Skip to main content

Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike Moments

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

Abstract

Copy-move is one of the most popular and efficient operations to create image forgery. Many passive detection techniques have been proposed to detect such a forgery in digital images. The performance of the detection algorithms depends mainly on the features used for matching image blocks or keypoints and the matching method as well. Among the existing detection algorithms, those which employ Zernike moments as features provide remarkable detection accuracy. The robustness of Zernike moments comes from the fact that they are invariant to rotation and scaling. However, Zernike moments-based algorithms can be improved further by adopting more efficient matching methods. In this paper, we propose a new matching method in order to enhance the detection accuracy. Compared to the lexicographical sorting-based matching method, the proposed method improved the detection accuracy by 40 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Signal Process.: Image Commun. 25, 389–399 (2010)

    Google Scholar 

  2. Normile, D.: Hwang convicted but dodges jail; stem cell research has moved on. Science 326, 650–651 (2009)

    Article  Google Scholar 

  3. Wade, N.: It May Look Authentic. Here’s How to Tell It Isn’t. New York Times, New York (2006)

    Google Scholar 

  4. Redi, J.A., Taktak, W., Dugelay, J.L.: Digital image forensics: a booklet for beginners. Multimedia Tools Appl. 51(1), 133–162 (2011)

    Article  Google Scholar 

  5. Liu, G., Wang, J., Lian, S., Wang, Z.: A passive image authentication scheme for detecting region-duplication forgery with rotation. J. Netw. Comput. Appl. 34, 1557–1565 (2010)

    Article  Google Scholar 

  6. Fridrich, J., Soukal, D., Lukáš, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)

    Google Scholar 

  7. Christlein, V., Riess, C., Angelopoulou, E.: On rotation invariance in copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security, WIFS (2010)

    Google Scholar 

  8. Al-Qershi, O.M., Khoo, B.E.: Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic sci. Int. 231, 95–284 (2013)

    Article  Google Scholar 

  9. Zhao, J., Guo, J.: Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci. Int. 233, 158–166 (2013)

    Article  Google Scholar 

  10. Gupta, A., Saxena, N., Vasistha, S.K.: Detecting copy move forgery using DCT. Int. J. Sci. Res. Publ. 3, 3–6 (2013)

    Google Scholar 

  11. Wandji, N.D., Xingming, S., Kue, M.F.: Detection of copy-move forgery in digital images based on DCT. Int. J. Comput. Sci. Issues 10, 1–8 (2013)

    Google Scholar 

  12. Wu, Q., Wang, S., Zhang, X.: Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Process. Lett. 18, 559–562 (2011)

    Article  Google Scholar 

  13. Wu, Q., Wang, S., Zhang, X.: Detection of image region-duplication with rotation and scaling tolerance. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part I. LNCS (LNAI), vol. 6421, pp. 100–108. Springer, Heidelberg (2010)

    Google Scholar 

  14. Langille, A., Minglun, G.: An efficient match-based duplication detection algorithm. In: The 3rd Canadian Conference on Computer and Robot Vision, 2006, p. 64 (2006)

    Google Scholar 

  15. Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection via texture description. In: Proceedings of the 2010 ACM Workshop on Multimedia in Forensics, Security and Intelligence, MiFor, 2010, pp. 59–64. ACM Multimedia (2010)

    Google Scholar 

  16. Lynch, G., Shih, F.Y., Liao, H.Y.M.: An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239, 253–265 (2013)

    Article  Google Scholar 

  17. Ryu, S.-J., Lee, M.-J., Lee, H.-K.: Detection of copy-rotate-move forgery using Zernike moments. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 51–65. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Yang, J., Ran, P., Xiao, D., Tan, J.: Digital image forgery forensics by using undecimated dyadic wavelet transform and Zernike moments. J. Comput. Inf. Syst. 9, 6399–6408 (2013)

    Google Scholar 

  19. Ting, Z., Rang-Ding, W.: Copy-move forgery detection based on SVD in digital image. In: Proceedings of the 2009 2nd International Congress on Image and Signal Processing, CISP 2009 (2009)

    Google Scholar 

  20. Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceedings of 2007 IEEE International Conference on Multimedia and Expo, pp.1750–1753 (2007)

    Google Scholar 

  21. Hu, M.K.: Visual pattern recognition by moment invariants. IRE Trans. Inf. Theory 8, 179–187 (1962)

    MATH  Google Scholar 

  22. Kim, H.S., Lee, H.K.: Invariant image watermark using Zernike moments. IEEE Trans. Circuit Syst. Video Technol. 13(8), 766–775 (2003)

    Article  Google Scholar 

  23. Teh, C.H., Chin, R.T.: On image analysis by the methods of moments. IEEE Trans. Pattern Anal. Mach. Intell. 10(4), 496–513 (1988)

    Article  MATH  Google Scholar 

  24. Ryu, S.J., Kirchner, M., Lee, M.J., Lee, H.K.: Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Inf. Forensics Secur. 8, 1355–1370 (2013)

    Article  Google Scholar 

  25. Chawla, N.: In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook SE - 40. Springer, Heidelberg (2005)

    Google Scholar 

  26. Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2009)

    Google Scholar 

Download references

Acknowledgment

The authors would like to acknowledge the financial assistance provided by Universiti Sains Malaysia via TPLN USM. They would also like to thank S.J. Ryu et al. [17] for sharing their code.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bee Ee Khoo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Al-Qershi, O.M., Khoo, B.E. (2015). Enhanced Matching Method for Copy-Move Forgery Detection by Means of Zernike Moments. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics