Two-pass hashing feature representation and searching method for copy-move forgery detection

Abstract In this paper, we propose a two-pass hashing feature representation and searching method for copy-move forgery detection with a good score and high efficiency. First, the normalized moment transformation is presented to extract the corresponding block features from multiple frequency images. The multiple-dimensional features of each pixel are projected into the corresponding hashing bin to obtain the corresponding hashing features. Then, a novel two-pass hashing feature representation is proposed to concatenate multiple hashing features as the bit sequence. Based on the two-pass hashing feature representations, the two-pass hashing searching algorithm searches and updates the nearest pixel matches in high efficiency. Finally, post-processing operations are proposed to accurately identify the forgery regions. The experimental results show that the proposed copy-move forgery detection method can achieve the best scores among the state-of-the-art methods, even under various attacks. In addition, the proposed method has a very high detection efficiency without iterations.

[1]  Ahmad Mahmoudi Aznaveh,et al.  Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Pawel Korus,et al.  Digital image integrity - a survey of protection and verification techniques , 2017, Digit. Signal Process..

[3]  Adrien Bartoli,et al.  KAZE Features , 2012, ECCV.

[4]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[6]  Huazhong Shu,et al.  Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform , 2015, Digit. Signal Process..

[7]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[8]  Yijun Yan,et al.  Fusion of block and keypoints based approaches for effective copy-move image forgery detection , 2016, Multidimens. Syst. Signal Process..

[9]  R. S. Shaji,et al.  A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor , 2016 .

[10]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[11]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[12]  Chien-Ping Chang,et al.  Detection of copy-move image forgery using histogram of orientated gradients , 2015, Inf. Sci..

[13]  Shai Avidan,et al.  Coherency Sensitive Hashing , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Chi-Man Pun,et al.  Fast copy-move forgery detection using local bidirectional coherency error refinement , 2018, Pattern Recognit..

[15]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Qi Han,et al.  PCET based copy-move forgery detection in images under geometric transforms , 2015, Multimedia Tools and Applications.

[17]  Anderson Rocha,et al.  Behavior Knowledge Space-Based Fusion for Copy–Move Forgery Detection , 2016, IEEE Transactions on Image Processing.

[18]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[19]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[20]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Wael Abd-Almageed,et al.  Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).

[22]  Xiuli Bi,et al.  Fast reflective offset-guided searching method for copy-move forgery detection , 2017, Inf. Sci..

[23]  Yuenan Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.

[24]  Xudong Jiang,et al.  Two-Dimensional Polar Harmonic Transforms for Invariant Image Representation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Jiantao Zhou,et al.  Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching , 2019, IEEE Transactions on Information Forensics and Security.

[26]  Roland Siegwart,et al.  BRISK: Binary Robust invariant scalable keypoints , 2011, 2011 International Conference on Computer Vision.

[27]  Yanfen Gan,et al.  Copy Move Forgery Image Detection via Discrete Radon and Polar Complex Exponential Transform-Based Moment Invariant Features , 2017, Int. J. Pattern Recognit. Artif. Intell..

[28]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[29]  Yi Jiang,et al.  Iterative RANSAC based adaptive birth intensity estimation in GM-PHD filter for multi-target tracking , 2017, Signal Process..

[30]  Wael Abd-Almageed,et al.  BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.

[31]  Gary R. Bradski,et al.  ORB: An efficient alternative to SIFT or SURF , 2011, 2011 International Conference on Computer Vision.