Browse > Article
http://dx.doi.org/10.3837/tiis.2018.09.019

Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks  

Deng, Jiehang (School of Computers, Guangdong University of Technology)
Yang, Jixiang (School of Computers, Guangdong University of Technology)
Weng, Shaowei (School of Information Engineering, Guangdong University of Technology)
Gu, Guosheng (School of Computers, Guangdong University of Technology)
Li, Zheng (School of Computers, Guangdong University of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.9, 2018 , pp. 4467-4486 More about this Journal
Abstract
Trying to deal with the problem of low robustness of Copy-Move Forgery Detection (CMFD) under various transformation and degradation attacks, a novel CMFD method is proposed in this paper. The main advantages of proposed work include: (1) Discrete Analytical Fourier-Mellin Transform (DAFMT) and Locality Sensitive Hashing (LSH) are combined to extract the block features and detect the potential copy-move pairs; (2) The Euclidian distance is incorporated in the pixel variance to filter out the false potential copy-move pairs in the post-verification step. In addition to extracting the effective features of an image block, the DAMFT has the properties of rotation and scale invariance. Unlike the traditional lexicographic sorting method, LSH is robust to the degradations of Gaussian noise and JEPG compression. Because most of the false copy-move pairs locate closely to each other in the spatial domain or are in the homogeneous regions, the Euclidian distance and pixel variance are employed in the post-verification step. After evaluating the proposed method by the precision-recall-$F_1$ model quantitatively based on the Image Manipulation Dataset (IMD) and Copy-Move Hard Dataset (CMHD), our method outperforms Emam et al.'s and Li et al.'s works in the recall and $F_1$ aspects.
Keywords
Copy-move forgery detection; Discrete Analytical Fourier-Mellin transform; Locality sensitive hashing; Block variance;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Z. Zhang, D. Wang, C. Wang, and X. Zhou, "Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors," KSII Transactions on Internet & Information Systems, vol. 11, no. 9, pp. 4567-4587, September, 2017.   DOI
2 A. Popescu, and H. Farid, "Exposing digital forgeries by detecting duplicated image region," Department of Computer Science, Dartmouth College, Technology Report TR2004-515, 2004.
3 B. Mahdian, and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic science international, vol. 171, no. 2, pp. 180-189, September, 2007.   DOI
4 J. Zhao, and J. Guo, "Passive forensics for copy-move image forgery using a method based on DCT and SVD," Forensic science international, vol. 233, no. 1, pp. 158-166, December, 2013.   DOI
5 G. Muhammad, M. Hussain, and G. Bebis, "Passive copy move image forgery detection using undecimated dyadic wavelet transform," Digital Investigation, vol. 9, no. 1, pp. 49-57, June, 2012.   DOI
6 S.-J. Ryu, M. Kirchner, M.-J. Lee, and H.-K. Lee, "Rotation invariant localization of duplicated image regions based on Zernike moments," IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1355-1370, July, 2013.   DOI
7 P.-T. Yap, X. Jiang, and A. C. Kot, "Two-dimensional polar harmonic transforms for invariant image representation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 7, pp. 1259-1270, July, 2010.   DOI
8 Y. Li, "Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching," Forensic science international, vol. 224, no. 1, pp. 59-67, January, 2013.   DOI
9 M. Emam, Q. Han, and X. M. Niu, "PCET based copy-move forgery detection in images under geometric transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, September, 2016.   DOI
10 J. Li, X. Li, B. Yang, and X. Sun, "Segmentation-Based Image Copy-Move Forgery Detection Scheme," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, March, 2015.   DOI
11 H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Proc. of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272-276, December 19-20, 2008.
12 I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A sift-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, September, 2011.   DOI
13 F. Zhao, R. Zhang, H. Guo, and Y. Zhang, "Effective digital image copy-move location algorithm robust to geometric transformations," in Proc. of 2015 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, September 19-22, 2015.
14 K. Sudhakar, V. Sandeep, and S. Kulkarni, "Speeding-up SIFT based copy move forgery detection using level set approach," in Proc. of International Conference on Advances in Electronics, Computers and Communications, pp. 1-6, October 10-11, 2014.
15 E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-move forgery detection by matching triangles of keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084-2094, October, 2015.   DOI
16 L. K. Bhullar, S. Budhiraja, and A. Dhindsa, "DWT and SIFT based Passive Copy-Move Forgery Detection," International Journal of Computer Applications, vol. 95, no. 23, pp. 14-18, June, 2014.   DOI
17 N. Yadav, and R. Kapdi, "Copy move forgery detection using SIFT and GMM," in Proc. of 5th Nirma University International Conference on Engineering, pp. 1-4, November 26-28, 2015.
18 J. Zhong, and Y. Gan, "Detection of copy-move forgery using discrete analytical Fourier-Mellin transform," Nonlinear Dynamics, vol. 84, no. 1, pp. 189-202, April, 2016.   DOI
19 X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, "Image copy-move forgery detection based on SURF," in Proc. of International Conference on Multimedia information networking and security, pp. 889-892, Novenber 4-6, 2010.
20 C.-M. Pun, X.-C. Yuan, and X.-L. Bi, "Image forgery detection using adaptive oversegmentation and feature point matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, April, 2015.   DOI
21 M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proc. of the 20th annual symposium on Computational geometry, pp. 253-262, June 08-11, 2004.
22 A. J. Fridrich, B. D. Soukal, and A. J. Lukas, "Detection of copy-move forgery in digital images," in Proc. of 3rd Digital Forensic Research Workshop, August 6-8, 2003.
23 M. Sellami, and F. Ghorbel, "An invariant similarity registration algorithm based on the analytical fourier-mellin transform," in Proc. of the 20th European conference on Signal Processing, pp. 390-394, August 27-31, 2012.
24 E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, "Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes," Journal of Visual Communication and Image Representation, vol. 29, pp. 16-32, May, 2015.   DOI
25 S. Debbarma, A. B. Singh, and K. M. Singh, "Keypoints based copy-move forgery detection of digital images," in Proc. of International Conference on Informatics, Electronics & Vision, pp. 1-5, May 23-24, 2014.
26 H. Farid, "Image forgery detection," IEEE Signal processing magazine, vol. 26, no. 2, pp. 16-25, March, 2009.   DOI
27 V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on information forensics and security, vol. 7, no. 6, pp. 1841-1854, September, 2012.   DOI