An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT
Digital images can be easily manipulated due to availability of powerful image processing software. Passive authentication as a common challenge method of digital image authentication is extensively used to detect the copy-move forgery images. In this paper, a passive authentication scheme is proposed to authenticate copy-move forgery based on discrete cosine transform (DCT). At the feature extraction step, DCT is applied to image blocks and makes use of the means of DCT coefficients to represent image blocks. The size of feature vectors are optimized. At the matching step, a set number of packages is used to store the feature vectors. The similar blocks can be found by comparing the feature vectors that are contained in adjacent packages. The experimental results demonstrate that the proposed scheme can locate irregular and meaningful tampered regions and multiply duplicated regions. In addition, it can also locate the duplicated regions in digital images that are distorted by adding white Gaussian noise, Gaussian blurring and their mixed operations.
KeywordsPassive authentication Copy-move forgery Feature extraction Packages
This research is supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.
- 1.Chang, S.-F., Sebe, N., Liu, Y., Zhuang, Y., Huang, T., Chang, S.F.: Blind passive media forensics: motivation and opportunity. In: Sebe, N., Liu, Y., Zhuang, Y., Huang, T.S. (eds.) MCAM 2007. LNCS, vol. 4577, pp. 57–59. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73417-8_11 CrossRefGoogle Scholar
- 3.Mishra, A., Goel, A., Singh, R., Chelty, G., Singh, L.: Anovel image watermarking scheme using extreme learning machine. In: The 2012 International Joint Conference on Neural Networks (IJCNN), pp. 1–6 (2012)Google Scholar
- 4.Tong, X., Liu, Y., Zhang, M., Chen, Y.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery signal process. Image Commun. 28, 301–308 (2013)Google Scholar
- 5.Zhou, L., Wang, D., Guo, Y., Zhang, J.: Blur detection of digital forgery using mathematical morphology. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 990–998. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72830-6_105 CrossRefGoogle Scholar
- 6.Popscu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical report TR2003-515, Dartmouth College (2004)Google Scholar
- 8.Fridrich, J., Soukalm, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Digital Forensic Research workshop, Cleveland, pp. 19–23 (2003)Google Scholar
- 10.Wang, X., Zhang, X., Li, S., Wang, S.: A DWT-DCT based passive forencis method for copy-move attacks. In: 2011 Third International Conference on Multimedia Information Networking and Security, pp. 304–308 (2011)Google Scholar
- 11.Kumar, S., Desai, J., Mukherjee, S.: DCT-PCA based method for copy-move forgery detection. In: Satapathy, S.C., Avadhani, P.S., Udgata, S.K., Lakshminarayana, S. (eds.) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India - Volume II. Advances in Intelligent systems and computing, vol. 249, pp. 577–583. Springer, Cham (2014)Google Scholar
- 12.Yu, J., Han, Q.L.: Detection of copy-move forgery in digital images using discrete cosine transform and cluster analysis. In: International Conference on Computer Networks and Information Security (CNIS), pp. 73–76 (2015)Google Scholar
- 13.The USC-SIPI Image Database. http://sipi.usc.edu/database/
- 14.Kodak Lossless True Color Image. http://r0k.us/graphics/kodak/