Multimedia Tools and Applications

, Volume 77, Issue 11, pp 14241–14258 | Cite as

Region duplication detection based on image segmentation and keypoint contexts

  • Cong Lin
  • Wei Lu
  • Wei Sun
  • Jinhua Zeng
  • Tianhua Xu
  • Jian-Huang Lai


In this paper, a novel region duplication detection method is proposed based on image segmentation and keypoint contexts. The proposed method includes the primary region duplication detection based on keypoints and the supplementary region duplication detection based on blocks. In the primary region duplication detection, an image is divided into non-overlapped patches by using SLIC. Furthermore, the keypoints are matched and clustered within the same patch as patch feature. Then the patches are matched and an affine transformation is tried to be estimated from a pair of patches. When the estimation fails, in the supplementary region duplication detection, a transformation matrix is tried to be estimated from a pair of keypoints by the proposed Keypoint Contexts (KC) approach. The experimental results indicate that the proposed method can achieve much better comprehensive performances than the state-of-the-art methods on the public databases, even under various challenging conditions.


Digital image forensics Region duplication detection Copy-move forgery Image segmentation Keypoint contexts 



This work is supported by the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), the Fundamental Research Funds for the Central Universities (No. 16lgjc83), Scientific and Technological Achievements Transformation Plan of Sun Yat-sen University, the Research Project of Guangdong University of Finance and Economics (No. 10GL52001), Shanghai Sailing Program (No. 17YF1420000), the State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University (Contract No. RCS2016K007), and the Science and Technology Development Fund of Macao SAR (No. 097/2013/A3).


  1. 1.
    Achanta R, Shaji A, Smith K, Lucchi A, Fua P, Süsstrunk S (2012) Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274–2282CrossRefGoogle Scholar
  2. 2.
    Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRefGoogle Scholar
  3. 3.
    Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659–669CrossRefGoogle Scholar
  4. 4.
    Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. Comput Vis Image Underst 110(3):346–359CrossRefGoogle Scholar
  5. 5.
    Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRefGoogle Scholar
  6. 6.
    Farid H (2009) Photo fakery and forensics. Adv Comput 77:1–55CrossRefGoogle Scholar
  7. 7.
    Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRefGoogle Scholar
  8. 8.
    Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. In: Proceeding of digital forensic research workshop, pp 19–23. Cleveland, OH, USAGoogle Scholar
  9. 9.
    Hartley R, Zisserman A (2004) Multiple view geometry in computer vision. Cambridge University PressGoogle Scholar
  10. 10.
    Hastie T, Tibshirani R, Friedman J (2003) The elements of statistical learning. Springer Series in Statistics, BerlinzbMATHGoogle Scholar
  11. 11.
    Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia workshop on computational intelligence and industrial application, vol 2, pp 272–276Google Scholar
  12. 12.
    Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1-3):178–184CrossRefGoogle Scholar
  13. 13.
    Khan S, Kulkarni A (2010) Reduced time complexity for detection of copy-move forgery using discrete wavelet transform. Int J Comput Appl 6(7):31–36Google Scholar
  14. 14.
    Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRefGoogle Scholar
  15. 15.
    Lowe DG (2004) Distinctive image features from scale-invariant keypoints. In: International journal of computer vision, pp. 91–110Google Scholar
  16. 16.
    Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRefGoogle Scholar
  17. 17.
    Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Tech. Rep. TR2004-515, Department of Computer Science, Dartmouth CollegeGoogle Scholar
  18. 18.
    Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive over-segmentation and feature points matching. IEEE Trans Inf Forensics Secur 10 (8):1705–1716CrossRefGoogle Scholar
  19. 19.
    Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRefGoogle Scholar
  20. 20.
    Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. In: IEEE International workshop on information hiding (IH). Springer, Berlin, pp 51–65Google Scholar
  21. 21.
    Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues 8(4):199–205Google Scholar
  22. 22.
    Vedaldi A, Fulkerson B (2010) Vlfeat: an open and portable library of computer vision algorithms. In: International conference on multimedea 2010, Firenze, Italy, October, pp 1469–1472Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.School of Data and Computer Science, Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhouChina
  2. 2.Educational Technology CenterGuangdong University of Finance and EconomicsGuangzhouChina
  3. 3.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  4. 4.School of Electronics and Information Technology, Key Laboratory of Information Technology (Ministry of Education)Sun Yat-sen UniversityGuangzhouChina
  5. 5.State Key Laboratory of Rail Traffic Control and SafetyBeijing Jiaotong UniversityBeijingChina
  6. 6.Institute of Forensic ScienceMinistry of JusticeShanghaiChina

Personalised recommendations