Region Duplication Detection Using Image Feature Matching

Region duplication is a simple and effective operation to create digital image forgeries, where a continuous portion of pixels in an image, after possible geometrical and illumination adjustments, are copied and pasted to a different location in the same image. Most existing region duplication detection methods are based on directly matching blocks of image pixels or transform coefficients, and are not effective when the duplicated regions have geometrical or illumination distortions. In this work, we describe a new region duplication detection method that is robust to distortions of the duplicated regions. Our method starts by estimating the transform between matched scale invariant feature transform (SIFT) keypoints, which are insensitive to geometrical and illumination distortions, and then finds all pixels within the duplicated regions after discounting the estimated transforms. The proposed method shows effective detection on an automatically synthesized forgery image database with duplicated and distorted regions. We further demonstrate its practical performance with several challenging forgery images created with state-of-the-art tools.

[1]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[2]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[3]  C.G. Patil,et al.  Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[4]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[5]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[6]  Hany Farid,et al.  Photo Fakery and Forensics , 2009, Adv. Comput..

[7]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.

[8]  H.M. Wechsler,et al.  Digital image processing, 2nd ed. , 1981, Proceedings of the IEEE.

[9]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[10]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[11]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[12]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[13]  Keiichi Abe,et al.  Topological structural analysis of digitized binary images by border following , 1985, Comput. Vis. Graph. Image Process..

[14]  A. Balakrishnan Learning Student Models through an Ontology of Learning Strategies , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[15]  Aseem Agarwala,et al.  Efficient gradient-domain compositing using quadtrees , 2007, ACM Trans. Graph..

[16]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[18]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[19]  Paul Wintz,et al.  Digital image processing (2nd ed.) , 1987 .

[20]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[21]  Tony Lindeberg,et al.  Scale-Space Theory in Computer Vision , 1993, Lecture Notes in Computer Science.

[22]  Zeev Farbman,et al.  Coordinates for instant image cloning , 2009, ACM Trans. Graph..

[23]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[24]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[25]  Yan Ke,et al.  PCA-SIFT: a more distinctive representation for local image descriptors , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..

[26]  Andrew Zisserman,et al.  Multiple View Geometry in Computer Vision (2nd ed) , 2003 .

[27]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[28]  Asoke K. Nandi,et al.  Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling , 2009, 2009 17th European Signal Processing Conference.

[29]  David Letscher,et al.  Detecting filtered cloning in digital images , 2007, MM&Sec.

[30]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[31]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[32]  Edoardo Ardizzone,et al.  Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis , 2009, ICIAP.

[33]  Xunyu Pan,et al.  Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[34]  Bernhard P. Wrobel,et al.  Multiple View Geometry in Computer Vision , 2001 .

[35]  Jitendra Malik,et al.  A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[36]  Li Kang,et al.  Copy-move forgery detection in digital image , 2010, 2010 3rd International Congress on Image and Signal Processing.

[37]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[38]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[39]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[40]  David G. Lowe,et al.  Shape indexing using approximate nearest-neighbour search in high-dimensional spaces , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[41]  Todor Georgiev Photoshop Healing Brush : a Tool for Seamless Cloning , 2004 .

[42]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[43]  Patrick Pérez,et al.  Poisson image editing , 2003, ACM Trans. Graph..

[44]  Min Wu,et al.  Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images , 2009, IEEE Transactions on Information Forensics and Security.

[45]  Jian Sun,et al.  Drag-and-drop pasting , 2006, SIGGRAPH 2006.

[46]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[47]  Jiwu Huang,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[48]  Minglun Gong,et al.  An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).

[49]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[50]  Alberto Del Bimbo,et al.  Geometric tampering estimation by means of a SIFT-based forensic analysis , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[51]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.