al.  Feature point-based copy-move forgery detection: covering the non-textured areas , 2014, Multimedia Tools and Applications.

[24]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Stefan Winkler,et al.  COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[26]  B L Shivakumar,et al.  Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors , 2011 .

[27]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[28]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[29]  Koen E. A. van de Sande,et al.  Evaluating Color Descriptors for Object and Scene Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[30]  Davide Cozzolino,et al.  Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[31]  L. S. S. Baboo,et al.  Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[32]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.