Browse > Article
http://dx.doi.org/10.3837/tiis.2019.08.010

Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms  

Thajeel, Salam A. (Computer Science Department, College of Education, Mustansiriyah University)
Mahmood, Ali Shakir (Computer Science Department, College of Education, Mustansiriyah University)
Humood, Waleed Rasheed (Computer Science Department, College of Education, Mustansiriyah University)
Sulong, Ghazali (Universiti Malaysia Terengganu)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.8, 2019 , pp. 4005-4025 More about this Journal
Abstract
Copy-move forgery (CMF) in digital images is a detrimental tampering of artefacts that requires precise detection and analysis. CMF is performed by copying and pasting a part of an image into other portions of it. Despite several efforts to detect CMF, accurate identification of noise, blur and rotated region-mediated forged image areas is still difficult. A novel algorithm is developed on the basis of quaternion polar complex exponential transform (QPCET) to detect CMF and is conducted involving a few steps. Firstly, the suspicious image is divided into overlapping blocks. Secondly, invariant features for each block are extracted using QPCET. Thirdly, the duplicated image blocks are determined using k-dimensional tree (kd-tree) block matching. Lastly, a new technique is introduced to reduce the flat region-mediated false matches. Experiments are performed on numerous images selected from the CoMoFoD database. MATLAB 2017b is used to employ the proposed method. Metrics such as correct and false detection ratios are utilised to evaluate the performance of the proposed CMF detection method. Experimental results demonstrate the precise and efficient CMF detection capacity of the proposed approach even under image distortion including rotation, scaling, additive noise, blurring, brightness, colour reduction and JPEG compression. Furthermore, our method can solve the false match problem and outperform existing ones in terms of precision and false positive rate. The proposed approach may serve as a basis for accurate digital image forensic investigations.
Keywords
Copy move forgery detection (CMFD); duplicated region detection; feature extraction; digital image forensic; QPCET;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Liu, C., X.-H. Huang, and M. Wang, "Fast computation of Zernike moments in polar coordinates," IET image processing, vol. 6, no. 7, pp. 996-1004, 2012.   DOI
2 Hosny, K.M. and M.M. Darwish, "Highly accurate and numerically stable higher order QPCET moments for color image representation," Pattern Recognition Letters, vol. 97, pp. 29-36, 2017.   DOI
3 Christlein, V., C. Riess, and E. Angelopoulou. "A Study on Features for the Detection of Copy-Move Forgeries," Sicherheit, pp. 105-116, 2010.
4 Christlein, V., et al., "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on information forensics and security, vol. 7, no. 6, pp. 1841-1854, 2012.   DOI
5 Muja, M. and D.G. Lowe, "Fast approximate nearest neighbors with automatic algorithm configuration," VISAPP, vol. 1, no. 2, pp. 331-340, 2009.
6 Raguram, R., J.-M. Frahm, and M. Pollefeys, "A comparative analysis of RANSAC techniques leading to adaptive real-time random sample consensus," in Proc. of Computer Vision, pp. 500-513, 2008.
7 Davarzani, R., et al., "Copy-move forgery detection using multiresolution local binary patterns," Forensic science international, vol. 231, pp. 61-72, 2013.   DOI
8 Tralic, D., et al., "CoMoFoD-New database for copy-move forgery detection," in Proc. of IEEE symposium on ELMAR international symposium, pp. 49-54, 2013.
9 Lee, J.-C., "Copy-move image forgery detection based on Gabor magnitude," Journal of Visual Communication and Image Representation, vol. 31, pp. 320-334, 2015.   DOI
10 Emam, M., Q. Han, and X. Niu, "PCET based copy-move forgery detection in images under geometric transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, 2016.   DOI
11 Redi, J.A., W. Taktak, and J.-L. Dugelay, "Digital image forensics: a booklet for beginners," Multimedia Tools and Applications, vol. 51, no. 1, pp. 133-162, 2011.   DOI
12 Chou, C.-L. and J.-C. Lee, "Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns," in Proc. of Springer on International Conference on Security with Intelligent Computing and Big-data Services, vol. 733, pp 47-56, 2018.
13 Liu, Y., Q. Guan, and X. Zhao, "Copy-move forgery detection based on convolutional kernel network," Multimedia Tools and Applications, vol. 77, no. 14, pp. 18269-18293, 2018.   DOI
14 Shih, F.Y. and Y. Yuan, "16 A Comparison Study on Copy-Cover Image Forgery Detection," Multimedia Security: Watermarking, Steganography, and Forensics, pp. 297, 2012.
15 Mahdian, B. and S. Saic, "A bibliography on blind methods for identifying image forgery," Signal Processing: Image Communication, vol. 25, no. 6, pp. 389-399, 2010.   DOI
16 Lee, J.-C., C.-P. Chang, and W.-K. Chen, "Detection of copy-move image forgery using histogram of orientated gradients," Information Sciences, vol. 321, pp. 250-262, 2015.   DOI
17 Sridevi, M., C. Mala, and S. Sanyam, "Comparative study of image forgery and copy-move techniques," Advances in Computer Science, Engineering & Applications, pp. 715-723, 2012.
18 Tralic, D., et al., "Copy-move forgery detection using cellular automata, in Cellular Automata in Image Processing and Geometry," Cellular Automata in Image Processing and Geometry, pp. 105-125, 2014.
19 Elwin, J.G.R., T. Aditya, and S.M. Shankar. "Survey on passive methods of image tampering detection," in Proc. of IEEE Conf. on Communication and computational intelligence, 2010.
20 Ryu, S.-J., et al., "Rotation invariant localization of duplicated image regions based on Zernike moments," IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1355-1370, 2013.   DOI
21 Wang, X.-y., et al., "Quaternion polar complex exponential transform for invariant color image description," Applied Mathematics and Computation, vol. 256, pp. 951-967, 2015.   DOI
22 Sheng, Y., H. Wang, and G. Zhang, "Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing," Advances in Mechanical and Electronic Engineering, pp. 343-348, 2013.
23 Fridrich, A.J., B.D. Soukal, and A.J. Lukas, "Detection of copy-move forgery in digital images," in Proc. of Digital Forensic Research Workshop, Citeseer, 2003.
24 Sunil, K., D. Jagan, and M. Shaktidev, "DCT-PCA based method for copy-move forgery detection," in Proc. of 48th Annual Convention of Computer Society of India Conf. on ICT and Critical Infrastructure, Springer, pp. 577-583, 2014.
25 Popescu, A. and H. Farid, "Exposing digital forgeries by detecting duplicated image region [Technical Report]," Hanover, Department of Computer Science, Dartmouth College. USA, pp. 32, 2004.
26 Wandji, N.D., S. Xingming, and M.F. Kue, "Detection of copy-move forgery in digital images based on DCT," arXiv preprint arXiv:1308.5661, 2013.
27 Ghorbani, M., M. Firouzmand, and A. Faraahi, "DWT-DCT (QCD) based copy-move image forgery detection," in Proc. of IEEE Conf. on Systems, Signals and Image Processing, 2011.
28 Mahdian, B. and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic science international, vol. 171, no. 2, pp. 180-189, 2007.   DOI
29 Li, L., et al., "An efficient scheme for detecting copy-move forged images by local binary patterns," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no.1, pp. 46-56, 2013.
30 Li, L., et al., "Detecting copy-move forgery under affine transforms for image forensics," Computers & Electrical Engineering, vol. 40, no. 6, pp. 1951-1962, 2014.   DOI
31 Zhong, J., et al., "A new block-based method for copy move forgery detection under image geometric transforms," Multimedia Tools and Applications, vol. 76, no. 13, pp. 14887-14903, 2017.   DOI
32 Hosny, K.M., H.M. Hamza, and N.A. Lashin, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators," The Imaging Science Journal, vol. 66, no. 6, pp. 330-345, 2017.   DOI
33 Zhu, Y., X. Shen, and H. Chen, "Copy-move forgery detection based on scaled ORB," Multimedia Tools and Applications, vol. 75, no. 6, pp. 3221-3233, 2016.   DOI
34 Mahmood, T., et al., "A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform," Journal of Visual Communication and Image Representation, vol. 53, pp. 202-214, 2018.   DOI
35 Huang, H., W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Proc. of IEEE Workshop on Computational Intelligence and Industrial Application, 2008.
36 Bo, X., et al., "Image copy-move forgery detection based on SURF," in Proc. of IEEE Conf. on Multimedia information networking and security, 2010.
37 Amerini, I., et al., "A sift-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011.   DOI
38 Chen, L., et al., "Region duplication detection based on Harris corner points and step sector statistics," Journal of Visual Communication and Image Representation, vol. 24, no. 3, pp. 244-254, 2013.   DOI
39 Yang, F., et al., "Copy-move forgery detection based on hybrid features," Engineering Applications of Artificial Intelligence, vol. 59, pp. 73-83, 2017.   DOI
40 Hosny, K.M. and M.M. Darwish, "A kernel-based method for fast and accurate computation of PHT in polar coordinates," Journal of Real-Time Image Processing, vol. 16, no. 4, pp. 1235-1247, 2019.   DOI
41 Hosny, K.M., "Accurate orthogonal circular moment invariants of gray-level images," Journal of Computer Science, vol. 7, no. 5, pp. 715-722, 2011.   DOI
42 Hosny, K.M. and M.M. Darwish, "Accurate computation of quaternion polar complex exponential transform for color images in different coordinate systems," Journal of Electronic Imaging, vol. 26, no. 2, pp. 023021, 2017.   DOI