Multimedia Tools and Applications

, Volume 76, Issue 20, pp 20483–20497 | Cite as

Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching

Article
  • 227 Downloads

Abstract

Copy-move detection is to find the existence of duplicated regions in an image. In this paper, an effective method based on region features is proposed to detect copy-move forgeries, especially when the image is multiple copied or with multiple copy-move groups. Firstly, maximally stable color region detector is applied to extract features, and these features are represented by Zernike moments. Then an improved matching strategy considering n best-matching features is applied to deal with the multiple-copied problem. Moreover, a hierarchical cluster algorithm is developed to estimate transformation matrices and confirm the existence of forgery. Based on these matrices, the duplicated regions can be located at pixel level. Experimental results indicate that the proposed scheme outperforms other similar state-of-the-art techniques.

Keywords

Digital image forensics Region duplication detection Copy-move forgery Maximally stable color region 

References

  1. 1.
    Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRefGoogle Scholar
  2. 2.
    Bay H, Ess A, Tuytelaars T, Gool LV (2008) Speeded up robust features (SURF). Comput Vis Image Underst 110(3):346–359CrossRefGoogle Scholar
  3. 3.
    Chen YH, Huang HC (2015) Coevolutionary genetic watermarking for owner identification. Neural Comput Applic 26(2):291–298CrossRefGoogle Scholar
  4. 4.
    Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRefGoogle Scholar
  5. 5.
    Farid H (2009) Photo fakery and forensics. Adv Comput 77:1–55CrossRefGoogle Scholar
  6. 6.
    Farid H (2009) A survey of image forgery detection. Signal Process 26(2):16–25CrossRefGoogle Scholar
  7. 7.
    Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRefGoogle Scholar
  8. 8.
    Forssen PE (2007) Maximally stable colour regions for recognition and matching. In: IEEE Conference on computer vision and pattern recognition, Minneapolis, MN, pp 1–8Google Scholar
  9. 9.
    Fridrich J, Soukal D, Lukas J (2003) Detection of copy-move forgery in digital images. In: Proceeding of digital forensic research workshop, Cleveland, OH, USA, pp 19–23Google Scholar
  10. 10.
    Ghorbani M, Firouzmand M, Faraahi A (2011) DWT-DCT (QCD) Based copy-move image forgery detection. In: International conference on systems, signals and image processing, Sarajevo, pp 1–4Google Scholar
  11. 11.
    Hastie T, Tibshirani R, Friedman JH (2003) The elements of statistical learning. SpringerGoogle Scholar
  12. 12.
    Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-asia workshop on computational intelligence and industrial application, vol 2, pp 272–276Google Scholar
  13. 13.
    Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1-3):178–184CrossRefGoogle Scholar
  14. 14.
    Lowe D (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110CrossRefGoogle Scholar
  15. 15.
    Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171:180–189CrossRefGoogle Scholar
  16. 16.
    Matas J, Chum O, Urba M, Pajdla T (2002) Robust wide baseline stereo from maximally stable extremal regions. In: Proceedings of the 13th British machine vision conference, Cardiff, UK, pp 384–393Google Scholar
  17. 17.
    Mikolajczyk K, Schmid C (2005) A performance evaluationof local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1615–1630CrossRefGoogle Scholar
  18. 18.
    Muja M, Lowe DG (2009) Fast approximate nearest neighbors with automatic algorithm configuration. In: Proceedings of the fourth international conference on computer vision theory and applications, Lisboa, Portugal, pp 331–340Google Scholar
  19. 19.
    Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRefGoogle Scholar
  20. 20.
    Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Tech. Rep., TR2004-515, Dartmouth College, Computer ScienceGoogle Scholar
  21. 21.
    Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRefGoogle Scholar
  22. 22.
    Shieh CS, Huang HC, Wang FH, Pan JS (2003) An embedding algorithm for multiple watermarks. J Inf Sci Eng 19(2):381–395Google Scholar
  23. 23.
    Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. International Journal of Computer Science Issues 8(4):199–205Google Scholar
  24. 24.
    Teague MR (1980) Image analysis via the general theory of moments. J Opt Soc Am 70(8):920–930MathSciNetCrossRefGoogle Scholar
  25. 25.
    Vedaldi A (2007) An implementation of multi-dimensional maximally stable extremal regions. Tech. rep., University of California, LA (UCLA)Google Scholar
  26. 26.
    Wazirali R, Chaczko Z (2016) Hyper edge detection with clustering for data hiding. Journal of Information Hiding and Multimedia Signal Processing 7(1):1–10CrossRefGoogle Scholar
  27. 27.
    Zhang ZW, Wu LF, Lai HG, Li HB, Zheng CH (2016) Double reversible watermarking algorithm for image tamper detection. Journal of Information Hiding and Multimedia Signal Processing 7(3):530–542Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of Data and Computer Science, Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhouChina
  2. 2.School of Electronics and Information Engineering, Key Laboratory of Information Technology (Ministry of Education)Sun Yat-sen UniversityGuangzhouChina

Personalised recommendations