Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor

Nowadays, with a rapid development of digital image technology, image forgery is made easy. Image forgery has considerable consequences, e.g., medical images, miscarriage of justice, political, etc. For instance, in digital newspapers, forged images will mislead public opinion and falsify the truth. In this paper, we proposed a segmentation-based region duplication forgery detection method, by extracting Maximization of Distinctiveness (MOD) keypoints for matching from segmented regions in the image. The main challenge is when the duplicated regions have been affected by rotation and scaling attacks. As a result, the proposed method detects duplicated regions based on two stages, structure analysis and texture analysis. In the first stage, the doubtful image is segmented into regions using the K-means algorithm. The segmented regions then labeled by centroids and MOD keypoints to represent their internal structures. MOD detects local interest points that are robust to rotation and improve detection rate in term of True Positive Rate (TPR). In the second stage, in order to identify the validated forged region, we explore Multiobjective Gradient Operator (MO-GP) to study the internal texture of segmented regions and eliminate the False Positive Rate (FPR) of forged regions. Experiment results show that our method can detect region duplication forgery under rotation, blurring and noise addition for JPEG images on MICC-F220 dataset with average TPR = 93% and FPR = 2%.

[1]  Cordelia Schmid,et al.  Scale & Affine Invariant Interest Point Detectors , 2004, International Journal of Computer Vision.

[2]  Jiwu Huang,et al.  A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[3]  Michael S. Lew,et al.  Interest points based on maximization of distinctiveness , 2008, MIR '08.

[4]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[5]  Hany Farid,et al.  Digital image forensics. , 2008, Scientific American.

[6]  Shao-Yi Chien,et al.  Fast image segmentation based on K-Means clustering with histograms in HSV color space , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[7]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[8]  Babak Mahdian,et al.  Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..

[9]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[10]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[11]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[12]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[13]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[14]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[15]  Sun Xingming,et al.  DWT-PCA (EVD) Based Copy-move Image Forgery Detection , 2011 .

[16]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[17]  Mengjia Xu,et al.  Image region duplication detection based on circular window expansion and phase correlation. , 2012, Forensic science international.

[18]  Fan Chen,et al.  A semi-fragile image watermarking algorithm with two-stage detection , 2012, Multimedia Tools and Applications.

[19]  Leonardo Trujillo,et al.  Interest point detection through multiobjective genetic programming , 2012, Appl. Soft Comput..

[20]  Pravin Kakar,et al.  Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[22]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[23]  Li Fan,et al.  Robust Algorithm for Detection of Copy-Move Forgery in Digital Images Based on Ridgelet Transform , 2012, AICI.

[24]  Osamah M. Al-Qershi,et al.  Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.

[25]  Wei Lu,et al.  Region duplication detection based on Harris corner points and step sector statistics , 2013, J. Vis. Commun. Image Represent..

[26]  Wu-Chih Hu,et al.  Boosting Scheme for Detecting Region Duplication Forgery in Digital Images , 2013, ICGEC.

[27]  Chandan Singh,et al.  Geometrically invariant and high capacity image watermarking scheme using accurate radial transform , 2013 .

[28]  Sanjeev Sharma,et al.  Region Duplication Forgery Detection Technique Based on SURF and HAC , 2013, TheScientificWorldJournal.

[29]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[30]  Saeed Aghabozorgi,et al.  Improving RLRN Image Splicing Detection with the Use of PCA and Kernel PCA , 2014, TheScientificWorldJournal.

[31]  Sun Xingming,et al.  A Survey of Partition-Based Techniques for Copy-Move Forgery Detection , 2014, TheScientificWorldJournal.

[32]  Kumar Sunil,et al.  DCT-PCA Based Method for Copy-Move Forgery Detection , 2014 .

[33]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[34]  Hamid A. Jalab,et al.  Copy move image forgery detection using Hessian and center symmetric local binary pattern , 2015, 2015 IEEE Conference on Open Systems (ICOS).

[35]  Ainuddin Wahid Abdul Wahab,et al.  Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points , 2016, Symmetry.

[36]  Ainuddin Wahid Abdul Wahab,et al.  A novel forged blurred region detection system for image forensic applications , 2016, Expert Syst. Appl..

[37]  KokSheik Wong,et al.  Keypoint Based Authentication And Localization Of Copy-Move Forgery In Digital Image , 2017 .