Advertisement

Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching

  • Xiang-yang Wang
  • Li-xian Jiao
  • Xue-bing Wang
  • Hong-ying Yang
  • Pan-pan Niu
Article
  • 101 Downloads

Abstract

Copy-move (region duplication) is one of the most common types of image forgeries, in which at least one part of an image is copied and pasted onto another area of the same image. The main aims of the copy-move forgery are to overemphasize a concept or conceal objects by duplicating some regions. Keypoint based copy-move forgery detection (CMFD) method extracts image feature points and employs local image features to identify duplicated regions, which exhibits remarkable detection performance with respect to memory requirement, computational cost, and robustness. However, they usually do not work well when the objects are hidden in smooth background areas. Also, the detection and localization accuracy always be lowered because of poor local image feature computation. In this paper, we present a novel approach for the detection and localization of copy-move forgeries, which is based on color invariance SIFER (Scale-invariant feature detector with error resilience) and FQRHFMs (Fast quaternion radial harmonic Fourier moments). Firstly, the original forgery image is segmented into nonoverlapping and nearly uniform superpixel blocks, and the stable keypoints are extracted adaptively from each superpixel block by incorporating the superpixel contents and color invariance SIFER. Secondly, a set of connected Delaunay triangles is constructed using the extracted image keypoints, and suitable local image feature for each Delaunay triangle is computed by using FQRHFMs and gradient entropy. Thirdly, the local image features and coherency sensitive hashing (CSH) are utilized to match quickly the Delaunay triangles. Finally, the falsely matched Delaunay triangles are removed by employing dense linear fitting (DLF), and the duplicated regions are localized using optimized zero mean normalized cross-correlation (ZNCC) measure. We conduct extensive experiments to evaluate the performance of the proposed copy-move forgery detection scheme, in which encouraging results validate the effectiveness of the proposed technique.

Keywords

Copy-move forgery detection Color invariance SIFER FQRHFMs Coherency sensitive hashing Optimized ZNCC 

Notes

Funding

This work was supported by the National Natural Science Foundation of China under Grant No. 61472171, 61272416, &61701212, Project Funded by China Postdoctoral Science Foundation No. 2017 M621135, and the Natural Science Foundation of Liaoning Province of China under Grant No. 201602463.

References

  1. 1.
    Abdel-Hakim AE, Farag AACSIFT (2006) A SIFT descriptor with color invariant characteristics[C]//computer vision and pattern recognition. 2006 IEEE Computer Society Conference on IEEE 2:1978–1983Google Scholar
  2. 2.
    Achanta R, Shaji A, Smith K et al (2012) SLIC superpixels compared to state-of-the-art superpixel methods[J]. IEEE Trans Pattern Anal Mach Intell 34(11):2274–2282CrossRefGoogle Scholar
  3. 3.
    Amerini I, Ballan L, Caldelli R et al (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security 6(3):1099–1110CrossRefGoogle Scholar
  4. 4.
    Amerini I, Ballan L, Caldelli R et al (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage[J]. Signal Process Image Commun 28(6):659–669CrossRefGoogle Scholar
  5. 5.
    Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints[J]. IEEE Transactions on Information Forensics and Security 10(10):2084–2094CrossRefGoogle Scholar
  6. 6.
    Aymaz S, Aymaz Ş, Ulutaş G (2016) Detection of copy move forgery using Legendre Moments[C]//Signal Processing and Communication Application Conference (SIU), 2016 24th. IEEE, 2016: 1125–1128Google Scholar
  7. 7.
    Bo X, Junwen W, Guangjie L, et al. (2010) Image copy-move forgery detection based on SURF[C]//Multimedia information networking and security (MINES), 2010 international conference on. IEEE, 889–892Google Scholar
  8. 8.
    Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling[C]//Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. IEEE, 2011: 1880–1883Google Scholar
  9. 9.
    Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics[J]. Signal Process 91(8):1759–1770CrossRefzbMATHGoogle Scholar
  10. 10.
    Cao M (2015) A new Delaunay triangulation algorithm based on constrained maximum circumscribed circle[J]. Wuhan University Journal of Natural Sciences 20(4):313–317MathSciNetCrossRefGoogle Scholar
  11. 11.
    Cao Y, Gao T, Fan L et al (2012) A robust detection algorithm for copy-move forgery in digital images.[J]. Forensic Sci Int 214(1–3):33–43CrossRefGoogle Scholar
  12. 12.
    Chambers J, Yan W, Garhwal A et al (2015) Currency security and forensics: a survey[J]. Multimedia Tools and Applications 74(11):4013–4043CrossRefGoogle Scholar
  13. 13.
    Christlein V, Riess C, Jordan J et al (2012) An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on information forensics and security 7(6):1841–1854CrossRefGoogle Scholar
  14. 14.
    Chun-peng W, Xing-yuan W, Zhi-qiu X (2016) Geometrically invariant image watermarking based on fast radial harmonic Fourier moments[J]. Signal Process Image Commun 45:10–23CrossRefGoogle Scholar
  15. 15.
    Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch[C]//Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014: 5312–5316Google Scholar
  16. 16.
    Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection[J]. IEEE Transactions on Information Forensics and Security 10(11):2284–2297CrossRefGoogle Scholar
  17. 17.
    Davarzani R, Mozaffari S, Yaghmaie K (2016) Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications 75(8):4639–4667CrossRefGoogle Scholar
  18. 18.
    Emam M, Han Q, Niu X (2016) PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools & Applications 75(18):11513–11527CrossRefGoogle Scholar
  19. 19.
    Gong J, Guo J (2016) Image copy-move forgery detection using SURF in opponent color space[J]. Transactions of Tianjin University 22(2):151–157CrossRefGoogle Scholar
  20. 20.
    Hu H, Zhang Y, Shao C et al (2014) Orthogonal moments based on exponent functions: exponent-Fourier moments[J]. Pattern Recogn 47(8):2596–2606CrossRefzbMATHGoogle Scholar
  21. 21.
    Isaac MM, Wilscy M (2015) Copy-Move forgery detection based on Harris Corner points and BRISK[C]//Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM, 2015: 394–399Google Scholar
  22. 22.
    Korman S, Avidan S (2016) Coherency sensitive hashing[J]. IEEE Trans Pattern Anal Mach Intell 38(6):1099–1112CrossRefGoogle Scholar
  23. 23.
    Li L, Li S, Zhu H et al (2014) Detecting copy-move forgery under affine transforms for image forensics[J]. Computers & Electrical Engineering 40(6):1951–1962MathSciNetCrossRefGoogle Scholar
  24. 24.
    Li C, Ma Q, Xiao L, et al (2016) An Image Copy Move Forgery Detection Method Using QDCT[C]//Proceedings of the International Conference on Internet Multimedia Computing and Service. ACM, 2016: 5–8Google Scholar
  25. 25.
    Lin C, Li Y, Xu G et al (2017) Optimizing ZNCC calculation in binocular stereo matching[J]. Signal Process Image Commun 52:64–73CrossRefGoogle Scholar
  26. 26.
    Liu MY, Tuzel O, Ramalingam S et al (2014) Entropy-rate clustering: cluster analysis via maximizing a submodular function subject to a matroid constraint[J]. IEEE Trans Pattern Anal Mach Intell 36(1):99–112CrossRefGoogle Scholar
  27. 27.
    Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI 2015) 1617–1623Google Scholar
  28. 28.
    Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16), 2016: 201–207Google Scholar
  29. 29.
    Mainali P, Lafruit G, Yang Q et al (2013) SIFER: scale-invariant feature detector with error resilience[J]. Int J Comput Vis 104(2):172–197CrossRefzbMATHGoogle Scholar
  30. 30.
    Oommen R S, Jayamohan M, Sruthy S (2016) Scale invariant detection of copy-move forgery using fractal dimension and singular values[M]//Advances in Signal Processing and Intelligent Recognition Systems. Springer, Cham, 2016: 559–570Google Scholar
  31. 31.
    Pan X, Lyu S (2010) Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Security 5(4):857–867CrossRefGoogle Scholar
  32. 32.
    Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching[J]. IEEE Transactions on Information Forensics and Security 10(8):1705–1716CrossRefGoogle Scholar
  33. 33.
    Ren H, Ping Z, Bo W et al (2003) Multidistortion-invariant image recognition with radial harmonic Fourier moments[J]. JOSA A 20(4):631–637MathSciNetCrossRefGoogle Scholar
  34. 34.
    Ryu SJ, Kirchner M, Lee MJ et al (2013) Rotation invariant localization of duplicated image regions based on Zernike moments[J]. IEEE Transactions on Information Forensics and Security 8(8):1355–1370CrossRefGoogle Scholar
  35. 35.
    Thirunavukkarasu V, Kumar J S, Chae G S, et al (2017) Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering[J]. Wireless Personal Communications, 2017:1–19Google Scholar
  36. 36.
    Üstübi̇oğlu B, Ayas S, Doğan H, et al (2015) Image forgery detection based on Colour SIFT[C]//Signal Processing and Communications Applications Conference (SIU), 2015 23th. IEEE, 2015: 1741–1744Google Scholar
  37. 37.
    Wang J, Liu G, Li H et al (2009) Detection of image region duplication forgery using model with circle block[C]//multimedia information networking and security, 2009. MINES'09. International conference on. IEEE 1:25–29Google Scholar
  38. 38.
    Warif NBA, Wahab AWA, Idris MYI et al (2016) Copy-move forgery detection: survey, challenges and future directions[J]. Journal of Network & Computer Applications 75:259–278CrossRefGoogle Scholar
  39. 39.
    Wo Y, Yang K, Han G et al (2016) Copy–move forgery detection based on multi-radius PCET[J]. IET Image Process 11(2):99–108CrossRefGoogle Scholar
  40. 40.
    Xiang-yang W, Wei-yi L, Hong-ying Y et al (2015) Invariant quaternion radial harmonic Fourier moments for color image retrieval[J]. Opt Laser Technol 66:78–88CrossRefGoogle Scholar
  41. 41.
    Yang B, Sun X, Guo H, et al (2017) A copy-move forgery detection method based on CMFD-SIFT[J]. Multimedia Tools and Applications, 2017: 1–19Google Scholar
  42. 42.
    Zhao J, Zhao W (2013) Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns[J]. Mathematical Problems in Engineering, (2013–12-29), 2013, 2013(4):1–12Google Scholar
  43. 43.
    Zhao F, Shi W, Qin B, et al (2016) Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection[C]//Security, Privacy, and Anonymity in Computation, Communication, and Storage: 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings 9. Springer International Publishing, 2016: 478–490Google Scholar
  44. 44.
    Zheng J, Liu Y, Ren J et al (2016) Fusion of block and keypoints based approaches for effective copy-move image forgery detection[J]. Multidim Syst Sign Process 27(4):989–1005MathSciNetCrossRefGoogle Scholar
  45. 45.
    Zhu Y, Shen X, Chen H (2016) Copy-move forgery detection based on scaled ORB[J]. Multimedia Tools & Applications 75(6):3221–3233CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer and Information TechnologyLiaoning Normal UniversityDalianPeople’s Republic of China

Personalised recommendations