Transactions of Tianjin University

, Volume 22, Issue 2, pp 151–157 | Cite as

Image copy-move forgery detection using SURF in opponent color space

  • Jiachang Gong (巩家昌)
  • Jichang Guo (郭继昌)
Article

Abstract

Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost, they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat.

Keywords

copy-move forgery flat region color descriptor OwSURF 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Birajdar G K, Mankar V H. Digital image forgery detection using passive techniques: A survey[J]. Digital Investigation, 2013, 10(3):226–245.CrossRefGoogle Scholar
  2. [2]
    Fridrich J, Goljan M, Soukal D et al. Forensic steganalysis: Determining the stego key in spatial domain steganography[C]. In: SPIE Proceedings 5681. Security Steganography & Watermarking of Multimedia Contents VII. San Jose, USA, 2005.Google Scholar
  3. [3]
    Wang Xingyuan, Zhang Jiming. A novel image authentication and recovery algorithm based on chaos and Hamming code[J]. Acta Physica Sinica, 2014, 63(2):020701(in Chinese).Google Scholar
  4. [4]
    Wang Xingyuan, Zhang Jiming. A novel image authentication and recovery algorithm based on dither and chaos[J]. Acta Physica Sinica, 2014, 63(21):210701 (in Chinese).Google Scholar
  5. [5]
    Wang Xingyuan, Zhang Dandan, Guo Xing. Authentication and recovery of images using standard deviation[J]. Journal of Electronic Imaging, 2013, 22(3):033012.MathSciNetCrossRefGoogle Scholar
  6. [6]
    Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images[C]. In: Proceedings of Digital Forensic Research Workshop. USA, 2003.Google Scholar
  7. [7]
    Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Duplicated Image Regions[R]. Department of Computer Science, Dartmouth College, USA, 2004.Google Scholar
  8. [8]
    Ryu S J, Lee M J, Lee H K. Detection of copy-rotate-move forgery using Zernike moments[C]. In: Proceedings of Information Hiding Conference. Canada, 2010.Google Scholar
  9. [9]
    Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2):91–110.CrossRefGoogle Scholar
  10. [10]
    Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm[C]. In: Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Wuhan, China, 2008.Google Scholar
  11. [11]
    Pan X, Lyu S. Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):857–867.CrossRefGoogle Scholar
  12. [12]
    Amerini I, Ballan L, Caldelli R et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):1099–1110.CrossRefGoogle Scholar
  13. [13]
    Herbert Bay, Andreas Ess, Tinne Tuytelaars et al. Speededup robust features(SURF)[J]. Computer Vision and Image Understanding, 2008, 110(3):346–359.CrossRefGoogle Scholar
  14. [14]
    Bo X, Wang J, Liu G et al. Image copy-move forgery detection based on SURF[J]. In: 2010 International Conference on Multimedia Information Networking and Security. Nanjing, China, 2010.Google Scholar
  15. [15]
    Shivakumar B L, Baboo S S. Detection of region duplication forgery in digital images using SURF[J]. International Journal of Computer Science Issues, 2011, 8(4):199–205.Google Scholar
  16. [16]
    Gong Jiachang, Guo Jichang. Image copy-move forgeries detection using CSURF[J]. Journal of Tianjin University (Science and Technology), 2014, 47(9):759–764(in Chinese).Google Scholar
  17. [17]
    van de Weijer J, Gevers T. Boosting saliency in color image features[C]. In: IEEE Conference on Computer Vision and Pattern Recognition. San Diego, USA, 2005.Google Scholar
  18. [18]
    van de Sande K E A, Gevers T, Snoek C G M. Evaluating color descriptors for object and scene recognition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(9):1582–1596.CrossRefGoogle Scholar
  19. [19]
    Hastie T, Tibshirani R, Friedman J. The Elements of Statistical Learning[M]. Springer-Verlag, New York, USA, 2009.CrossRefMATHGoogle Scholar
  20. [20]
    Fischler M A, Bolles R C. Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography [J]. Communication of ACM, 1981, 24(6):381–395.MathSciNetCrossRefGoogle Scholar
  21. [21]
    Christlein V, Riess C, Jordan J et al. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6):1841–1854.CrossRefGoogle Scholar
  22. [22]
    Franzen R. Kodak Lossless True Color Image Suite [EB/OL). http://r0k. us/graphics/kodak/, 2012.Google Scholar

Copyright information

© Tianjin University and Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Jiachang Gong (巩家昌)
    • 1
  • Jichang Guo (郭继昌)
    • 1
  1. 1.School of Electronic Information EngineeringTianjin UniversityTianjinChina

Personalised recommendations