Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching
- 105 Downloads
Abstract
Copy-move (region duplication) is one of the most common types of image forgeries, in which at least one part of an image is copied and pasted onto another area of the same image. The main aims of the copy-move forgery are to overemphasize a concept or conceal objects by duplicating some regions. Keypoint based copy-move forgery detection (CMFD) method extracts image feature points and employs local image features to identify duplicated regions, which exhibits remarkable detection performance with respect to memory requirement, computational cost, and robustness. However, they usually do not work well when the objects are hidden in smooth background areas. Also, the detection and localization accuracy always be lowered because of poor local image feature computation. In this paper, we present a novel approach for the detection and localization of copy-move forgeries, which is based on color invariance SIFER (Scale-invariant feature detector with error resilience) and FQRHFMs (Fast quaternion radial harmonic Fourier moments). Firstly, the original forgery image is segmented into nonoverlapping and nearly uniform superpixel blocks, and the stable keypoints are extracted adaptively from each superpixel block by incorporating the superpixel contents and color invariance SIFER. Secondly, a set of connected Delaunay triangles is constructed using the extracted image keypoints, and suitable local image feature for each Delaunay triangle is computed by using FQRHFMs and gradient entropy. Thirdly, the local image features and coherency sensitive hashing (CSH) are utilized to match quickly the Delaunay triangles. Finally, the falsely matched Delaunay triangles are removed by employing dense linear fitting (DLF), and the duplicated regions are localized using optimized zero mean normalized cross-correlation (ZNCC) measure. We conduct extensive experiments to evaluate the performance of the proposed copy-move forgery detection scheme, in which encouraging results validate the effectiveness of the proposed technique.
Keywords
Copy-move forgery detection Color invariance SIFER FQRHFMs Coherency sensitive hashing Optimized ZNCCNotes
Funding
This work was supported by the National Natural Science Foundation of China under Grant No. 61472171, 61272416, &61701212, Project Funded by China Postdoctoral Science Foundation No. 2017 M621135, and the Natural Science Foundation of Liaoning Province of China under Grant No. 201602463.
References
- 1.Abdel-Hakim AE, Farag AACSIFT (2006) A SIFT descriptor with color invariant characteristics[C]//computer vision and pattern recognition. 2006 IEEE Computer Society Conference on IEEE 2:1978–1983Google Scholar
- 2.Achanta R, Shaji A, Smith K et al (2012) SLIC superpixels compared to state-of-the-art superpixel methods[J]. IEEE Trans Pattern Anal Mach Intell 34(11):2274–2282CrossRefGoogle Scholar
- 3.Amerini I, Ballan L, Caldelli R et al (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security 6(3):1099–1110CrossRefGoogle Scholar
- 4.Amerini I, Ballan L, Caldelli R et al (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage[J]. Signal Process Image Commun 28(6):659–669CrossRefGoogle Scholar
- 5.Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints[J]. IEEE Transactions on Information Forensics and Security 10(10):2084–2094CrossRefGoogle Scholar
- 6.Aymaz S, Aymaz Ş, Ulutaş G (2016) Detection of copy move forgery using Legendre Moments[C]//Signal Processing and Communication Application Conference (SIU), 2016 24th. IEEE, 2016: 1125–1128Google Scholar
- 7.Bo X, Junwen W, Guangjie L, et al. (2010) Image copy-move forgery detection based on SURF[C]//Multimedia information networking and security (MINES), 2010 international conference on. IEEE, 889–892Google Scholar
- 8.Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling[C]//Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. IEEE, 2011: 1880–1883Google Scholar
- 9.Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics[J]. Signal Process 91(8):1759–1770CrossRefGoogle Scholar
- 10.Cao M (2015) A new Delaunay triangulation algorithm based on constrained maximum circumscribed circle[J]. Wuhan University Journal of Natural Sciences 20(4):313–317MathSciNetCrossRefGoogle Scholar
- 11.Cao Y, Gao T, Fan L et al (2012) A robust detection algorithm for copy-move forgery in digital images.[J]. Forensic Sci Int 214(1–3):33–43CrossRefGoogle Scholar
- 12.Chambers J, Yan W, Garhwal A et al (2015) Currency security and forensics: a survey[J]. Multimedia Tools and Applications 74(11):4013–4043CrossRefGoogle Scholar
- 13.Christlein V, Riess C, Jordan J et al (2012) An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on information forensics and security 7(6):1841–1854CrossRefGoogle Scholar
- 14.Chun-peng W, Xing-yuan W, Zhi-qiu X (2016) Geometrically invariant image watermarking based on fast radial harmonic Fourier moments[J]. Signal Process Image Commun 45:10–23CrossRefGoogle Scholar
- 15.Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch[C]//Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014: 5312–5316Google Scholar
- 16.Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection[J]. IEEE Transactions on Information Forensics and Security 10(11):2284–2297CrossRefGoogle Scholar
- 17.Davarzani R, Mozaffari S, Yaghmaie K (2016) Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications 75(8):4639–4667CrossRefGoogle Scholar
- 18.Emam M, Han Q, Niu X (2016) PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools & Applications 75(18):11513–11527CrossRefGoogle Scholar
- 19.Gong J, Guo J (2016) Image copy-move forgery detection using SURF in opponent color space[J]. Transactions of Tianjin University 22(2):151–157CrossRefGoogle Scholar
- 20.Hu H, Zhang Y, Shao C et al (2014) Orthogonal moments based on exponent functions: exponent-Fourier moments[J]. Pattern Recogn 47(8):2596–2606CrossRefGoogle Scholar
- 21.Isaac MM, Wilscy M (2015) Copy-Move forgery detection based on Harris Corner points and BRISK[C]//Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM, 2015: 394–399Google Scholar
- 22.Korman S, Avidan S (2016) Coherency sensitive hashing[J]. IEEE Trans Pattern Anal Mach Intell 38(6):1099–1112CrossRefGoogle Scholar
- 23.Li L, Li S, Zhu H et al (2014) Detecting copy-move forgery under affine transforms for image forensics[J]. Computers & Electrical Engineering 40(6):1951–1962MathSciNetCrossRefGoogle Scholar
- 24.Li C, Ma Q, Xiao L, et al (2016) An Image Copy Move Forgery Detection Method Using QDCT[C]//Proceedings of the International Conference on Internet Multimedia Computing and Service. ACM, 2016: 5–8Google Scholar
- 25.Lin C, Li Y, Xu G et al (2017) Optimizing ZNCC calculation in binocular stereo matching[J]. Signal Process Image Commun 52:64–73CrossRefGoogle Scholar
- 26.Liu MY, Tuzel O, Ramalingam S et al (2014) Entropy-rate clustering: cluster analysis via maximizing a submodular function subject to a matroid constraint[J]. IEEE Trans Pattern Anal Mach Intell 36(1):99–112CrossRefGoogle Scholar
- 27.Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2activity: recognizing complex activities from sensor data. Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI 2015) 1617–1623Google Scholar
- 28.Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16), 2016: 201–207Google Scholar
- 29.Mainali P, Lafruit G, Yang Q et al (2013) SIFER: scale-invariant feature detector with error resilience[J]. Int J Comput Vis 104(2):172–197CrossRefGoogle Scholar
- 30.Oommen R S, Jayamohan M, Sruthy S (2016) Scale invariant detection of copy-move forgery using fractal dimension and singular values[M]//Advances in Signal Processing and Intelligent Recognition Systems. Springer, Cham, 2016: 559–570Google Scholar
- 31.Pan X, Lyu S (2010) Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Security 5(4):857–867CrossRefGoogle Scholar
- 32.Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching[J]. IEEE Transactions on Information Forensics and Security 10(8):1705–1716CrossRefGoogle Scholar
- 33.Ren H, Ping Z, Bo W et al (2003) Multidistortion-invariant image recognition with radial harmonic Fourier moments[J]. JOSA A 20(4):631–637MathSciNetCrossRefGoogle Scholar
- 34.Ryu SJ, Kirchner M, Lee MJ et al (2013) Rotation invariant localization of duplicated image regions based on Zernike moments[J]. IEEE Transactions on Information Forensics and Security 8(8):1355–1370CrossRefGoogle Scholar
- 35.Thirunavukkarasu V, Kumar J S, Chae G S, et al (2017) Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering[J]. Wireless Personal Communications, 2017:1–19Google Scholar
- 36.Üstübi̇oğlu B, Ayas S, Doğan H, et al (2015) Image forgery detection based on Colour SIFT[C]//Signal Processing and Communications Applications Conference (SIU), 2015 23th. IEEE, 2015: 1741–1744Google Scholar
- 37.Wang J, Liu G, Li H et al (2009) Detection of image region duplication forgery using model with circle block[C]//multimedia information networking and security, 2009. MINES'09. International conference on. IEEE 1:25–29Google Scholar
- 38.Warif NBA, Wahab AWA, Idris MYI et al (2016) Copy-move forgery detection: survey, challenges and future directions[J]. Journal of Network & Computer Applications 75:259–278CrossRefGoogle Scholar
- 39.Wo Y, Yang K, Han G et al (2016) Copy–move forgery detection based on multi-radius PCET[J]. IET Image Process 11(2):99–108CrossRefGoogle Scholar
- 40.Xiang-yang W, Wei-yi L, Hong-ying Y et al (2015) Invariant quaternion radial harmonic Fourier moments for color image retrieval[J]. Opt Laser Technol 66:78–88CrossRefGoogle Scholar
- 41.Yang B, Sun X, Guo H, et al (2017) A copy-move forgery detection method based on CMFD-SIFT[J]. Multimedia Tools and Applications, 2017: 1–19Google Scholar
- 42.Zhao J, Zhao W (2013) Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns[J]. Mathematical Problems in Engineering, (2013–12-29), 2013, 2013(4):1–12Google Scholar
- 43.Zhao F, Shi W, Qin B, et al (2016) Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection[C]//Security, Privacy, and Anonymity in Computation, Communication, and Storage: 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings 9. Springer International Publishing, 2016: 478–490Google Scholar
- 44.Zheng J, Liu Y, Ren J et al (2016) Fusion of block and keypoints based approaches for effective copy-move image forgery detection[J]. Multidim Syst Sign Process 27(4):989–1005MathSciNetCrossRefGoogle Scholar
- 45.Zhu Y, Shen X, Chen H (2016) Copy-move forgery detection based on scaled ORB[J]. Multimedia Tools & Applications 75(6):3221–3233CrossRefGoogle Scholar