Skip to main content

An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10602))

Abstract

Region duplication is a commonly used operation in digital image processing. Since region duplication could be utilized to easily tamper the raw content by intentional attackers, it has become a very important topic in image forensics. Most of the existing detection methods designed to region duplication are based on the exhaustive block-matching of image pixels or transformed coefficients. They may be not efficient when the duplicate regions are relatively smooth, or processed by some geometrical transformations. This has motivated us to propose a reliable copy-move forgery detection algorithm based on super-pixel segmentation and Harris key-points to improve the detection accuracy due to these specified attacks. For a given image, the proposed method first uses SLIC super-pixel segmentation and cluster analysis technique to partition the image content into complex regions and smooth regions. Then, a region description method based on sector mean is introduced to represent the relatively small image regions around each Harris point by adopting a well-designed feature vector. Thereafter, for both complex regions and smooth regions, we perform the feature matching operation, which is finally exploited to locate the tampered region. Experimental results have shown that, our algorithm significantly outperform some related works in terms of the detection accuracy when the test images are processed by blurring, adding noise, JPEG compression and rotating, which has shown the superior of our work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)

    Article  Google Scholar 

  2. Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceeding on Digital Forensic Research Workshop, August 2003

    Google Scholar 

  3. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions in computer science. Dartmouth College, Technical Report TR2004-515 (2004)

    Google Scholar 

  4. Li, G., Wu, Q., Tu, D., Sun, S.J.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceeding of IEEE International Conference on Multimedia Expo (ICME), Beijing, 1750–1753, July 2007

    Google Scholar 

  5. Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 1053–1056. IEEE (2015)

    Google Scholar 

  6. Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2–3), 180–189 (2007)

    Article  Google Scholar 

  7. Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital image. Chin. J. Comput. 4(11), 746–749 (2007)

    Google Scholar 

  8. Khan, E.S., Kulkarni, E.A.: An efficient method for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Sci. Eng. 2(5), 1801–1806 (2010)

    Google Scholar 

  9. Shih, F.Y., Yuan, Y.: A comparison study on copy-cover image forgery detection. Open Artif. Intell. J. 4(1), 49–54 (2010)

    Article  Google Scholar 

  10. Lynch, G., Shih, F.Y., Liao, H.Y.M.: An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239(4), 253–265 (2013)

    Article  Google Scholar 

  11. Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using sift algorithm. In: The Workshop on Computational Intelligence & Industrial Application, pp. 272–276. IEEE (2008)

    Google Scholar 

  12. Zhou, Z., Wang, Y., Wu, J.Q.M., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017). doi:10.1109/TIFS.2016.2601065

    Article  Google Scholar 

  13. Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  14. Kumar, S., Desai, J., Mukherjee, S.: A fast keypoint based hybrid method for copy move forgery detection. Int. J. Comput. Digital Syst. 4(2), 91–99 (2015)

    Article  Google Scholar 

  15. Chen, L., Lu, W., Ni, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Present. 24(3), 244–254 (2013)

    Article  Google Scholar 

  16. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015). doi:10.1109/TIFS.2014.2381872

    Article  Google Scholar 

  17. Wang, X., He, G., Tang, C.: Keypoints-based image passive forensics method for copy-move attacks. Int. J. Pattern Recognit. Artif. Intell. 30(3), 304–308 (2016)

    MathSciNet  Google Scholar 

  18. Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: SLIC super pixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 2274–2282 (2012)

    Article  Google Scholar 

  19. Zheng, Y., Jeon, B., Xu, D., Wu, J.Q.M., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), pp. 961–973 (2015). DOI:10.3233/IFS-141378,2015

  20. Harris, C.; Stephens, M.: A combined corner and edge detector. In: Proceedings of the Alvey Vision Conference, Manchester, UK, 2 September 1988

    Google Scholar 

  21. Yan-Ming, M., Mei-Hui, L., Yun-Qiong, W., Qiao-Sheng, F.: An improved corner detection method based on Harris. Comput. Technol. Develop. 19(5), 130–133 (2009)

    Google Scholar 

  22. Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move at tack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  23. Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381–395 (1981)

    Article  MathSciNet  Google Scholar 

  24. Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security (WIFS), 119–124 (2014)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong-Xia Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Y., Wang, HX., Wu, HZ., Chen, Y. (2017). An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10602. Springer, Cham. https://doi.org/10.1007/978-3-319-68505-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68505-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68504-5

  • Online ISBN: 978-3-319-68505-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics