Fast and robust copy-move forgery detection based on scale-space representation

Copy-move forgery (CMF), which copies a part of an image and pastes it into another region, is one of the most common methods for digital image tampering. For CMF detection (CMFD), we propose a fast and robust approach that can handle several geometric transformations including rotation, scaling, sheering, and reflection. In the proposed CMFD design, keypoints and their descriptors are extracted from the image based on the Scale Invariant Feature Transform (SIFT). Then, an improved matching operation that can handle multiple copy-move forgeries is performed to detect matched pairs located in duplicated regions. Next, the geometric transformation between duplicated regions is estimated using a subset of reliable matched pairs which are obtained using the SIFT scale space representation. In our simulation, we present comparative results between the proposed algorithm and state-of-the-art ones with proven performance guarantees.

[1]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[2]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[3]  S. Murali,et al.  Comparision and analysis of photo image forgery detection techniques , 2013, ArXiv.

[4]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[5]  Guoyin Wang,et al.  Erratum to “Experimental Analyses of the Major Parameters Affecting the Intensity of Outbursts of Coal and Gas” , 2014, The Scientific World Journal.

[6]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[7]  Luc Van Gool,et al.  SURF: Speeded Up Robust Features , 2006, ECCV.

[8]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[9]  Ajaz Hussain Mir,et al.  Digital Image Forgeries and Passive Image Authentication Techniques: A Survey , 2014 .

[10]  Nenghai Yu,et al.  Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.

[11]  Cordelia Schmid,et al.  A Performance Evaluation of Local Descriptors , 2005, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  Goo-Rak Kwon,et al.  Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection , 2016, Multimedia Tools and Applications.

[13]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[14]  Fei Peng,et al.  A complete passive blind image copy-move forensics scheme based on compound statistics features. , 2011, Forensic science international.

[15]  Minglun Gong,et al.  An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).

[16]  Jiwu Huang,et al.  Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach , 2013, IEEE Transactions on Image Processing.

[17]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[18]  Zhang Xiong,et al.  Countering anti-forensics to wavelet-based compression , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[19]  Tao Zhang,et al.  New Blind Steganalysis Framework Combining Image Retrieval and Outlier Detection , 2016, KSII Trans. Internet Inf. Syst..

[20]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[21]  C. Cullen,et al.  Matrices and linear transformations , 1966 .

[22]  Zhiquan Wang,et al.  Fast and Robust Forensics for Image Region-duplication Forgery: Fast and Robust Forensics for Image Region-duplication Forgery , 2010 .

[23]  Hong-Ying Yang,et al.  A new keypoint-based copy-move forgery detection for small smooth regions , 2017, Multimedia Tools and Applications.

[24]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[25]  Goo-Rak Kwon,et al.  Multimedia digital rights management based on selective encryption for flexible business model , 2015, Multimedia Tools and Applications.

[26]  Muhammad Imran,et al.  Block Based Blind & Secure Gray Image Watermarking Technique Based on Discrete Wavelet Transform and Singular Value Decomposition , 2017, KSII Trans. Internet Inf. Syst..

[27]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[28]  David G. Lowe,et al.  Shape indexing using approximate nearest-neighbour search in high-dimensional spaces , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[29]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[30]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[31]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[32]  Christian Riess,et al.  Thinking beyond the block: block matching for copy-move forgery detection revisited , 2015, Electronic Imaging.

[33]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[34]  Wang Zhi-quan,et al.  Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .

[35]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[36]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[37]  Chi-Man Pun,et al.  Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies , 2014, TheScientificWorldJournal.

[38]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[39]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[40]  Hongli Zhang,et al.  Two‐stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images , 2018, Journal of forensic sciences.

[41]  Hany Farid,et al.  Exposing digital forgeries in scientific images , 2006, MM&Sec '06.

[42]  Saiqa Khan,et al.  An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform , 2010 .

[43]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[44]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[45]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[46]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[47]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..