Rotational copy-move forgery detection using SIFT and region growing strategies

  • Chien-Chang ChenEmail author
  • Wei-Yu Lu
  • Chung-Hsuan Chou


The proposed scheme detects the copy–move forgery regions using SIFT, invariant moments calculation, and the region growing strategy. First, the SIFT-based keypoints are acquired as the significant features of an image. Second, pairs of keypoints with closed scales are examined to identify all possible pair blocks of the copy–move regions. Third, the orientations for each pair of matched keypoints are adjusted to have identical orientation. Lastly, the copy–move regions are acquired using the region growing technique, and invariant moment features are applied to each pair of matched blocks. Experimental results show that the proposed scheme efficiently and effectively detects rotational copy-move duplicated regions. Moreover, the proposed computation time is proportional to the number of keypoints and the size of the copy–move forgery regions.


Forgery duplication Invariant moment Keypoints Region growing 



This paper was partially supported by the National Science Council of the Republic of China under contract MOST 106-2221-E-032-057.


  1. 1.
    Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284–295CrossRefGoogle Scholar
  2. 2.
    Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inform Foren Sec 6:1099–1110CrossRefGoogle Scholar
  3. 3.
    Amerini I, Ballan L, Caldelli R, Del Bimbo A, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28:659–669CrossRefGoogle Scholar
  4. 4.
    Bi X, Pun C, Yuan X (2016) Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci 345:226–242CrossRefGoogle Scholar
  5. 5.
    Bi X, Pun CM, Yuan XC (2018) Multi-scale feature extraction and adaptive matching for copy-move forgery detection. Multimed Tools Appl 77(1):363–385CrossRefGoogle Scholar
  6. 6.
    Bin Y, Sun X, Guo H, Xia Z, Chen X (2017) A copy-move forgery detection method based on CMFD-SIFT. Multimed Tools Appl 2017:1–19Google Scholar
  7. 7.
    Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91:1759–1770CrossRefGoogle Scholar
  8. 8.
    Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital image. Forensic Sci Int 214:33–43CrossRefGoogle Scholar
  9. 9.
    Chen CC, Wang H, Lin CS (2017) An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. Multimed Tools Appl 77(15):19327–19346CrossRefGoogle Scholar
  10. 10.
    Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inform Foren Sec 7:1841–1854CrossRefGoogle Scholar
  11. 11.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, 2nd edition, Morgan KaufmannGoogle Scholar
  12. 12.
    Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231:61–72CrossRefGoogle Scholar
  13. 13.
    Dixit R, Naskar R (2018) Copy–move forgery detection utilizing Fourier–Mellin transform log-polar features, J. Electron Imag 27(2):023007Google Scholar
  14. 14.
    Farid H (2009) A survey of image forgery detection. IEEE Signal Process Mag 2:16–25CrossRefGoogle Scholar
  15. 15.
    Fridrich J, Soukal D, Lukás J (2003) Detection of copy move forgery in digital images. Proc Conf Digital Forensic Res Workshop 55–61Google Scholar
  16. 16.
    Hu MK (1962) Visual pattern recognition by moment invariants. IRE Trans Inform Theory 8(2):179–187CrossRefGoogle Scholar
  17. 17.
    Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. IEEE Pacific-Asia Workshop Comput Intell Industr Appl 2:272–276Google Scholar
  18. 18.
    Jia S, Xu Z, Wang H, Fang C, Wang T (2018) Coarse-to-fine copy-move forgery detection for video forensics. IEEE Access 6:25323–25335CrossRefGoogle Scholar
  19. 19.
    Kobayashi M, Okabe T, Sato Y (2010) Detecting forgery from static-scene video based on inconsistency in noise level functions. IEEE Trans Inform Forensics Sec 5(4):883–892CrossRefGoogle Scholar
  20. 20.
    Lai Y, Huang T, Lin J, Lu H (2018) An improved block-based matching algorithm of copy-move forgery detection. Multimed Tools Appl 77(12):15093–15110CrossRefGoogle Scholar
  21. 21.
    Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1–3):59–67CrossRefGoogle Scholar
  22. 22.
    Li J, Li XL, Yang B, Sun XM (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inform Foren Sec 10:507–518CrossRefGoogle Scholar
  23. 23.
    Lin C, Tsay J (2014) A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit Investig 11(2):120–140CrossRefGoogle Scholar
  24. 24.
    Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181(12):108–115CrossRefGoogle Scholar
  25. 25.
    Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110MathSciNetCrossRefGoogle Scholar
  26. 26.
    Lynch G, Shih FY, Liao HM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRefGoogle Scholar
  27. 27.
    Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9:49–57CrossRefGoogle Scholar
  28. 28.
    Pan XY, Lyu SW (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forens Sec 5(4):857–867CrossRefGoogle Scholar
  29. 29.
    Popescu AC, Huang HF (2004) Exposing Digital Forgeries by detecting duplicated image regions. Department of Computer Science TR2004–515Google Scholar
  30. 30.
    Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inform Foren Sec 8:1355–1370CrossRefGoogle Scholar
  31. 31.
    Soni B, Das PK, Thounaojam DM (2018) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167–178CrossRefGoogle Scholar
  32. 32.
    Tralic D, Zupancic I, Grgic S (2013) CoMoFoD – new database for copy- move forgery detection. Proc Int Symp ELMAR, 49–54Google Scholar
  33. 33.
    Tu HK, Thuong LT, Synh HVU, Khoa HV (2015) The efficiency of applying DWT and feature extraction into copy-move images detection. Int Conf Adv Technol Commun (ATC)Google Scholar
  34. 34.
    Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158–166CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringTamkang UniversityNew Taipei CityRepublic of China

Personalised recommendations