Copy-move forgery detection using combined features and transitive matching

Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary. Copy-move is an important branch of multimedia forensics. In this paper, a novel copy-move forgery detection scheme using combined features and transitive matching is proposed. First, SIFT and LIOP are extracted as combined features from the input image. Second, transitive matching is used to improve the matching relationship. Third, a filtering approach using image segmentation is proposed to filter out false matches. Fourth, affine transformations are estimated between these image patches. Finally, duplicated regions are located based on those affine transformations. The experimental results demonstrate that the proposed scheme can achieve much better detection results on the public database under various attacks.

[1]  Wei Lu,et al.  Binary image steganalysis based on pixel mesh Markov transition matrix , 2015, J. Vis. Commun. Image Represent..

[2]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[3]  Wei Lu,et al.  Binary Image Steganalysis Based on Distortion Level Co-occurrence Matrix , 2018 .

[4]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[5]  Naixue Xiong,et al.  Dynamic propagation characteristics estimation and tracking based on an EM-EKF algorithm in time-variant MIMO channel , 2017, Inf. Sci..

[6]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[7]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Jian-Huang Lai,et al.  Region duplication detection based on image segmentation and keypoint contexts , 2017, Multimedia Tools and Applications.

[9]  Naixue Xiong,et al.  Visual topic discovering, tracking and summarization from social media streams , 2017, Multimedia Tools and Applications.

[10]  Jian Weng,et al.  Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[11]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[13]  Naixue Xiong,et al.  Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.

[14]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[15]  Naixue Xiong,et al.  On the throughput-energy tradeoff for data transmission between cloud and mobile devices , 2014, Inf. Sci..

[16]  Asoke K. Nandi,et al.  Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Lan Chen,et al.  Semantic Link Network-Based Model for Organizing Multimedia Big Data , 2014, IEEE Transactions on Emerging Topics in Computing.

[18]  Naixue Xiong,et al.  ViMediaNet: an emulation system for interactive multimedia based telepresence services , 2017, The Journal of Supercomputing.

[19]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[20]  Wei Lu,et al.  Novel steganographic method based on generalized K-distance N-dimensional pixel matching , 2014, Multimedia Tools and Applications.

[21]  Pan Lin,et al.  Dual-Tree Complex Wavelet Transform and Image Block Residual-Based Multi-Focus Image Fusion in Visual Sensor Networks , 2014, Sensors.

[22]  Naixue Xiong,et al.  Non-Local Regularized Variational Model for Image Deblurring under Mixed Gaussian-Impulse Noise , 2015 .

[23]  Naixue Xiong,et al.  Post-cloud computing paradigms: a survey and comparison , 2017 .

[24]  Ahmad Faraahi,et al.  DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[25]  Bill Nelson,et al.  Guide to Computer Forensics and Investigations , 2003 .

[26]  Xingming Sun,et al.  An Efficient Forensic Method for Copy – move Forgery Detection Based on DWT-FWHT , 2013 .

[27]  Christopher Hunt,et al.  Notes on the OpenSURF Library , 2009 .

[28]  Jung-San Lee,et al.  Selective scalable secret image sharing with verification , 2015, Multimedia Tools and Applications.

[29]  Feiniu Yuan,et al.  Optimized Multioperator Image Retargeting Based on Perceptual Similarity Measure , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[30]  Naixue Xiong,et al.  EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..

[31]  Adrien Bartoli,et al.  KAZE Features , 2012, ECCV.

[32]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[33]  Naixue Xiong,et al.  A Novel Objective Quality Assessment for Super-Resolution Images , 2016 .

[34]  Wei Lu,et al.  Joint image splicing detection in DCT and Contourlet transform domain , 2016, J. Vis. Commun. Image Represent..

[35]  Xiaoxia Wan,et al.  An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage , 2017, Signal Process. Image Commun..

[36]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[37]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[38]  Fan Yang,et al.  Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..

[39]  Pascal Fua,et al.  SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[40]  Wei Lu,et al.  Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.

[41]  Jian Weng,et al.  Multi-Gait Recognition Based on Attribute Discovery , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[42]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[43]  Hai Jin,et al.  Differentially Private Online Learning for Cloud-Based Video Recommendation With Multimedia Big Data in Social Networks , 2015, IEEE Transactions on Multimedia.

[44]  Guoqiang Li,et al.  Double JPEG compression detection based on block statistics , 2018, Multimedia Tools and Applications.

[45]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[46]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[47]  Andrea Vedaldi,et al.  Vlfeat: an open and portable library of computer vision algorithms , 2010, ACM Multimedia.

[48]  Naixue Xiong,et al.  A Game-Based Localized Multi-Objective Topology Control Scheme in Heterogeneous Wireless Networks , 2017, IEEE Access.

[49]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[50]  Wei Zhang,et al.  A Unified Framework for Street-View Panorama Stitching , 2016, Sensors.

[51]  Naixue Xiong,et al.  Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks , 2017, Sensors.

[52]  Kuang-Ching Wang,et al.  Review of Internet of Things (IoT) in Electric Power and Energy Systems , 2018, IEEE Internet of Things Journal.

[53]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[54]  Yuenan Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.

[55]  Wei Lu,et al.  Region duplication detection based on Harris corner points and step sector statistics , 2013, J. Vis. Commun. Image Represent..

[56]  Wei Lu,et al.  Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation , 2016, Signal Process. Image Commun..

[57]  L. S. S. Baboo,et al.  Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[58]  Bin Fan,et al.  Local Intensity Order Pattern for feature description , 2011, 2011 International Conference on Computer Vision.

[59]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[60]  Naixue Xiong,et al.  A Pretreatment Workflow Scheduling Approach for Big Data Applications in Multicloud Environments , 2016, IEEE Transactions on Network and Service Management.

[61]  Ridong Zhang,et al.  Improved Control for Industrial Systems Over Model Uncertainty: A Receding Horizon Expanded State Space Control Approach , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[62]  Fei Xue,et al.  Natural image deblurring based on L0-regularization and kernel shape optimization , 2018, Multimedia Tools and Applications.

[63]  Guoqiang Li,et al.  Digital image splicing detection based on Markov features in block DWT domain , 2018, Multimedia Tools and Applications.

[64]  Ainuddin Wahid Abdul Wahab,et al.  SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack , 2017, J. Vis. Commun. Image Represent..

[65]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[66]  Anderson Rocha,et al.  Behavior Knowledge Space-Based Fusion for Copy–Move Forgery Detection , 2016, IEEE Transactions on Image Processing.

[67]  Shiguo Lian,et al.  Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.

[68]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[69]  Naixue Xiong,et al.  Effective Alternating Direction Optimization Methods for Sparsity-Constrained Blind Image Deblurring , 2017, Sensors.

[70]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[71]  Di Wu,et al.  Non-Convex Total Generalized Variation with Spatially Adaptive Regularization Parameters for Edge-Preserving Image Restoration , 2016 .

[72]  Jie Li,et al.  Blind image motion deblurring with L0-regularized priors , 2016, J. Vis. Commun. Image Represent..

[73]  Lars Rosgaard Jensen,et al.  Influence of functionalization on the structural and mechanical properties of graphene , 2017 .

[74]  Naixue Xiong,et al.  A novel self-tuning feedback controller for active queue management supporting TCP flows , 2010, Inf. Sci..

[75]  Jian Weng,et al.  Steganalysis of content-adaptive binary image data hiding , 2017, J. Vis. Commun. Image Represent..

[76]  Naixue Xiong,et al.  Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems , 2015, Cluster Computing.

[77]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[78]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[79]  Naixue Xiong,et al.  A Kernel-Based Compressive Sensing Approach for Mobile Data Gathering in Wireless Sensor Network Systems , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[80]  Naixue Xiong,et al.  A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[81]  Jialiang Chen,et al.  Binary image steganalysis based on local texture pattern , 2018, J. Vis. Commun. Image Represent..

[82]  P. Rakesh Kumar,et al.  Image Forgery Detection Using Adaptive Over Segmentation and Feature Point Matching , 2016 .

[83]  Chien-Ping Chang,et al.  Detection of copy-move image forgery using histogram of orientated gradients , 2015, Inf. Sci..

[84]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[85]  Jian Weng,et al.  Multiple Watermarking Using Multilevel Quantization Index Modulation , 2016, IWDW.

[86]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[87]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[88]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[89]  Fan Yang,et al.  Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching , 2017, Multimedia Tools and Applications.

[90]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[91]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .