Robust Copy-Move Forgery Detection Based on Dual-Transform

Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 132)

Abstract

With the increasing popularity of digital media and the ubiquitous availability of media editing software, innocuous multimedia are easily tampered for malicious purposes. Copy-move forgery is one important category of image forgery, in which a part of an image is duplicated, and substitutes another part of the same image at a different location. Many schemes have been proposed to detect and locate the forged regions. However, these schemes fail when the copied region is affected by post-processing operations before being pasted. To rectify the problem and further improve the detection accuracy, we propose a robust copy-move forgery detection method based on dual-transform to detect such specific artifacts, in which a cascade of Radon transform (RT) and Discrete Cosine Transform (DCT) is used. It will be shown that the dual-transform coefficients well conform the efficient assumption and therefore leads to more robust feature extraction results. Experimental results demonstrate that our method is robust not only to noise contamination, blurring, and JPEG compression, but also to region scaling, rotation and flipping, respectively.

Keywords

Passive image forensics Copy-move forgery Dual-transform Duplicated region detection Mixture Post-processing 

References

  1. 1.
    Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. J. Forensic Sci. Int. 206(13), 178–184 (2011)CrossRefGoogle Scholar
  2. 2.
    Khan, S., Kulkarni, A.: Reduced time complexity for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Appl. 6(7), 31–36 (2010)Google Scholar
  3. 3.
    Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. J. Forensic Sci. Int. 171(27), 180–189 (2007)CrossRefGoogle Scholar
  4. 4.
    Ryu, S.-J., Lee, M.-J., Lee, H.-K.: Detection of copy-rotate-move forgery using zernike moments. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 51–65. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  5. 5.
    Liu, G.J., Wang, J.W., Lian, S.G., Wang, Z.Q.: A passive image authentication scheme for detecting region duplication forgery with rotation. J. Netw. Comput. Appl. 34(5), 1557–1565 (2011)CrossRefGoogle Scholar
  6. 6.
    Fiffy, M.A.: The radon transform and some of its applications. J. Mod. Optics. 32(1), 3–4 (1985)Google Scholar
  7. 7.
    Khayam, S.A.: The Discrete Cosine Transform (DCT): Theory and Application. J. Inf. Theor. Coding, 1–31 (2003)Google Scholar
  8. 8.
    Fridrich, A.: Detection of copy-move forgery in digital images. In: Proceedings of the Digital Forensic Research Workshop, Cleveland OH, USA (2003)Google Scholar
  9. 9.
    Li, L., Li, S., Zhu, H.: An efficient scheme for detecting copy-move forged images by local binary patterns. J. Inf. Hiding Multimedia Signal Process. 4(1), 46–56 (2013)Google Scholar
  10. 10.
    Christlein, V., Riess, R., Angelopoulou, E.: On rotation invariance on copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security, pp. 1–6 (2010)Google Scholar
  11. 11.
    Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)CrossRefGoogle Scholar
  12. 12.
    Chrislein, V., Riess, R., Jordan, J., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRefGoogle Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014

Authors and Affiliations

  1. 1.Department of Information SecurityPukyong National UniversityBusanRepublic of Korea
  2. 2.Department of IT Convergence and Application EngineeringPukyong National UniversityBusanRepublic of Korea

Personalised recommendations