Nonlinear Dynamics

, Volume 84, Issue 1, pp 189–202 | Cite as

Detection of copy–move forgery using discrete analytical Fourier–Mellin transform

Original Paper

Abstract

In recent years, digital image processing has become commonplace with growing powerful and available image editing software. People without any professional technique can also manipulate and forge digital images easily. One of the most popular manners of digital image forgeries is the copy–move image forgery. Extensive researches in detecting copy–move forgery have made a deal of achievements, but most presented methods based on these researches have been only focus on some simple composite forgeries and not able to detect different types of post-processed forgeries. In this paper, we aim to deal with the post-processed forgery operations and scenarios, mainly geometric distortion. We introduce analytical Fourier–Mellin transform (AFMT) and focus on its discretization. We propose discrete analytical Fourier–Mellin transform (DAFMT). We also pay attention to high performance of DAFMT in detecting the copy–move image forgeries. Due to the AFMT described in polar coordinate, so we need to convert coordinate system from polar to Cartesian coordinates. To be computed conveniently, we define an auxiliary disk template to accomplish this conversion. We devote to the use of our proposed DAFMT in detection of image forgeries. A great deal of researches and experiments show that the proposed DAFMT can effectively resist translation, rotation, scaling, and added Gaussian noise operations. Compared with other relevant up-to-date methods, experiments also prove that DAFMT has made a progress in detecting and identifying the forgery images which are suffered from geometric distortion operations.

Keywords

Copy–move forgery Post-processed forgery operations  Geometric distortions Discrete analytical Fourier–Mellin transform A disk template 

References

  1. 1.
    Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)CrossRefGoogle Scholar
  2. 2.
    Kakar, P., Sudha, N.: Detecting copy-paste forgeries using transform-invariant features. In: Proceedings of the International Symposium on Consumer Electronics, pp: 58–61Google Scholar
  3. 3.
    Fridrich, J., Soukal, D., Lukás, J.: Authentication of copy-move forgery in digital images. In: Proceedings of the Digital Forensic Research Workshop, pp. 55–61 (2003)Google Scholar
  4. 4.
    Popescu, A.C.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(2), 758–767 (2005)MathSciNetCrossRefGoogle Scholar
  5. 5.
    He, K.X., Wang, Q., Xiao, Y.C., He, F., Wang, X.B.: A denoising algorithm based on nonsubsampled contourlet transform and two-dimensional principle component analysis. In: Proceedings of the 3rd International Conference on Computer Technology and Development (ICCTD), pp. 261–267 (2011)Google Scholar
  6. 6.
    Kashyap, A., Joshi, S.D.: Detection of copy-move forgery using wavelet decomposition. In: Proceedings of the International Conference on Signal Processing and Communication (ICSC), pp. 396–400 (2013)Google Scholar
  7. 7.
    Ghorbani, M., Firouzmand, M., Faraahi, A.: DWT-DCT (QCD) based copy-move image forgery detection. In: 18th International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 1–4 (2011)Google Scholar
  8. 8.
    Hu, M.K.: Visual pattern recognition by moment invariants. IEEE Trans. Info. Theory 8(2), 179–187 (1962)CrossRefMATHGoogle Scholar
  9. 9.
    Liao, S., Pawlak, M.: On the accuracy of Zernike moments for image analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(12), 1358–1364 (1998)CrossRefGoogle Scholar
  10. 10.
    Yap, P.T., Jiang, X.D., Kot, A.C.: Two-dimensional polar harmonic transforms for invariant image representation. IEEE Trans. Pattern Anal. Mach. Intell. 32(7), 1260–1270 (2010)Google Scholar
  11. 11.
    Amerini, I., Ballan, L., Caldelli, R., Bimbo, A.D.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Info. Forensics Secur. 6(9), 1099–1110 (2011)CrossRefGoogle Scholar
  12. 12.
    Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1053–1056 (2009)Google Scholar
  13. 13.
    Jothimani, S., Betty, P.: Image authentication using global and local features. In: International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), pp. 1–5 (2014)Google Scholar
  14. 14.
    Zhao, Y.J., Belkasim, S.: Improving stability and invariance of Cartesian Zernike moments. In: Proceedings of the Southwest Symposium on Image Analysis and Interpretation (SSIAI), pp. 61–64 (2012)Google Scholar
  15. 15.
    Ryu, S.J., Kirchner, M., Lee, M.J., Lee, H.K.: Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Info. Forensics Secur. 8(8), 1355–1370 (2013)CrossRefGoogle Scholar
  16. 16.
    Li, L.D., Li, S.S., Wang, J.: Copy-move forgery detection based on PHT. In: Proceedings of the World Congress on Information and Communication Technologies (WICT), pp. 1061–1065 (2012)Google Scholar
  17. 17.
    Li, Y.N.: Quaternion polar harmonic transforms for color images. IEEE Signal Process. Lett. 20(8), 803–807 (2013)CrossRefGoogle Scholar
  18. 18.
    Urooj, S., Singh, S.P.: Rotation invariant detection of benign and malignant masses using pht. In: Proceedings of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1627-1632 (2015)Google Scholar
  19. 19.
    Zhou L.N., Guo Y.B., You X.G.: Blind copy-paste detection using improved SIFT ring descriptor. In: Proceeding of 10th International Workshop, Digital Forensics and Watermarking (IWDW), pp. 257–267 (2011)Google Scholar
  20. 20.
    Sellami, M., Ghorbe, F.: An invariant similarity registration algorithm based on the analytical Fourier–Mellin transform. In: Proceedings of the 20th European Signal Processing Conference (EUSIPCO), pp. 390–394 (2012)Google Scholar
  21. 21.
    Luo, W.Q., Huang, J.W., Qiu, G.P.: Robust detection of region duplication forgery in digital image. Chin. J. Comput. 30(11), 1998–2007 (2007)Google Scholar
  22. 22.
    Kakar, P., Sudha, N.: Exposing post processed copy-paste forgeries through transform-invariant features. IEEE Trans. Info. Forensics Secur. 7(3), 1018–1028 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2015

Authors and Affiliations

  1. 1.School of Information EngineeringGuangdong Mechanical and Electrical CollegeGuangzhouPeople’s Republic of China
  2. 2.Department of Information Science and TechnologyGuangdong University of Foreign Studies South China Business CollegeGuangzhouPeople’s Republic of China

Personalised recommendations