A Copy-Move Detection Algorithm Using Binary Gradient Contours
Nowadays copy-move attack is one of the most obvious ways of digital image forgery in order to hide the information contained in images. Copy-move process consists of copying the fragment from one place of an image, changing it and pasting it to another place of the same image. However, only a few existing studies reached high detection accuracy for a narrow range of transform parameters. In this paper, we propose a copy-move detection algorithm that uses features based on binary gradient contours that are robust to contrast enhancement, additive noise and JPEG compression. The proposed solution showed high detection accuracy and the results are supported by conducted experiments for wide ranges of transform parameters. A comparison of features based on binary gradient contours and based on various forms of local binary patterns showed a significant 20–30 % difference in detection accuracy, corresponding to an improvement with the proposed solution.
KeywordsCopy-move detection Transformed duplicate Forgery Local binary pattern Binary gradient contours k-d tree
This work was financially supported by the Russian Scientific Foundation (RSF), grant no. 14-31-00014 “Establishment of a Laboratory of Advanced Technology for Earth Remote Sensing”.
- 1.The Top 20 Valuable Facebook Statistics. http://zephoria.com/top-15-valuable-facebook-statistics
- 4.Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. In: International Conference on Computer Science and Software Engineering, vol. 3, pp. 926–930. IEEE Press, New York (2008)Google Scholar
- 5.Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application 2008,vol. 2, pp. 272–276 (2008)Google Scholar
- 6.Shivakumar, B.L., Baboo, S.: Detection of region duplication forgery in digital images using SURF. Int. J. Comput. Sci. Issues 8(4), 199–205 (2011)Google Scholar
- 7.Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. http://www.ws.binghamton.edu/fridrich/Research/copymove.pdf
- 8.Bayram, S., Sencar, H., Memon, H.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech, and Signal Processing 2009, pp. 1053–1056 (2009)Google Scholar
- 9.Popescu, A., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. http://www.ists.dartmouth.edu/library/102.pdf
- 10.Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. In: International Conference on Computer Science and Software Engineering 2008, vol. 3, pp. 926–930 (2008)Google Scholar
- 12.Vladimirovich, K.A., Valerievich, M.V.: A fast plain copy-move detection algorithm based on structural pattern and 2D Rabin-Karp rolling hash. In: Campilho, A., Kamel, M. (eds.) ICIAR 2014, Part I. LNCS, vol. 8814, pp. 461–468. Springer, Heidelberg (2014)Google Scholar
- 13.Li, L., Li, S., Zhu, H.: An efficient scheme for detection copy-move forged images by local binary patterns. J. Inf. Hiding Multimed. Sig. Process. 4(1), 46–56 (2013)Google Scholar
- 19.Myasnikov, V.: A local order transform of digital images. Comput. Opt. 39(3), 397–405 (2015). (in Russian)Google Scholar
- 20.Arasteh, S., Hung, C.-C.: Color and texture image segmentation using uniform local binary patterns. Mach. Graph. Vis. 15(3–4), 265–274 (2006)Google Scholar