Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 18, pp 25591–25609 | Cite as

A probabilistic framework for copy-move forgery detection based on Markov Random Field

  • Behnaz Elhaminia
  • Ahad HaratiEmail author
  • Amirhossein Taherinia
Article
  • 73 Downloads

Abstract

Copy-move forgery is one of the most common kind of image tampering where some part of an image is copied, may be with minor modifications, pasted to another area of the same image. With the growing usage of images in todays life, image authenticity has become a vital issue and consequently many image forgery detection techniques have been presented. In this paper, for the first time, we propose to treat copy-move forgery detection as labeling problem in a Markov Random Field. To gain a proper balance between precision and speed, an over segmentation is performed as a preprocessing step to obtain superpixels which are then regarded as nodes of the markov network. Intelligent selection of unary and binary potentials let the maximum a posteriori labeling to be a precise map of the forged regions. Qualitative and quantitative comparison with the state-of-the-art methods using public benchmarks demonstrate that the proposed method can improve precision while keeping the processing demands low.

Keywords

Copy-move forgery detection Image forensics Markov random filed Binary labeling 

Notes

References

  1. 1.
    Achanta R, Shaji A, Smith K, Lucchi A, Fua P (2010) SLIC Superpixels EPFL Technical Report 149300Google Scholar
  2. 2.
    Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Applic 30(1):183–192CrossRefGoogle Scholar
  3. 3.
    Amerini I, Ballan L, Caldelli R, Del-Bimo A, Serra G (2011) A SIFT-Based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Secur 6(3):1099–1110CrossRefGoogle Scholar
  4. 4.
    Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRefGoogle Scholar
  5. 5.
    Bashar M, Knoda N, Ohnishi K, Mori (2010) Exploring duplicated regions in natural images, IEEE Transactions on Image Processing in pressGoogle Scholar
  6. 6.
    Bay H, Ess A, Tuytelaars T, Van Gool L (2008) peeded-up robust features (SURF). Comput Vis Image Understand 110(3):346–359CrossRefGoogle Scholar
  7. 7.
    Bayram S, Taha Sencar H, Memon N (2009) In IEEE ICASSP, Washington, DC, USAGoogle Scholar
  8. 8.
    Besag J (1986) On the statistical analysis of dirty pictures. J R Statist Soc 48 (3):259–302MathSciNetzbMATHGoogle Scholar
  9. 9.
    BhavyaBhanu MP, ArunKumar MN (2017) Copy-move forgery detection using segmentation. In: 11th International Conference on Intelligent Systems and Control (ISCO), 5–6 Jan. 2017, Coimbatore, pp 228–224Google Scholar
  10. 10.
    Bi X, Pun C-M, Yuan X-C (2018) Multi-scale feature extraction and adaptive matching for copy-move forgery detection. Multimed Tools Appl 77:363–385CrossRefGoogle Scholar
  11. 11.
    Chen B, Yu M, Su Q, Li L (2018) Fractional quaternion cosine transform and its application in color image copy-move forgery detection. Multimedia Tools and ApplicationsGoogle Scholar
  12. 12.
    Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD. IET Image Process 11(5):301–309CrossRefGoogle Scholar
  13. 13.
    Geman S, Geman D (1984) Stochastic relaxation, Gibbs distributions and the Bayesian restoration of images. IEEE Trans Pattern Anal Mach Intell 6:721–741CrossRefzbMATHGoogle Scholar
  14. 14.
    Haghighi B, Taherinia AH, Harati A (2018) TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49–64CrossRefGoogle Scholar
  15. 15.
    Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206:178–184CrossRefGoogle Scholar
  16. 16.
    Koller D, Friedman N (2009) Probabilistic graphical models, Massachusetts Institute of TechnologyGoogle Scholar
  17. 17.
    Lee J, Chang CH, Chen W (2015) Detection of copy–move image forgery using histogram of Information SciencesGoogle Scholar
  18. 18.
    Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRefGoogle Scholar
  19. 19.
    Li L, Li S, Zhu H, Chu S-C, Roddick J F, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimedia Signal Process 4(1):46–56Google Scholar
  20. 20.
    Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224:59–67CrossRefGoogle Scholar
  21. 21.
    Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYGoogle Scholar
  22. 22.
    Lowe D (2004) Distinctive image features. International Journal of Computer VisionGoogle Scholar
  23. 23.
    Minakshi K (2003) Digital image processing. In: Satellite remote sensing and GIS applications in agricultural meteorology, world meteorological organization publishing, pp 81–102Google Scholar
  24. 24.
    Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRefGoogle Scholar
  25. 25.
    Park C, Choeh JY (2017) Fast and robust copy-move forgery detection based on scale-space representation. Multimed Tools Appl 77(13):16795–16811CrossRefGoogle Scholar
  26. 26.
    Rangarajan A, Chellappa R (1995) Markov random fileds in image processing, Department of Computer Science, Yale UniversityGoogle Scholar
  27. 27.
    Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRefGoogle Scholar
  28. 28.
    Sekhar R, Shaji R (2016) A study on segmentation-based copy-move forgery detection using DAISY descriptor. In: Proceedings of the international conference on soft computing systems, pp 223–233Google Scholar
  29. 29.
    Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: Exploring image. J Vis Commun Image R 29(C):16–32CrossRefGoogle Scholar
  30. 30.
    Soni B, Das PK, Thounaojam DM (2019) Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. Journal of Information Security and ApplicationsGoogle Scholar
  31. 31.
    Swaminathan A, Wu M, Liu KR (2008) Digital image forensics via intrinsic fingerprints. IEEE Trans Inf Forensics Secur 3:101–117CrossRefGoogle Scholar
  32. 32.
    Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD - new database for copy-move forgery detection. In: ELMAR, 55th international symposium, pp 49–54Google Scholar
  33. 33.
    Vedaldi A, Fulkerson B VLFeat : An open and portabale library of computer vision algorithms, 2008. [Online]. Available: http://www.vlfeat.org
  34. 34.
    Satheesh S, Thomas A, Devasia A (2017) Image forensic, copy-move forgery, SURF. Int J Eng Trends Technol (IJETT) V45(6):285–287Google Scholar
  35. 35.
    Yang B, Sun X, Guo H, Xia ZH, Chen X (2018) A copy-move forgery detection method based on CMFD-SIFT. Multimed Tools Appl 77(1):837–855CrossRefGoogle Scholar
  36. 36.
    Yanga F, Lia J, Lua W, Wengb J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intel 59:73–83CrossRefGoogle Scholar
  37. 37.
    Yeap YY, Sheikh UU, Rahman A (2018) Image forensic for digital image copy move forgery detection. In: Signal processing and its applications (CSPA), Malaysia, MalaysiaGoogle Scholar
  38. 38.
    Zandi M, Aznave A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur 11(11):2499–2512CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Behnaz Elhaminia
    • 1
  • Ahad Harati
    • 1
    Email author
  • Amirhossein Taherinia
    • 1
  1. 1.Department of Computer Engineering, Faculty of EngineeringFerdowsi University of MashhadMashhadIran

Personalised recommendations