Detection of copy-move image modification using JPEG compression model.

The so-called copy-move forgery, based on copying an object and pasting in another location of the same image, is a common way to manipulate image content. In this paper, we address the problem of copy-move forgery detection in JPEG images. The main problem with JPEG compression is that the same pixels, after moving to a different position and storing in the JPEG format, have different values. The majority of existing algorithms is based on matching pairs of similar patches, which generates many false matches. In many cases they cannot be eliminated by postprocessing, causing the failure of detection. To overcome this problem, we derive a JPEG-based constraint that any pair of patches must satisfy to be considered a valid candidate and propose an efficient algorithm to verify the constraint. The constraint can be integrated into most existing methods. Experiments show significant improvement of detection, especially for difficult cases, such as small objects, objects covered by textureless areas and repeated patterns.

[1]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[2]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[3]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[4]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[5]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[6]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[7]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[8]  Nikolas P. Galatsanos,et al.  Projection-based spatially adaptive reconstruction of block-transform compressed images , 1995, IEEE Trans. Image Process..

[9]  Jiwu Huang,et al.  Image Forgery Localization via Integrating Tampering Possibility Maps , 2017, IEEE Transactions on Information Forensics and Security.

[10]  Qi Han,et al.  Feature point-based copy-move forgery detection: covering the non-textured areas , 2014, Multimedia Tools and Applications.

[11]  Dimitri P. Bertsekas,et al.  On the Douglas—Rachford splitting method and the proximal point algorithm for maximal monotone operators , 1992, Math. Program..

[12]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Ahmad Mahmoudi Aznaveh,et al.  Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[15]  Hongyuan Li,et al.  Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[16]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[17]  David G. Lowe,et al.  Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.

[18]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[19]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[20]  Michal Sorel,et al.  Fast Bayesian JPEG Decompression and Denoising With Tight Frame Priors , 2017, IEEE Transactions on Image Processing.

[21]  Jing Dong,et al.  Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.

[22]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[23]  H. H. Rachford,et al.  On the numerical solution of heat conduction problems in two and three space variables , 1956 .

[24]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[25]  Michal Sorel,et al.  Efficient JPEG decompression by the alternating direction method of multipliers , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[26]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[27]  Sonja Grgic,et al.  CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.

[28]  Heinz H. Bauschke,et al.  On Projection Algorithms for Solving Convex Feasibility Problems , 1996, SIAM Rev..

[29]  David G. Lowe,et al.  Shape indexing using approximate nearest-neighbour search in high-dimensional spaces , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[30]  Richard O. Duda,et al.  Use of the Hough transformation to detect lines and curves in pictures , 1972, CACM.

[31]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[32]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[33]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[34]  A. Piva An Overview on Image Forensics , 2013 .

[35]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.