Advertisement

An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points

  • Yong Liu
  • Hong-Xia Wang
  • Han-Zhou Wu
  • Yi Chen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10602)

Abstract

Region duplication is a commonly used operation in digital image processing. Since region duplication could be utilized to easily tamper the raw content by intentional attackers, it has become a very important topic in image forensics. Most of the existing detection methods designed to region duplication are based on the exhaustive block-matching of image pixels or transformed coefficients. They may be not efficient when the duplicate regions are relatively smooth, or processed by some geometrical transformations. This has motivated us to propose a reliable copy-move forgery detection algorithm based on super-pixel segmentation and Harris key-points to improve the detection accuracy due to these specified attacks. For a given image, the proposed method first uses SLIC super-pixel segmentation and cluster analysis technique to partition the image content into complex regions and smooth regions. Then, a region description method based on sector mean is introduced to represent the relatively small image regions around each Harris point by adopting a well-designed feature vector. Thereafter, for both complex regions and smooth regions, we perform the feature matching operation, which is finally exploited to locate the tampered region. Experimental results have shown that, our algorithm significantly outperform some related works in terms of the detection accuracy when the test images are processed by blurring, adding noise, JPEG compression and rotating, which has shown the superior of our work.

Keywords

Copy-move forgery detection Image segmentation Cluster analysis Harris points Sector mean 

Notes

Acknowledgments

This work is supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.

References

  1. 1.
    Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRefGoogle Scholar
  2. 2.
    Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceeding on Digital Forensic Research Workshop, August 2003Google Scholar
  3. 3.
    Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions in computer science. Dartmouth College, Technical Report TR2004-515 (2004)Google Scholar
  4. 4.
    Li, G., Wu, Q., Tu, D., Sun, S.J.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceeding of IEEE International Conference on Multimedia Expo (ICME), Beijing, 1750–1753, July 2007Google Scholar
  5. 5.
    Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 1053–1056. IEEE (2015)Google Scholar
  6. 6.
    Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2–3), 180–189 (2007)CrossRefGoogle Scholar
  7. 7.
    Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital image. Chin. J. Comput. 4(11), 746–749 (2007)Google Scholar
  8. 8.
    Khan, E.S., Kulkarni, E.A.: An efficient method for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Sci. Eng. 2(5), 1801–1806 (2010)Google Scholar
  9. 9.
    Shih, F.Y., Yuan, Y.: A comparison study on copy-cover image forgery detection. Open Artif. Intell. J. 4(1), 49–54 (2010)CrossRefGoogle Scholar
  10. 10.
    Lynch, G., Shih, F.Y., Liao, H.Y.M.: An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239(4), 253–265 (2013)CrossRefGoogle Scholar
  11. 11.
    Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using sift algorithm. In: The Workshop on Computational Intelligence & Industrial Application, pp. 272–276. IEEE (2008)Google Scholar
  12. 12.
    Zhou, Z., Wang, Y., Wu, J.Q.M., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017). doi: 10.1109/TIFS.2016.2601065 CrossRefGoogle Scholar
  13. 13.
    Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRefGoogle Scholar
  14. 14.
    Kumar, S., Desai, J., Mukherjee, S.: A fast keypoint based hybrid method for copy move forgery detection. Int. J. Comput. Digital Syst. 4(2), 91–99 (2015)CrossRefGoogle Scholar
  15. 15.
    Chen, L., Lu, W., Ni, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Present. 24(3), 244–254 (2013)CrossRefGoogle Scholar
  16. 16.
    Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015). doi: 10.1109/TIFS.2014.2381872 CrossRefGoogle Scholar
  17. 17.
    Wang, X., He, G., Tang, C.: Keypoints-based image passive forensics method for copy-move attacks. Int. J. Pattern Recognit. Artif. Intell. 30(3), 304–308 (2016)MathSciNetGoogle Scholar
  18. 18.
    Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: SLIC super pixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 2274–2282 (2012)CrossRefGoogle Scholar
  19. 19.
    Zheng, Y., Jeon, B., Xu, D., Wu, J.Q.M., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), pp. 961–973 (2015). DOI: 10.3233/IFS-141378,2015
  20. 20.
    Harris, C.; Stephens, M.: A combined corner and edge detector. In: Proceedings of the Alvey Vision Conference, Manchester, UK, 2 September 1988Google Scholar
  21. 21.
    Yan-Ming, M., Mei-Hui, L., Yun-Qiong, W., Qiao-Sheng, F.: An improved corner detection method based on Harris. Comput. Technol. Develop. 19(5), 130–133 (2009)Google Scholar
  22. 22.
    Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move at tack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRefGoogle Scholar
  23. 23.
    Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381–395 (1981)CrossRefMathSciNetGoogle Scholar
  24. 24.
    Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security (WIFS), 119–124 (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Information Science and TechnologySouthwest Jiaotong UniversityChengduChina
  2. 2.Institute of AutomationChinese Academy of Sciences (CAS)BeijingPeople’s Republic of China

Personalised recommendations