Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks

Trying to deal with the problem of low robustness of Copy-Move Forgery Detection (CMFD) under various transformation and degradation attacks, a novel CMFD method is proposed in this paper. The main advantages of proposed work include: (1) Discrete Analytical Fourier-Mellin Transform (DAFMT) and Locality Sensitive Hashing (LSH) are combined to extract the block features and detect the potential copy-move pairs; (2) The Euclidian distance is incorporated in the pixel variance to filter out the false potential copy-move pairs in the post-verification step. In addition to extracting the effective features of an image block, the DAMFT has the properties of rotation and scale invariance. Unlike the traditional lexicographic sorting method, LSH is robust to the degradations of Gaussian noise and JEPG compression. Because most of the false copy-move pairs locate closely to each other in the spatial domain or are in the homogeneous regions, the Euclidian distance and pixel variance are employed in the post-verification step. After evaluating the proposed method by the precision-recall-F1 model quantitatively based on the Image Manipulation Dataset (IMD) and Copy-Move Hard Dataset (CMHD), our method outperforms Emam et al.’s and Li et al.’s works in the recall and F1 aspects.

[1]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[2]  Yanfen Gan,et al.  Detection of copy–move forgery using discrete analytical Fourier–Mellin transform , 2016 .

[3]  Faouzi Ghorbel,et al.  An invariant similarity registration algorithm based on the Analytical Fourier-Mellin Transform , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[4]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[5]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[6]  S. Kulkarni,et al.  Speeding-up SIFT based copy move forgery detection using level set approach , 2014, 2014 International Conference on Advances in Electronics Computers and Communications.

[7]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[8]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[9]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Xudong Jiang,et al.  Two-Dimensional Polar Harmonic Transforms for Invariant Image Representation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[12]  Edoardo Ardizzone,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .

[13]  Rupal Kapdi,et al.  Copy move forgery detection using SIFT and GMM , 2015, 2015 5th Nirma University International Conference on Engineering (NUiCONE).

[14]  Swapan Debbarma,et al.  Keypoints based copy-move forgery detection of digital images , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).

[15]  Jichang Guo,et al.  Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.

[16]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[17]  Sumit Budhiraja,et al.  DWT and SIFT based Passive Copy-Move Forgery Detection , 2014 .

[18]  Qi Han,et al.  PCET based copy-move forgery detection in images under geometric transforms , 2015, Multimedia Tools and Applications.

[19]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[20]  Zhi Zhang,et al.  Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors , 2017, KSII Trans. Internet Inf. Syst..

[21]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[22]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[23]  Fuxing Zhao,et al.  Effective digital image copy-move location algorithm robust to geometric transformations , 2015, 2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[24]  Yuenan Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.

[25]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[27]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..