A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms

In digital images, the most common forgery is copy-move image forgery in which some region(s) of an image is replicated within the image. The copy-move forgery detection (CMFD) techniques fall under two categories; keypoint-based and block-based. The keypoint-based techniques perform well under rotation and scaling but show very poor performance in the case of smooth images. On the contrary, the block-based techniques perform better in smooth images but are comparatively more time demanding. In this paper, a hybrid technique has been proposed by combining the block-based technique using Fourier-Mellin Transform (FMT) and a keypoint-based technique using Scale Invariant Feature Transform (SIFT). In this technique, the input image to be checked for forgery is first divided into texture and smooth regions. Then the keypoints are extracted from the texture part of the image using the SIFT descriptor, and the FMT is applied on the smooth part of the image. Extracted features are then matched to detect the duplicated regions of the image. The experimental results illustrate that the proposed technique performs better in comparison to other state-of-the-art CMFD techniques under various geometric transformations and post-processing operations in reasonable time.

[1]  Yanfen Gan,et al.  Detection of copy–move forgery using discrete analytical Fourier–Mellin transform , 2016 .

[2]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[3]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[4]  Amit Kumar Singh,et al.  Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications , 2017, Multimedia Tools and Applications.

[5]  Yuenan Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.

[6]  Qi Han,et al.  Feature point-based copy-move forgery detection: covering the non-textured areas , 2014, Multimedia Tools and Applications.

[7]  Hong-Ying Yang,et al.  A new keypoint-based copy-move forgery detection for small smooth regions , 2017, Multimedia Tools and Applications.

[8]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Zhi Zhang,et al.  A Survey on Passive Image Copy-Move Forgery Detection , 2018, J. Inf. Process. Syst..

[10]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Vipin Tyagi,et al.  Understanding Digital Image Processing , 2018 .

[12]  Vipin Tyagi,et al.  A copy-move image forgery detection technique based on Gaussian-Hermite moments , 2019, Multimedia Tools and Applications.

[13]  Davide Cozzolino,et al.  Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[14]  S. P. Ghrera,et al.  Pixel-Based Image Forgery Detection: A Review , 2014 .

[15]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Pravin Kakar,et al.  Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.

[17]  I. Elishakoff,et al.  Antioptimization of earthquake exitation and response , 1998 .

[18]  Yong-Dal Shin Fast Detection of Copy-Move Forgery Image using DCT , 2013 .

[19]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[20]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[21]  Vipin Tyagi,et al.  Image Forgery Detection: Survey and Future Directions , 2019, Data, Engineering and Applications.

[22]  Zhi Zhang,et al.  Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors , 2017, KSII Trans. Internet Inf. Syst..

[23]  Hongli Zhang,et al.  Two‐stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images , 2018, Journal of forensic sciences.

[24]  Vipin Tyagi,et al.  Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review , 2019, ICACDS.

[25]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[26]  Prabir Bhattacharya,et al.  Video watermarking using wavelet transform and tensor algebra , 2010, Signal Image Video Process..

[27]  Prabir Bhattacharya,et al.  MPEG Video Watermarking Using Tensor Singular Value Decomposition , 2007, ICIAR.

[28]  Qi Han,et al.  PCET based copy-move forgery detection in images under geometric transforms , 2015, Multimedia Tools and Applications.

[29]  Ainuddin Wahid Abdul Wahab,et al.  Copy-move forgery detection: Survey, challenges and future directions , 2016, J. Netw. Comput. Appl..

[30]  Xinpeng Zhang,et al.  Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images , 2011, IEEE Signal Processing Letters.

[31]  Xinghua Li,et al.  Image tamper detection algorithm based on Radon and Fourier-Mellin transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[32]  Edoardo Ardizzone,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .

[33]  Jie Zhao,et al.  Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns , 2013 .

[34]  Muhammad Ghulam,et al.  Accurate and robust localization of duplicated region in copy–move image forgery , 2014, Machine Vision and Applications.

[35]  Qingtang Su,et al.  Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection , 2018, IEEE Access.

[36]  Fan Yang,et al.  Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..

[37]  Panpan Niu,et al.  Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching , 2018, Multimedia Tools and Applications.

[38]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[39]  Dharmendar Sharma,et al.  Enhancing information retrieval efficiency using semantic-based-combined-similarity-measure , 2011, 2011 International Conference on Image Information Processing.

[40]  Hanqing Lu,et al.  BundleNet: Learning with Noisy Label via Sample Correlations , 2018, IEEE Access.

[41]  Panpan Niu,et al.  A new keypoint-based copy-move forgery detection for color image , 2018, Applied Intelligence.

[42]  Wu-Chih Hu,et al.  Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes , 2015, Multimedia Tools and Applications.

[43]  Ahmad Mahmoudi Aznaveh,et al.  Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.