Robust copy–move forgery detection using quaternion exponent moments

Theoretical Advances

Abstract

The detection of forgeries in color images is a very important topic in forensic science. Copy–move (or copy–paste) forgery is the most common form of tampering associated with color images. Conventional copy–move forgeries detection techniques usually suffer from the problems of false positives and susceptibility to many signal processing operations. It is a challenging work to design a robust copy–move forgery detection method. In this paper, we present a novel block-based robust copy–move forgery detection approach using invariant quaternion exponent moments (QEMs). Firstly, original tempered color image is preprocessed with Gaussian low-pass filter, and the filtered color image is divided into overlapping circular blocks. Then, the accurate and robust feature descriptor, QEMs modulus, is extracted from color image block holistically as a vector field. Finally, exact Euclidean locality sensitive hashing is utilized to find rapidly the matching blocks, and the falsely matched block pairs are removed by customizing the random sample consensus with QEMs magnitudes differences. Extensive experimental results show the efficacy of the newly proposed approach in detecting copy–paste forgeries under various challenging conditions, such as noise addition, lossy compression, scaling, and rotation. We obtain the average forgery detection accuracy (F-measure) in excess of 96 and 88% across postprocessing operations, at image level and at pixel level, respectively.

Keywords

Digital image forensics Copy–move forgery detection Quaternion exponent moments E2LSH 

References

  1. 1.
    Muhammad AQ, Mohamed D (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46–74Google Scholar
  2. 2.
    Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy–move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRefGoogle Scholar
  3. 3.
    Chambers J, Yan W, Garhwal A (2015) Currency security and forensics: a survey. Multimed Tools Appl 74(11):4013–4043CrossRefGoogle Scholar
  4. 4.
    Ali Qureshi M, Deriche M (2014) A review on copy move image forgery detection techniques. In: 11th International multi-conference on systems, signals and devices (SSD). Barcelona, Spain, pp 1–5Google Scholar
  5. 5.
    Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRefGoogle Scholar
  6. 6.
    Al-Qershi OM, Khoo BE (2013) Passive detection of copy–move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1–3):284–295CrossRefGoogle Scholar
  7. 7.
    Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRefGoogle Scholar
  8. 8.
    Qazi T, Hayat K, Khan SU (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670CrossRefGoogle Scholar
  9. 9.
    Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716CrossRefGoogle Scholar
  10. 10.
    Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). Prague, pp 1880–1883Google Scholar
  11. 11.
    Ryu SJ, Kirchner M, Lee MJ (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRefGoogle Scholar
  12. 12.
    Davarzani R, Yaghmaie K, Mozaffari S (2013) Copy–move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72CrossRefGoogle Scholar
  13. 13.
    Cozzolino D, Poggi G, Verdoliva L (2014) Copy–move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP). Paris, France, pp 5312–5316Google Scholar
  14. 14.
    Fattah SA, Ullah MMI, Ahmed M (2014) A scheme for copy–move forgery detection in digital images based on 2D-DWT. In: IEEE 57th international midwest symposium on circuits and systems (MWSCAS). College Station, TX, pp 801–804Google Scholar
  15. 15.
    Imamoglu M, Ulutas G, Ulutas M (2013) Detection of copy–move forgery using Krawtchouk moment. In: 2013 8th International conference on electrical and electronics engineering. Bursa, Turkey, pp 311–314Google Scholar
  16. 16.
    Lee J, Chang C, Chen W (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262CrossRefGoogle Scholar
  17. 17.
    Wu YJ, Yu D, Duan HB (2014) Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci China Inf Sci 57(1):1–12Google Scholar
  18. 18.
    Jie Z, Guo J (2013) Passive forensics for copy–move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166Google Scholar
  19. 19.
    Ketenci S, Ulutas G, Ulutas M (2014) Detection of duplicated regions in images using 1D-Fourier transform. In: International conference on systems, signals and image processing. Dubrovnik, Croatia, pp 171–174Google Scholar
  20. 20.
    Lee JC (2015) Copy–move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334CrossRefGoogle Scholar
  21. 21.
    Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRefGoogle Scholar
  22. 22.
    Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy–move forgery detection by means of Zernike moments. In: 13th International workshop on digital-forensics and watermarking (IWDW 2014), LNCS 9023, pp 485–497Google Scholar
  23. 23.
    Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRefGoogle Scholar
  24. 24.
    Silva E, Carvalho T, Ferreira A (2015) Going deeper into copy–move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32CrossRefGoogle Scholar
  25. 25.
    Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRefGoogle Scholar
  26. 26.
    Caldelli R, Amerini I, Ballan L (2012) On the effectiveness of local warping against SIFT-based copy–move detection. In: Proceedings of the 5th international symposium on communications, control and signal processing. Rome, Italy, pp 1–5Google Scholar
  27. 27.
    Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRefGoogle Scholar
  28. 28.
    Costanzo A, Amerini I, Caldelli R (2014) Forensic analysis of SIFT keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(9):1450–1464CrossRefGoogle Scholar
  29. 29.
    Li J, Li X, Yang B (2015) Segmentation-based image copy–move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRefGoogle Scholar
  30. 30.
    Chen L, Lu W, Ni J, Sun W (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254CrossRefGoogle Scholar
  31. 31.
    Jaberi M, Bebis G, Hussain M (2014) Accurate and robust localization of duplicated region in copy–move image forgery. Mach Vis Appl 25(2):451–475CrossRefGoogle Scholar
  32. 32.
    Yu L, Han Q, Niu X (2015) Feature point-based copy–move forgery detection: covering the non-textured areas. Multimed Tools Appl. doi:10.1007/s11042-014-2362-y Google Scholar
  33. 33.
    Jiang YJ (2011) Exponent moments and its application in pattern recognition. Beijing University of Posts and Telecommunications, BeijingGoogle Scholar
  34. 34.
    Xiang-yang Wang, Pan-pan Niu, Hong-ying Yang, Chun-peng Wang, Ai-long Wang (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754CrossRefGoogle Scholar
  35. 35.
    Zong T, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717–729CrossRefGoogle Scholar
  36. 36.
    Zhang R, Wei F, Li B (2014) E2LSH based multiple kernel approach for object detection. Neurocomputing 124(2):105–110CrossRefGoogle Scholar
  37. 37.
    Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer-Verlag London 2016

Authors and Affiliations

  1. 1.School of Computer and Information TechnologyLiaoning Normal UniversityDalianPeople’s Republic of China

Personalised recommendations