Multimedia Tools and Applications

, Volume 77, Issue 13, pp 16795–16811 | Cite as

Fast and robust copy-move forgery detection based on scale-space representation

  • Chun-Su Park
  • Joon Yeon Choeh


Copy-move forgery (CMF), which copies a part of an image and pastes it into another region, is one of the most common methods for digital image tampering. For CMF detection (CMFD), we propose a fast and robust approach that can handle several geometric transformations including rotation, scaling, sheering, and reflection. In the proposed CMFD design, keypoints and their descriptors are extracted from the image based on the Scale Invariant Feature Transform (SIFT). Then, an improved matching operation that can handle multiple copy-move forgeries is performed to detect matched pairs located in duplicated regions. Next, the geometric transformation between duplicated regions is estimated using a subset of reliable matched pairs which are obtained using the SIFT scale space representation. In our simulation, we present comparative results between the proposed algorithm and state-of-the-art ones with proven performance guarantees.


Copy-move forgery Digital image forensics Keypoints SIFT 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2016R1C1B1009682). This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2017-2016-0-00312) supervised by the IITP(Institute for Information & communications Technology Promotion).


  1. 1.
    Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659–669CrossRefGoogle Scholar
  2. 2.
    Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRefGoogle Scholar
  3. 3.
    Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. Comput Vis Image Understand 110(3):346–359CrossRefGoogle Scholar
  4. 4.
    Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: IEEE international conference on acoustics, speech and signal processing, pp 1053–1056Google Scholar
  5. 5.
    Beis JS, Lowe DG (1997) Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: IEEE conference on computer vision and pattern recognition, pp 1000–1006Google Scholar
  6. 6.
    Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRefGoogle Scholar
  7. 7.
    Chen C, Ni J, Huang J (2013) Blind detection of median filtering in digital images: a difference domain based approach. IEEE Trans Image Process 22(2):4699–4710MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: IEEE international workshop on information forensics and security, pp 1–6Google Scholar
  9. 9.
    Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRefGoogle Scholar
  10. 10.
    Cullen CG (1990) Matrices and linear transformations, 2nd edn. Dover Books on MathematicsGoogle Scholar
  11. 11.
    Emam M, Han Q, Zhang H (2017) Two-stage keypoint detection scheme for region duplication forgery detection in digital images. J Forensic Sci.
  12. 12.
    Farid H (2006) Exposing digital forgeries in scientific images Multimedia secur. (MM&sec), pp 29–36Google Scholar
  13. 13.
    Fridrich AJ, Soukal BD, Lukas AJ (2003) Detection of copy-move forgery in digital images. Digital Forensic Research WorkshopGoogle Scholar
  14. 14.
    Hartley RI, Zisserman A (2004) Multiple view geometry in computer vision. Cambridge University PressGoogle Scholar
  15. 15.
    Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia workshop on computational intelligence and industrial application, vol 2, pp 272–276Google Scholar
  16. 16.
    Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184CrossRefGoogle Scholar
  17. 17.
    Imran M, Harvey BA (2017) Block based blind & secure gray image watermarking technique based on discrete wavelet transform and singular value decomposition. KSII Trans Internet Inf Syst 11(2):883–900Google Scholar
  18. 18.
    Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: International conference on computer science and software engineering, vol 3, pp 926–930Google Scholar
  19. 19.
    Khan ES, Kulkarni EA (2010) An efficient method for detection of copy-move forgery using discrete wavelet transform. Int J Comput Sci Eng 2(5):1801–1806Google Scholar
  20. 20.
    Kirchner M, Schöttle P, Riess C (2015) Thinking beyond the block: block matching for copy-move forgery detection revisited. Media Watermarking, Security, and ForensicsGoogle Scholar
  21. 21.
    Kwon GR, Lama RK, Pyun JY, Park CS (2015) Multimedia digital rights management based on selective encryption for flexible business model. Multimedia Tools and Applications.
  22. 22.
    Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: Canadian conference on computer and robot vision, pp 64–71Google Scholar
  23. 23.
    Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRefGoogle Scholar
  24. 24.
    Li W, Yu N (2010) Rotation robust detection of copy-move forgery. In: IEEE international conference on image processing, pp 2113–2116Google Scholar
  25. 25.
    Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Signal Process 5(5):188–197Google Scholar
  26. 26.
    Liu B, Pun C-M, Yuan X-C (2014) Digital image forgery detection using JPEG features and local noise discrepancies. Sci World J 2014:1–12Google Scholar
  27. 27.
    Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110CrossRefGoogle Scholar
  28. 28.
    Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189CrossRefGoogle Scholar
  29. 29.
    Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1115–1125CrossRefGoogle Scholar
  30. 30.
    Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRefGoogle Scholar
  31. 31.
    Murali S, Chittapur GB, Prabhakara HS, Anami BS (2012) Comparison and analysis of photo image forgery detection techniques. Int J Comput Sci Appl 2(6):45–56Google Scholar
  32. 32.
    Mushtaq S, Mir AH (2014) Digital image forgeries and passive image authentication techniques: a survey. International Journal of Advanced Science and Technology 73:15–32CrossRefGoogle Scholar
  33. 33.
    Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRefGoogle Scholar
  34. 34.
    Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRefGoogle Scholar
  35. 35.
    Park C-S, Kim C, Lee J, Kwon G-R (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimedia Tools and Applications.
  36. 36.
    Peng F, Nie Y-Y, Long M (2011) A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Sci Int 212(1):e21–e25CrossRefGoogle Scholar
  37. 37.
    Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515Google Scholar
  38. 38.
    Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133–162CrossRefGoogle Scholar
  39. 39.
    Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using Zernike moments. Lect Notes Comput Sci 6387:51–65CrossRefGoogle Scholar
  40. 40.
    Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci 8(4):199–205Google Scholar
  41. 41.
    Wang J, Liu G, Zhang Z, Dai Y, Wang Z (2009) Fast and robust forensics for image region-duplication forgery. Acta Automatica Sinica 35(12):1488–1495CrossRefGoogle Scholar
  42. 42.
    Wang M, et al. (2014) Countering anti-forensics to wavelet-based compression. In: IEEE international conference on image processing (ICIP), pp 5382–5386Google Scholar
  43. 43.
    Wang X-Y, Li S, Liu Y-N, Niu Y, Yang H-Y, Zhou Z-L (2016) A new keypoint-based copy-move forgery detection for small smooth regions. Multimedia Tools and Applications.
  44. 44.
    Wu Y, Zhang T, Hou X, Xu C (2016) New blind steganalysis framework combining image retrieval and outlier detection. KSII Trans Internet Inf Syst 10(12):6206–6219Google Scholar
  45. 45.
    Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: International conference on image processing (ICIP), vol 2, pp 690–683Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of Computer EducationSungkyunkwan UniversitySeoulSouth Korea
  2. 2.Department of SoftwareSejong UniversitySeoulSouth Korea

Personalised recommendations