Multimedia Tools and Applications

, Volume 76, Issue 1, pp 1509–1530 | Cite as

Robustness of copy-move forgery detection under high JPEG compression artifacts

  • Deng-Yuan Huang
  • Ching-Ning Huang
  • Wu-Chih Hu
  • Chih-Hung Chou


This paper proposes a robust method for detecting copy-move forgery in images under various JPEG compression and Gaussian noise and blurring attacks. The method comprises feature extraction, feature matching, and duplicate block identification. The fast Fourier transform (FFT), singular value decomposition (SVD), and principal component analysis (PCA) are utilized for feature extraction. Then, the cascading matchers of FFT, SVD, and PCA are adopted for feature matching. Matched blocks are identified using cascade filtering with city block, horizontal, vertical, and frequency filters. Finally, the pixels on upper left corners of detected duplicate blocks are output for visual inspection. The major contributions of this paper are: (1) the proposed method is fully threshold-free; (2) only one-dimensional features are generated using FFT and SVD for feature matching; and (3) a high accuracy rate (> 97 %) is obtained even if the JPEG quality factor Q is 20. In extensive experiments, a 98 % accuracy rate and a 6 % false negative rate were obtained for the worst case of Q = 20 and a region size of 32 × 32 pixels compared to existing works, indicating the feasibility of the proposed method.


Image forgery detection Principal component analysis Singular value decomposition Fast Fourier transform 


  1. 1.
    Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099–1110CrossRefGoogle Scholar
  2. 2.
    Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensic Secur 7(3):1003–1017CrossRefGoogle Scholar
  3. 3.
    Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1–3):33–43CrossRefGoogle Scholar
  4. 4.
    CASIA image tampering detection evaluation database, national laboratory of pattern recognition, institute of automation, Chinese academy of science [On-line]. Available:
  5. 5.
    Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841–1854CrossRefGoogle Scholar
  6. 6.
    Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. In: Proc. of Digital Forensic Research Workshop, pp. 19–23Google Scholar
  7. 7.
    Fu L, Zhang M, Liu Z, Li H, He T (2012) Adaptive hybrid feature extraction for leaf image classification by support vector machine. Journal of Convergence Information Technology 7(2):160–166CrossRefGoogle Scholar
  8. 8.
    Hu W-C, Chen W-H (2013) Effective forgery detection using DCT + SVD-based watermarking for region of interest in key frames of vision-based surveillance. Int J Comput Sci Eng 8(4):297–305CrossRefGoogle Scholar
  9. 9.
    Hu W-C, Chen W-H, Huang D-Y, Yang C-Y (2015) Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimed Tools Appl. doi:10.1007/s11042-015-2449-0 Google Scholar
  10. 10.
    Hu WC, Dai JS, Jian JS (2015) Effective composite image detection method based on feature inconsistency of image components. Digital Signal Processing 39:50–62CrossRefGoogle Scholar
  11. 11.
    Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184CrossRefGoogle Scholar
  12. 12.
    Ketenci S, Ulutas G (2013) Copy-move forgery detection in images via 2D-Fourier transform. In: Proc. of 36th International Conference on Telecommunications and Signal Processing, pp. 813–816Google Scholar
  13. 13.
    Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimedia Signal Process 4(1):46–56Google Scholar
  14. 14.
    Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proc. of IEEE International Conference on Multimedia and Expo, pp. 1750–1753Google Scholar
  15. 15.
    Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454MathSciNetCrossRefGoogle Scholar
  16. 16.
    Muhammad G, Dewan M-S, Moniruzzaman M, Hussain M, Huda M-N (2014) Image forgery detection using Gabor filters and DCT. In: Proc. of the International Conference on Electrical Engineering and Information & Communication Technology, pp. 1–5Google Scholar
  17. 17.
    Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515Google Scholar
  18. 18.
    Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using Zernike moments. In: Proc. of 12th International Conference on Information Hiding, pp. 51–65Google Scholar
  19. 19.
    Wang Y, Gurule K, Wise J, Zheng J (2012) Wavelet based region duplication forgery detection. In: Proc. of 2012 Ninth International Conference on Information Technology: New Generations, pp. 30–35Google Scholar
  20. 20.
    Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: Proc. of 2010 International Conference on Multimedia Information Networking and Security, pp. 889–892Google Scholar
  21. 21.
    Zhang T, Wang R-D (2009) Copy-move forgery detection based on SVD in digital image. In: Proc. of IEEE International Congress on Image and Signal Processing, pp. 1–5Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Deng-Yuan Huang
    • 1
  • Ching-Ning Huang
    • 1
  • Wu-Chih Hu
    • 2
  • Chih-Hung Chou
    • 1
  1. 1.Department of Electrical EngineeringDa-Yeh UniversityDacunTaiwan
  2. 2.Department of Computer Science and Information EngineeringNational Penghu University of Science and TechnologyMakung CityTaiwan

Personalised recommendations