Skip to main content

Detection of Image Forgery Based on Improved PCA-SIFT

  • Conference paper
  • First Online:
Book cover Computer Engineering and Networking

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 277))

Abstract

In view of the problem existing in abusive using of image copy-move forgeries, this paper proposes an image forensics algorithm for detecting copy-move forgery based on improved PCA-SIFT. The present method works first by extracting features of an image and then reducing its dimensionality, and the method uses k-nearest neighbor to operate forgery detection. Owing to the similarity between pasted region and copied region, the descriptors are then matched between each other to seek for any possible forgery in images. Extensive experimental results are presented to confirm that the algorithm is able to precisely individuate the tampered image and quantify its robustness and sensitivity to image post-processing and offer a considerable improvement in time efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gavin, L., Shih, F. Y., & Liao, H.-Y. M. (2013). An efficient expanding block algorithm for image copy-move forgery detection. Information Sciences, 239, 253–265.

    Article  Google Scholar 

  2. Christlein, V., Riess, C., Jordan, J., Riess, C., & Angelopoulou, E. (2012). An evaluation of popular copy-move forgery detection approaches. Information Forensics and Security, 7(6), 1841–1854.

    Article  Google Scholar 

  3. Jessica, Fridrich., David, Soukal., Jan, Lukas. (2003). Detection of copy–move forgery in digital images. Proceedings of Digital Forensic Research Workshop (DFRWS’03) (pp. 55–61). Cleveland, OH: IEEE Computer Society.

    Google Scholar 

  4. Babak, M., & Stanislav, S. (2007). Detection of copy–move forgery using a method based on blur moment invariants. Forensic Science International, 171(2–3), 180–189.

    Google Scholar 

  5. Mohammad Akbarpour, S., Mohd. Aizaini, M., Mohd. Foad, R., & Babak, M. (2013). Efficient image duplicated region detection model using sequential block clustering. Digital Investigation, 10(1), 73–84.

    Article  Google Scholar 

  6. Hailing, Huang., Weiqiang, Guo., Yu, Zhang. (2008). Detection of copy-move forgery in digital images using SIFT algorithm. Proceedings of IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA’08) (vol. 2, pp. 272–276). Wuhan: IEEE Computer Society.

    Google Scholar 

  7. Lowe, D. G. (2004). Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60(2), 91–110.

    Article  Google Scholar 

  8. Yan, Ke., Rahul, Sukthankar. (2004). PCA-SIFT: A more distinctive representation for local image descriptors. Proceedings of 2004 I.E. Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’04) (vol. 2, pp. 506–513). Washington, DC: IEEE Computer Society.

    Google Scholar 

Download references

Acknowledgements

Project supported by the National Science and Technology Support Plan Project (No. 2013BAK07B04) and Natural Science Foundation of Hebei Province. China (No. F2013201170).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kunlun Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, K., Li, H., Yang, B., Meng, Q., Luo, S. (2014). Detection of Image Forgery Based on Improved PCA-SIFT. In: Wong, W.E., Zhu, T. (eds) Computer Engineering and Networking. Lecture Notes in Electrical Engineering, vol 277. Springer, Cham. https://doi.org/10.1007/978-3-319-01766-2_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01766-2_78

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01765-5

  • Online ISBN: 978-3-319-01766-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics