Advertisement

A Non-intrusive Method for Copy-Move Forgery Detection

  • Najah Muhammad
  • Muhammad Hussain
  • Ghulam Muhamad
  • George Bebis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6939)

Abstract

The issue of verifying the authenticity and integrity of digital images is becoming increasingly important. Copy-move forgery is one type of image tempering that is commonly used for manipulating digital content; in this case, some part of an image is copied and pasted on another region of the image. Using a non-intrusive approach to solve this problem is becoming attractive because it does not need any embedded information, but it is still far from being satisfactory. In this paper, an efficient non-intrusive method for copy-move forgery detection is presented. The method is based on image segmentation and a new denoising algorithm. First, the image is segmented using a multi-scale segmentation algorithm. Then, using the noise pattern of each segment, a separate noise image is created. The noise images are used to estimate the overall noise of the image which is further used to re-estimate the noise pattern of different segments. The image segments with similar noise histograms are detected as tampered. A comparison with a state-of-the art non-intrusive algorithm shows that the proposed method performs better.

Keywords

Discrete Wavelet Transform Digital Content Central Moment Noise Estimation Forgery Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bayram, S., Sencar, H.T., Memon, N.: An Efficient and Robust Method for Detecting Copy-Move Forgery. In: Proc. IEEE ICASSP, pp. 1053–1056 (2009)Google Scholar
  2. 2.
    Chen, M., et al.: Determining Image Origin and Integrity Using Sensor Noise. IEEE Transactions on Information Forensics and Security, 74–90 (2008)Google Scholar
  3. 3.
    Fridrich, J., Soukal, D., Lukas, J.: Detection of Copy Move Forgery in Digital Images. In: Digital Forensic Research Workshop, Cleveland, OH (2003)Google Scholar
  4. 4.
    Huang, H., et al.: Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. In: Pacific-Asia Workshop on Computational Intell. Industrial App., pp. 272–276 (2008)Google Scholar
  5. 5.
    Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn., Section 8.2: Counting sort, pp. 168–170. MIT Press and McGraw-Hill (2001)Google Scholar
  6. 6.
    Kang, X., Wei, S.: Identifying Tampered regions using singular value decomposition in Digital image forensics, pp. 926–930. IEEE Computer Society, USA (2008)Google Scholar
  7. 7.
    Li, Y., Li, C.-T.: Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. In: Sorell, M. (ed.) e-Forensics 2009. LNICST, vol. 8, pp. 166–172. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  8. 8.
    Lin, H.-J., Wang, C.-W., Kao, Y.-T.: Fast Copy-Move Forgery Detection. WSEAS Trans. Signal Process, 188–197 (2009)Google Scholar
  9. 9.
    Lin, H.J., Wang, C.W.,, Y.: Fast Copy-Move Forgery Detection. In: World Scientific and Engineering Academy and Society (WSEAS), pp. 188–197 (2009)Google Scholar
  10. 10.
    Lukáš, J., et al.: Detecting Digital Image Forgeries Using Sensor Pattern Noise. In: Proc. of SPIE (2006)Google Scholar
  11. 11.
    Mahdian, B., Saic, S.: Detection of Copy Move Forgery Using a Method Based on Blur Moment Invariants. Forensic Science International 171, 180–189 (2007)CrossRefGoogle Scholar
  12. 12.
    Mahdian, B., Saic, S.: Using Noise Inconsistencies for Blind Image Forensics. Image and Vision Computing, 1497–1503 (2009)Google Scholar
  13. 13.
    Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Duplicated Image Regions. Dept. Comput. Sci., Dartmouth College,Tech.Rep. TR2004-515 (2004)Google Scholar
  14. 14.
    Sutcu, Y., et al.: Tamper Detection Based on Regularity of Wavelet Transform Coefficients. In: Proc. IEEE ICIP, pp. 397–400 (2007)Google Scholar
  15. 15.
    Wang, J., et al.: Detection of Image Region Duplication Forgery Using Model with Circle Block. In: International Conf. Multimedia Inform. Network. and Security, pp. 25–29 (2009)Google Scholar
  16. 16.
    Zhang, J., Feng, Z., Su, Y.: A New Approach for Detecting Copy-Move Forgery in Digital Images. In: IEEE Singapore Int. Conf. Comm. Sys., China, pp. 362–366 (2008)Google Scholar
  17. 17.
    Zhang, P., Kong, X.: Detecting Image Tampering Using Feature Fusion. In: International Conference on Availability, Reliability and Security, pp. 335–340 (2009)Google Scholar
  18. 18.
    Cour, T., et al.: Spectral Segmentation with Multiscale Graph Decomposition. In: IEEE International Conference on Computer Vision and Pattern Recognition, CVPR (2005)Google Scholar
  19. 19.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Najah Muhammad
    • 1
  • Muhammad Hussain
    • 2
  • Ghulam Muhamad
    • 2
  • George Bebis
    • 2
    • 3
  1. 1.CCISPrince Norah Bint Abdul Rahman UniversitySaudi Arabia
  2. 2.CCISKing Saud UniversitySaudi Arabia
  3. 3.CSEUniversity of NevadaRenoUSA

Personalised recommendations