Arabian Journal for Science and Engineering

, Volume 42, Issue 2, pp 559–565 | Cite as

Robust Region Duplication Detection on Log-Polar Domain Using Band Limitation

Research Article - Computer Engineering and Computer Science

Abstract

Region duplication is one of the image-tampering techniques in which a part of image is copied and pasted into another region of the same image. In this paper, a robust duplication detection algorithm is proposed against severe degradations such as illumination changes, blurring, large scaling, noise contamination and JPEG compression. We introduce an adaptive phase correlation scheme in the log-polar domain, which is effective to locate the most salient local feature of an image patch on frequency band. By using the information collected from the band limitation, duplicated regions can be correctly located. Our contribution is to present a robust image duplication detection algorithm which can handle large scaling manipulation while preserving detection performance under other manipulations or degradations. We perform degradation and comparison test on various tampered images, and experimental results show that the proposed algorithm achieves satisfactory performance.

Keywords

Duplication detection Log-polar domain Band limitation Scaling manipulation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fridrich, J.; Soukal, D.; Lukas, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)Google Scholar
  2. 2.
    Popescu, A.C.; Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical Report, Dartmouth College, Computer Science (2004)Google Scholar
  3. 3.
    Li, G.; Wu, Q.; Tu, D.; Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd. In: Multimedia and Expo, 2007 IEEE International Conference on. pp. 1750–1753 (2007)Google Scholar
  4. 4.
    Gul, G.; Avcibas, I.; Kurugollu, F.: SVD based image manipulation detection. In: Proceedings of the International Conference on Image Processing, ICIP 2010. September 26–29, Hong Kong, China, pp. 1765–1768 (2010)Google Scholar
  5. 5.
    Mahdian, B.; Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2–3), 180–189 (2007)CrossRefGoogle Scholar
  6. 6.
    Bayram, S.; Sencar, H.T.; Memon, N.D.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2009. 19–24 April 2009, Taipei, Taiwan, pp. 1053–1056 (2009)Google Scholar
  7. 7.
    Pan, X.; Lyu, S.: Region duplication detection using image feature matching. IEEE Trans. Inf. Forensics Secur. 5(4), 857–867 (2010)CrossRefGoogle Scholar
  8. 8.
    Ryu, S.; Lee, M.; Lee, H.: Detection of copy-rotate-move forgery using zernike moments. In: Information Hiding—12th International Conference, IH 201. Calgary, AB, Canada, June 28–30, 2010, Revised Selected Papers, pp. 51–65 (2010)Google Scholar
  9. 9.
    Bravo-Solorio, S.; Nandi, A.K.: Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Sig. Process. 91(8), 1759–1770 (2011)CrossRefMATHGoogle Scholar
  10. 10.
    Shao, H.; Yu, T.; Xu, M.; Cui, W.: Image region duplication detection based on circular window expansion and phase correlation. Forensic Sci. Int. 222(1–3), 71–82 (2012)CrossRefGoogle Scholar
  11. 11.
    Wang, T.; Tang, J.; Luo, B.: Blind detection of region duplication forgery by merging blur and affine moment invariants. In: Proceedings of the Seventh International Conference on Image and Graphics, ICIG 2013. Qingdao, China, July 26–28, 2013, pp. 258–264 (2013)Google Scholar
  12. 12.
    Chen, L.; Lu, W.; Ni, J.; Sun, W.; Huang, J.: Region duplication detection based on harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3), 244–254 (2013)CrossRefGoogle Scholar
  13. 13.
    Kuo, T.; Lo, Y.; Huang, S.: Image forgery detection for region duplication tampering. In: Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, ICME 2013. San Jose, CA, USA, July 15–19, pp. 1–6 (2013)Google Scholar
  14. 14.
    Zheng, J.; Chang, L.: Detection of region-duplication forgery in image based on key points binary descriptors. J. Inf. Comput. Sci. 11(11), 3959–3966 (2014)CrossRefGoogle Scholar
  15. 15.
    Tan, M.; Hu, Z.; Wang, B.; Zhao, J.; Wang, Y.: Robust object recognition via weakly supervised metric and template learning. Neurocomputing 181, 96–107 (2016)CrossRefGoogle Scholar
  16. 16.
    Ito, K.; Nakajima, H.; Kobayashi, K.; Aoki, T.; Higuchi, T.: A fingerprint matching algorithm using phase-only correlation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97(3), 682–691 (2004)Google Scholar
  17. 17.
    Miyazawa, K.; Ito, K.; Aoki, T.; Kobayashi, K.; Nakajima, H.: An effective approach for iris recognition using phase-based image matching. IEEE Trans. Pattern Anal. Mach. Intell. 30(10), 1741–1756 (2008)CrossRefGoogle Scholar
  18. 18.
    Sarkar, N.; Chaudhuri, B.: An efficient differential box-counting approach to compute fractal dimension of image. IEEE Trans. Syst. Man Cybern. 24(1), 115–120 (1994)CrossRefGoogle Scholar
  19. 19.
    Amerini, I.; Ballan, L.; Caldelli, R.; Bimbo, A.D.; Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3–2), 1099–1110 (2011)CrossRefGoogle Scholar

Copyright information

© King Fahd University of Petroleum & Minerals 2016

Authors and Affiliations

  1. 1.School of SINO-DUTCH Biomedical and Information EngineeringNortheastern UniversityShenyangChina
  2. 2.School of Information EngineeringShenyang UniversityShenyangChina
  3. 3.Institute of Zhejiang Radio and TV TechnologyZhejiang University of Media and CommunicationsHangzhouChina
  4. 4.School of Information Science and EngineeringShenyang University of TechnologyShenyangChina
  5. 5.School of Mechanical Engineering and AutomationNortheastern UniversityShenyangChina

Personalised recommendations