Abstract
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary. Copy-move is an important branch of multimedia forensics. In this paper, a novel copy-move forgery detection scheme using combined features and transitive matching is proposed. First, SIFT and LIOP are extracted as combined features from the input image. Second, transitive matching is used to improve the matching relationship. Third, a filtering approach using image segmentation is proposed to filter out false matches. Fourth, affine transformations are estimated between these image patches. Finally, duplicated regions are located based on those affine transformations. The experimental results demonstrate that the proposed scheme can achieve much better detection results on the public database under various attacks.
Similar content being viewed by others
References
Achanta R, Shaji A, Smith K, Lucchi A, Fua P, Süsstrunk S. (2012) Slic superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274–2282
Alcantarilla PF, Bartoli A, Davison AJ (2012) Kaze features. In: European conference on computer vision(ECCV), Florence, Italy, pp 214–227
Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099–1110
Amerini I, Ballan L, Caldelli R, Bimbo AD, Tongo LD, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659–669
Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process PP(99):1–1
Bay H, Ess A, Tuytelaars T, Gool LV (2008) SURF: speeded up robust features. Comput Vis Image Underst 110(3):346–359
Bedi G, Venayagamoorthy GK, Singh R, Brooks R, Wang KC (2018) Review of internet of things (iot) in electric power and energy systems. IEEE Int Things J PP(99):1–1
Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: IEEE International conference on acoustics, speech and signal processing(ICASSP), Prague, Czech Republic, pp 1880–1883
Chen J, Lu W, Fang Y, Liu X, Yeung Y, Yingjie X (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55:149–156
Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C, Zhang Y (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Continua 55(2):201–211
Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254
Chen X, Weng J, Lu W, Xu J (2018) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell PP(99):1–1
Chen X, Weng J, Lu W, Xu J, Weng J (2017) Deep manifold learning combined with convolutional neural networks for action recognition. IEEE Trans Neural Netw Learn Syst PP(99):1–15
Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: EEE International workshop on information forensics and security (WIFS), Seattle, WA, USA , pp 1–6
Christlein V, Riess C, Jordan J, Riess C (2012) Angelopoulou, e.: an evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841–1854
Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensic Secur 10(11):2284–2297
Fang W, Li Y, Zhang H, Xiong N, Lai J, Vasilakos AV (2014) On the throughput-energy tradeoff for data transmission between cloud and mobile devices. Inf Sci 283(283):79–93
Fang Y, Fang Z, Yuan F, Yang Y, Yang S, Xiong NN (2017) Optimized multioperator image retargeting based on perceptual similarity measure. IEEE Trans Syst Man Cybern Syst 47(11):2956–2966
Feng B, Lu W, Sun W (2014) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensic Secur 10(2):243–255
Feng B, Lu W, Sun W (2015) Binary image steganalysis based on pixel mesh markov transition matrix. J Vis Commun Image Represent 26:284–295
Feng B, Lu W, Sun W (2015) Novel steganographic method based on generalized k-distance n-dimensional pixel matching. Multimed Tools Appl 74(21):9623–9646
Feng B, Lu W, Sun W, Huang J, Shi YQ (2016) Robust image watermarking based on tucker decomposition and adaptive-lattice quantization index modulation. Signal Process Image Commun 41(C):1–14
Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46:119–127. https://www.sciencedirect.com/science/article/pii/S1047320317300081
Feng B, Weng J, Lu W, Pei B (2017) Multiple watermarking using multilevel quantization index modulation. In: International workshop on digital watermarking, Beijing, China, pp 312–326
Ferreira A, Felipussi SC, Alfaro C, Fonseca P, Vargasmunoz JE, Dos Santos JA, Rocha A (2016) Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans Image Process 25(10):4729–4742
Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395
Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. In: Proceeding of digital forensic research workshop, Cleveland, OH, USA, pp 19–23
Gao L, Yu F, Chen Q, Xiong N (2016) Consistency maintenance of do and undo/redo operations in real-time collaborative bitmap editing systems. Clust Comput 19(1):255–267
Ghorbani M, Firouzmand M, Faraahi A (2011) DWT-DCT (QCD) based copy-move image forgery detection. In: International conference on systems, signals and image processing, pp 1–4. Sarajevo
Gui J, Hui L, Xiong N (2017) A game-based localized multi-objective topology control scheme in heterogeneous wireless networks. IEEE Access 5(99):2396–2416
Harris CG, Stephens MJ (1988) A combined corner and edge detector. In: Alvey vision conference, pp 147–151
Hu C, Xu Z, Liu Y, Mei L, Chen L, Luo X (2014) Semantic link network-based model for organizing multimedia big data. IEEE Trans Emerg Topics Comput 2(3):376–387
Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia workshop on computational intelligence and industrial application, pp 272–276
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1-3):178–184
Jin G, Wan X (2017) An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage. Signal Process Image Commun 57:113– 125
Lee JC, Chang CP, Chen WK (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci 321(C):250–262
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10(3):507–518
Li J, Lu W (2016) Blind image motion deblurring with L0-regularized priors. J Vis Commun Image Represent 40:14–23
Li J, Lu W, Weng J, Mao Y, Li G (2018) Double jpeg compression detection based on block statistics. Multimed Tools Appl 77(24):1–16
Li J, Yang F, Lu W, Sun W (2016) Keypoint-based copy-move detection scheme by adopting mscrs and improved feature matching. Multimed Tools Appl 76(20):1–15
Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1-3):59
Lin B, Guo W, Xiong N, Chen G, Vasilakos AV, Zhang H (2016) A pretreatment workflow scheduling approach for big data applications in multicloud environments. IEEE Trans Netw Serv Manag 13(3):581–594
Lin C, Lu W, Sun W, Zeng J, Xu T, Lai JH (2017) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tools Appl 77(11):1–18
Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110
Lu X, Tu L, Zhou X, Xiong N, Sun L (2017) Vimedianet: an emulation system for interactive multimedia based telepresence services. J Supercomput 73(8):3562–3578
Lu Z, Lin YR, Huang X, Xiong N, Fang Z (2017) Visual topic discovering, tracking and summarization from social media streams. Multimed Tools Appl 76(8):1–25
Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans Circ Syst Video Technol PP(99): 1–1
Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171:180–189
Melro LS, Jensen LR (2017) Influence of functionalization on the structural and mechanical properties of graphene. Comput Mater Continua 53(2):111–131
Nelson B, Phillips A, Steuart C (2015) Guide to computer forensics and investigations delmar learning
Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensic Secur 5(4):857–867
Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Tech. Rep. TR2004-515, Department of Computer Science Dartmouth College
Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive over-segmentation and feature points matching. IEEE Trans Inf Forensic Secur 10 (8):1705–1716
Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensic Secur 8(8):1355–1370
Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. In: IEEE International workshop on information hiding(IH). Springer, Berlin, pp 51–65
Shivakumar BL, Baboo S (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues 8(4):199–205
Shu L, Fang Y, Fang Z, Yang Y, Fei F, Xiong N (2016) A novel objective quality assessment for super-resolution images. Int J Sig Process 9(5):297–308
Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29(C):16–32
Vedaldi A, Fulkerson B (2010) Vlfeat: an open and portable library of computer vision algorithms. In: International conference on multimedea, Firenze, Italy, pp 1469–1472
Wang J, Li T, Shi YQ, Lian S, Ye J (2016) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):1–17
Wang Y, Chen K, Yu J, Xiong N, Leung H, Zhou H, Zhu L (2017) Dynamic propagation characteristics estimation and tracking based on an em-ekf algorithm in time-variant mimo channel. Inf Sci 408(C):70–83
Wang Z, Fan B, Wu F (2011) Local intensity order pattern for feature description. In: IEEE International conference on computer vision (ICCV), pp 603–610
Warif NBA, Wahab AWA, Idris MYI, Salleh R, Othman F (2017) SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent 46:219–232
Wu P, Xiao F, Sha C, Huang H, Wang R, Xiong N (2017) Node scheduling strategies for achieving full-view area coverage in camera sensor networks. Sensors 17(6):1303
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of lsb matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Xia Z, Xiong NN, Vasilakos AV, Sun X (2017) Epcbir: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195–204
Xiong N, Jia X, Yang LT, Vasilakos AV, Li Y, Pan Y (2010) A distributed efficient flow control scheme for multirate multicast networks. IEEE Trans Parallel Distrib Syst 21(9):1254–1266
Xiong N, Liu RW, Liang M, Wu D, Liu Z, Wu H (2017) Effective alternating direction optimization methods for sparsity-constrained blind image deblurring. Sensors 17(1):1–27
Xiong N, Vasilakos AV, Yang LT, Song L, Pan Y, Kannan R, Li Y (2009) Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J Sel Areas Commun 27(4):495–509
Xiong N, Vasilakos AV, Yang LT, Wang CX, Kannan R, Chang CC, Pan Y (2009) A novel self-tuning feedback controller for active queue management supporting tcp flows. Inf Sci 180(11):2249–2263
Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: International conference on multimedia information networking and security (MINES), Nanjing, China, pp 889– 892
Yang B, Sun X, Chen X, Zhang J, Li X (2013) An efficient forensic method for copy-move forgery detection based on dwt-fwht. Radioengineering 22(4):1098–1105
Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59:73–83
Yang Y, Tong S, Huang S, Lin P (2014) Dual-tree complex wavelet transform and image block residual-based multi-focus image fusion in visual sensor networks. Sensors 14(12):22,408–22,430
Yang Z, Ma L, Ma Q, Cui J, Nie Y, Dong H, An X (2017) Multiscale nonlinear thermo-mechanical coupling analysis of composite structures with quasi-periodic properties. Comput Mater Continua 53(3):219–248
Zhang C, Wu D, Liu RW, Xiong N (2015) Non-local regularized variational model for image deblurring under mixed gaussian-impulse noise. J Int Technol 16(7):1301–1319
Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on l0-regularization and kernel shape optimization. Multimed Tools Appl 77(20):1–19
Zhang H, Liu RW, Wu D, Liu Y, Xiong NN (2016) Non-convex total generalized variation with spatially adaptive regularization parameters for edge-preserving image restoration. J Int Technol 17(7):1391–1403
Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimed Tools Appl 77(23):1–22
Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458
Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Sig Process 146:1–1
Zheng H, Guo W, Xiong N (2017) A kernel-based compressive sensing approach for mobile data gathering in wireless sensor network systems. IEEE Trans Syst Man Cybern Syst PP(99):1–13
Zhou P, Zhou Y, Wu D, Jin H (2016) Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks. IEEE Trans Multimed 18(6):1217–1229
Zhou Y, Zhang D, Xiong N (2017) Post-cloud computing paradigms: a survey and comparison. Tsinghua Sci Technol 22(6):714–732
Acknowledgments
This work is supported by the National Natural Science Foundation of China (No. U1736118), the Natural Science Foundation of Guangdong (No. 2016A030313350), the Special Funds for Science and Technology Development of Guangdong (No. 2016KZ010103), the Key Project of Scientific Research Plan of Guangzhou (No. 201804020068), the Fundamental Research Funds for the Central Universities (No. 16lgjc83 and No. 17lgjc45), the Science and Technology Planning Project of Guangdong Province (Grant No.2017A040405051).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lin, C., Lu, W., Huang, X. et al. Copy-move forgery detection using combined features and transitive matching. Multimed Tools Appl 78, 30081–30096 (2019). https://doi.org/10.1007/s11042-018-6922-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6922-4