DOI QR코드

DOI QR Code

Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks

  • Deng, Jiehang (School of Computers, Guangdong University of Technology) ;
  • Yang, Jixiang (School of Computers, Guangdong University of Technology) ;
  • Weng, Shaowei (School of Information Engineering, Guangdong University of Technology) ;
  • Gu, Guosheng (School of Computers, Guangdong University of Technology) ;
  • Li, Zheng (School of Computers, Guangdong University of Technology)
  • Received : 2017.12.21
  • Accepted : 2018.04.28
  • Published : 2018.09.30

Abstract

Trying to deal with the problem of low robustness of Copy-Move Forgery Detection (CMFD) under various transformation and degradation attacks, a novel CMFD method is proposed in this paper. The main advantages of proposed work include: (1) Discrete Analytical Fourier-Mellin Transform (DAFMT) and Locality Sensitive Hashing (LSH) are combined to extract the block features and detect the potential copy-move pairs; (2) The Euclidian distance is incorporated in the pixel variance to filter out the false potential copy-move pairs in the post-verification step. In addition to extracting the effective features of an image block, the DAMFT has the properties of rotation and scale invariance. Unlike the traditional lexicographic sorting method, LSH is robust to the degradations of Gaussian noise and JEPG compression. Because most of the false copy-move pairs locate closely to each other in the spatial domain or are in the homogeneous regions, the Euclidian distance and pixel variance are employed in the post-verification step. After evaluating the proposed method by the precision-recall-$F_1$ model quantitatively based on the Image Manipulation Dataset (IMD) and Copy-Move Hard Dataset (CMHD), our method outperforms Emam et al.'s and Li et al.'s works in the recall and $F_1$ aspects.

Keywords

References

  1. H. Farid, "Image forgery detection," IEEE Signal processing magazine, vol. 26, no. 2, pp. 16-25, March, 2009. https://doi.org/10.1109/MSP.2008.931079
  2. V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on information forensics and security, vol. 7, no. 6, pp. 1841-1854, September, 2012. https://doi.org/10.1109/TIFS.2012.2218597
  3. A. J. Fridrich, B. D. Soukal, and A. J. Lukas, "Detection of copy-move forgery in digital images," in Proc. of 3rd Digital Forensic Research Workshop, August 6-8, 2003.
  4. Z. Zhang, D. Wang, C. Wang, and X. Zhou, "Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors," KSII Transactions on Internet & Information Systems, vol. 11, no. 9, pp. 4567-4587, September, 2017. https://doi.org/10.3837/tiis.2017.09.021
  5. A. Popescu, and H. Farid, "Exposing digital forgeries by detecting duplicated image region," Department of Computer Science, Dartmouth College, Technology Report TR2004-515, 2004.
  6. B. Mahdian, and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic science international, vol. 171, no. 2, pp. 180-189, September, 2007. https://doi.org/10.1016/j.forsciint.2006.11.002
  7. J. Zhao, and J. Guo, "Passive forensics for copy-move image forgery using a method based on DCT and SVD," Forensic science international, vol. 233, no. 1, pp. 158-166, December, 2013. https://doi.org/10.1016/j.forsciint.2013.09.013
  8. G. Muhammad, M. Hussain, and G. Bebis, "Passive copy move image forgery detection using undecimated dyadic wavelet transform," Digital Investigation, vol. 9, no. 1, pp. 49-57, June, 2012. https://doi.org/10.1016/j.diin.2012.04.004
  9. S.-J. Ryu, M. Kirchner, M.-J. Lee, and H.-K. Lee, "Rotation invariant localization of duplicated image regions based on Zernike moments," IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1355-1370, July, 2013. https://doi.org/10.1109/TIFS.2013.2272377
  10. P.-T. Yap, X. Jiang, and A. C. Kot, "Two-dimensional polar harmonic transforms for invariant image representation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 7, pp. 1259-1270, July, 2010. https://doi.org/10.1109/TPAMI.2009.119
  11. Y. Li, "Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching," Forensic science international, vol. 224, no. 1, pp. 59-67, January, 2013. https://doi.org/10.1016/j.forsciint.2012.10.031
  12. M. Emam, Q. Han, and X. M. Niu, "PCET based copy-move forgery detection in images under geometric transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, September, 2016. https://doi.org/10.1007/s11042-015-2872-2
  13. J. Zhong, and Y. Gan, "Detection of copy-move forgery using discrete analytical Fourier-Mellin transform," Nonlinear Dynamics, vol. 84, no. 1, pp. 189-202, April, 2016. https://doi.org/10.1007/s11071-015-2374-9
  14. J. Li, X. Li, B. Yang, and X. Sun, "Segmentation-Based Image Copy-Move Forgery Detection Scheme," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, March, 2015. https://doi.org/10.1109/TIFS.2014.2381872
  15. H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Proc. of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272-276, December 19-20, 2008.
  16. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A sift-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, September, 2011. https://doi.org/10.1109/TIFS.2011.2129512
  17. F. Zhao, R. Zhang, H. Guo, and Y. Zhang, "Effective digital image copy-move location algorithm robust to geometric transformations," in Proc. of 2015 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, September 19-22, 2015.
  18. K. Sudhakar, V. Sandeep, and S. Kulkarni, "Speeding-up SIFT based copy move forgery detection using level set approach," in Proc. of International Conference on Advances in Electronics, Computers and Communications, pp. 1-6, October 10-11, 2014.
  19. L. K. Bhullar, S. Budhiraja, and A. Dhindsa, "DWT and SIFT based Passive Copy-Move Forgery Detection," International Journal of Computer Applications, vol. 95, no. 23, pp. 14-18, June, 2014. https://doi.org/10.5120/16734-6935
  20. N. Yadav, and R. Kapdi, "Copy move forgery detection using SIFT and GMM," in Proc. of 5th Nirma University International Conference on Engineering, pp. 1-4, November 26-28, 2015.
  21. S. Debbarma, A. B. Singh, and K. M. Singh, "Keypoints based copy-move forgery detection of digital images," in Proc. of International Conference on Informatics, Electronics & Vision, pp. 1-5, May 23-24, 2014.
  22. X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, "Image copy-move forgery detection based on SURF," in Proc. of International Conference on Multimedia information networking and security, pp. 889-892, Novenber 4-6, 2010.
  23. C.-M. Pun, X.-C. Yuan, and X.-L. Bi, "Image forgery detection using adaptive oversegmentation and feature point matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, April, 2015. https://doi.org/10.1109/TIFS.2015.2423261
  24. E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-move forgery detection by matching triangles of keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084-2094, October, 2015. https://doi.org/10.1109/TIFS.2015.2445742
  25. M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proc. of the 20th annual symposium on Computational geometry, pp. 253-262, June 08-11, 2004.
  26. M. Sellami, and F. Ghorbel, "An invariant similarity registration algorithm based on the analytical fourier-mellin transform," in Proc. of the 20th European conference on Signal Processing, pp. 390-394, August 27-31, 2012.
  27. E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, "Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes," Journal of Visual Communication and Image Representation, vol. 29, pp. 16-32, May, 2015. https://doi.org/10.1016/j.jvcir.2015.01.016