Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike Moments

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9023)


Copy-move is one of the most popular and efficient operations to create image forgery. Many passive detection techniques have been proposed to detect such a forgery in digital images. The performance of the detection algorithms depends mainly on the features used for matching image blocks or keypoints and the matching method as well. Among the existing detection algorithms, those which employ Zernike moments as features provide remarkable detection accuracy. The robustness of Zernike moments comes from the fact that they are invariant to rotation and scaling. However, Zernike moments-based algorithms can be improved further by adopting more efficient matching methods. In this paper, we propose a new matching method in order to enhance the detection accuracy. Compared to the lexicographical sorting-based matching method, the proposed method improved the detection accuracy by 40 %.


  1. 1.
    Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Signal Process.: Image Commun. 25, 389–399 (2010)Google Scholar
  2. 2.
    Normile, D.: Hwang convicted but dodges jail; stem cell research has moved on. Science 326, 650–651 (2009)CrossRefGoogle Scholar
  3. 3.
    Wade, N.: It May Look Authentic. Here’s How to Tell It Isn’t. New York Times, New York (2006) Google Scholar
  4. 4.
    Redi, J.A., Taktak, W., Dugelay, J.L.: Digital image forensics: a booklet for beginners. Multimedia Tools Appl. 51(1), 133–162 (2011)CrossRefGoogle Scholar
  5. 5.
    Liu, G., Wang, J., Lian, S., Wang, Z.: A passive image authentication scheme for detecting region-duplication forgery with rotation. J. Netw. Comput. Appl. 34, 1557–1565 (2010)CrossRefGoogle Scholar
  6. 6.
    Fridrich, J., Soukal, D., Lukáš, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)Google Scholar
  7. 7.
    Christlein, V., Riess, C., Angelopoulou, E.: On rotation invariance in copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security, WIFS (2010)Google Scholar
  8. 8.
    Al-Qershi, O.M., Khoo, B.E.: Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic sci. Int. 231, 95–284 (2013)CrossRefGoogle Scholar
  9. 9.
    Zhao, J., Guo, J.: Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci. Int. 233, 158–166 (2013)CrossRefGoogle Scholar
  10. 10.
    Gupta, A., Saxena, N., Vasistha, S.K.: Detecting copy move forgery using DCT. Int. J. Sci. Res. Publ. 3, 3–6 (2013)Google Scholar
  11. 11.
    Wandji, N.D., Xingming, S., Kue, M.F.: Detection of copy-move forgery in digital images based on DCT. Int. J. Comput. Sci. Issues 10, 1–8 (2013)Google Scholar
  12. 12.
    Wu, Q., Wang, S., Zhang, X.: Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Process. Lett. 18, 559–562 (2011)CrossRefGoogle Scholar
  13. 13.
    Wu, Q., Wang, S., Zhang, X.: Detection of image region-duplication with rotation and scaling tolerance. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part I. LNCS (LNAI), vol. 6421, pp. 100–108. Springer, Heidelberg (2010) Google Scholar
  14. 14.
    Langille, A., Minglun, G.: An efficient match-based duplication detection algorithm. In: The 3rd Canadian Conference on Computer and Robot Vision, 2006, p. 64 (2006)Google Scholar
  15. 15.
    Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection via texture description. In: Proceedings of the 2010 ACM Workshop on Multimedia in Forensics, Security and Intelligence, MiFor, 2010, pp. 59–64. ACM Multimedia (2010)Google Scholar
  16. 16.
    Lynch, G., Shih, F.Y., Liao, H.Y.M.: An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239, 253–265 (2013)CrossRefGoogle Scholar
  17. 17.
    Ryu, S.-J., Lee, M.-J., Lee, H.-K.: Detection of copy-rotate-move forgery using Zernike moments. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 51–65. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  18. 18.
    Yang, J., Ran, P., Xiao, D., Tan, J.: Digital image forgery forensics by using undecimated dyadic wavelet transform and Zernike moments. J. Comput. Inf. Syst. 9, 6399–6408 (2013)Google Scholar
  19. 19.
    Ting, Z., Rang-Ding, W.: Copy-move forgery detection based on SVD in digital image. In: Proceedings of the 2009 2nd International Congress on Image and Signal Processing, CISP 2009 (2009)Google Scholar
  20. 20.
    Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceedings of 2007 IEEE International Conference on Multimedia and Expo, pp.1750–1753 (2007)Google Scholar
  21. 21.
    Hu, M.K.: Visual pattern recognition by moment invariants. IRE Trans. Inf. Theory 8, 179–187 (1962)MATHGoogle Scholar
  22. 22.
    Kim, H.S., Lee, H.K.: Invariant image watermark using Zernike moments. IEEE Trans. Circuit Syst. Video Technol. 13(8), 766–775 (2003)CrossRefGoogle Scholar
  23. 23.
    Teh, C.H., Chin, R.T.: On image analysis by the methods of moments. IEEE Trans. Pattern Anal. Mach. Intell. 10(4), 496–513 (1988)CrossRefMATHGoogle Scholar
  24. 24.
    Ryu, S.J., Kirchner, M., Lee, M.J., Lee, H.K.: Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Inf. Forensics Secur. 8, 1355–1370 (2013)CrossRefGoogle Scholar
  25. 25.
    Chawla, N.: In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook SE - 40. Springer, Heidelberg (2005)Google Scholar
  26. 26.
    Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Engineering CampusUniversiti Sains MalaysiaNibong TebalMalaysia

Personalised recommendations