Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3102304.3102310acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor

Published: 19 July 2017 Publication History

Abstract

Nowadays, with a rapid development of digital image technology, image forgery is made easy. Image forgery has considerable consequences, e.g., medical images, miscarriage of justice, political, etc. For instance, in digital newspapers, forged images will mislead public opinion and falsify the truth. In this paper, we proposed a segmentation-based region duplication forgery detection method, by extracting Maximization of Distinctiveness (MOD) keypoints for matching from segmented regions in the image. The main challenge is when the duplicated regions have been affected by rotation and scaling attacks. As a result, the proposed method detects duplicated regions based on two stages, structure analysis and texture analysis. In the first stage, the doubtful image is segmented into regions using the K-means algorithm. The segmented regions then labeled by centroids and MOD keypoints to represent their internal structures. MOD detects local interest points that are robust to rotation and improve detection rate in term of True Positive Rate (TPR). In the second stage, in order to identify the validated forged region, we explore Multiobjective Gradient Operator (MO-GP) to study the internal texture of segmented regions and eliminate the False Positive Rate (FPR) of forged regions. Experiment results show that our method can detect region duplication forgery under rotation, blurring and noise addition for JPEG images on MICC-F220 dataset with average TPR = 93% and FPR = 2%.

References

[1]
Al-Qershi, O.M. and Khoo, B.E., 2013. Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic science international 231, 1, 284--295.
[2]
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., and Serra, G., 2011. A sift-based forensic method for copy--move attack detection and transformation recovery. Information Forensics and Security, IEEE Transactions on 6, 3, 1099--1110.
[3]
Bo, X., Junwen, W., Guangjie, L., and Yuewei, D., 2010. Image copy-move forgery detection based on SURF. In Multimedia Information Networking and Security (MINES), 2010 International Conference on IEEE, 889--892.
[4]
Cao, Y., Gao, T., Fan, L., and Yang, Q., 2012. A robust detection algorithm for copy-move forgery in digital images. Forensic science international 214, 1, 33--43.
[5]
Chen, L., Lu, W., Ni, J., Sun, W., and Huang, J., 2013. Region duplication detection based on Harris corner points and step sector statistics. Journal of Visual Communication and Image Representation 24, 3, 244--254.
[6]
Chen, T.-W., Chen, Y.-L., and Chien, S.-Y., 2008. Fast image segmentation based on K-Means clustering with histograms in HSV color space. In Multimedia Signal Processing, 2008 IEEE 10th Workshop on IEEE, 322--325.
[7]
Christlein, V., Riess, C., Jordan, J., and Angelopoulou, E., 2012. An evaluation of popular copy-move forgery detection approaches 7, 6, 1841--1854
[8]
Diaa M. Uliyan, H.A.J., Ainuddin W. Abdul Wahab, Palaiahnakote Shivakumara, Somayeh Sadeghi, 2016. A novel forged blurred region detection system for image forensic applications. Expert Syst. Appl. 64, C, 1--10.
[9]
Farid, H., 2008. Digital image forensics. Scientific American 298, 6, 66--71.
[10]
Farid, H., 2009. Image forgery detection. Signal Processing Magazine, IEEE 26, 2, 16--25.
[11]
Farid, H., 2011. Photo Tampering throughout History
[12]
Huang, D.-Y., Lin, T.-W., Hu, W.-C., and Chou, C.-H., 2014. Boosting Scheme for Detecting Region Duplication Forgery in Digital Images. In Genetic and Evolutionary Computing Springer, 125--133.
[13]
Huang, Y., Lu, W., Sun, W., and Long, D., 2011. Improved DCT-based detection of copy-move forgery in images. Forensic science international 206, 1, 178--184.
[14]
Huo, Y., He, H., and Chen, F., 2013. A semi-fragile image watermarking algorithm with two-stage detection. Multimedia Tools and Applications (2013/01/05), 1--27.
[15]
Kakar, P. and Sudha, N., 2012. Exposing postprocessed copy--paste forgeries through transform-invariant features. Information Forensics and Security, IEEE Transactions on 7, 3, 1018--1028.
[16]
Li, B., He, J., Huang, J., and Shi, Y.Q., 2011. A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2, 2, 142--172.
[17]
Luo, W., Qu, Z., Huang, J., and Qiu, G., 2007. A novel method for detecting cropped and recompressed image block. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on IEEE, II-217-II-220.
[18]
Mahdian, B. and Saic, S., 2008. Blind authentication using periodic properties of interpolation. Information Forensics and Security, IEEE Transactions on 3, 3, 529--538.
[19]
Mahdian, B. and Saic, S., 2009. Using noise inconsistencies for blind image forensics. Image and Vision Computing 27, 10, 1497--1503.
[20]
Mikolajczyk, K. and Schmid, C., 2004. Scale & affine invariant interest point detectors. International journal of computer vision 60, 1, 63--86.
[21]
Mishra, P., Mishra, N., Sharma, S., and Patel, R., 2013. Region duplication forgery detection technique based on SURF and HAC. The Scientific World Journal 2013, 8.
[22]
Moghaddasi, Z., Jalab, H.A., Md Noor, R., and Aghabozorgi, S., 2014. Improving RLRN image splicing detection with the use of PCA and kernel PCA. The Scientific World Journal 2014.
[23]
Muhammad, G., Hussain, M., and Bebis, G., 2012. Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Investigation 9, 1, 49--57.
[24]
Nathalie Diane, W.N., Xingming, S., and Moise, F.K., 2014. A Survey of Partition-Based Techniques for Copy-Move Forgery Detection. The Scientific World Journal 2014.
[25]
Oerlemans, A. and Lew, M.S., 2008. Interest points based on maximization of distinctiveness. In Proceedings of the 1st ACM international conference on Multimedia information retrieval ACM, 202--207.
[26]
Olague, G. and Trujillo, L., 2012. Interest point detection through multiobjective genetic programming. Applied Soft Computing 12, 8, 2566--2582.
[27]
Pan, X. and Lyu, S., 2010. Region duplication detection using image feature matching. Information Forensics and Security, IEEE Transactions on 5, 4, 857--867.
[28]
Popescu, A.C. and Farid, H., 2004. Exposing digital forgeries by detecting duplicated image regions. Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004-515.
[29]
Redi, J.A., Taktak, W., and Dugelay, J.-L., 2011. Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51, 1, 133--162.
[30]
Ryu, S.-J., Kirchner, M., Lee, M.-J., and Lee, H.-K., 2013. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. Information Forensics and Security, IEEE Transactions on 8, 8, 1355--1370.
[31]
Sadeghi S, H.A.J., Kok Sheik Wong, Diaa Uliyan, Sajjad Dadkhah, 2016. Keypoint based authentication and localization of copy-move forgery in digital image. Malaysian Journal of Computer Science 2016.
[32]
Shao, H., Yu, T., Xu, M., and Cui, W., 2012. Image region duplication detection based on circular window expansion and phase correlation. Forensic science international 222, 1, 71--82.
[33]
Sheng, G., Gao, T., Cao, Y., Gao, L., and Fan, L., 2012. Robust algorithm for detection of copy-move forgery in digital images based on ridgelet transform. In Artificial Intelligence and Computational Intelligence Springer, 317--323.
[34]
Silva, E., Carvalho, T., Ferreira, A., and Rocha, A., 2015. Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. Journal of Visual Communication and Image Representation 29, 16--32.
[35]
Singh, C. and Ranade, S.K., 2013. Geometrically invariant and high capacity image watermarking scheme using accurate radial transform. Optics & Laser Technology 54, 176--184.
[36]
Sunil, K., Jagan, D., and Shaktidev, M., 2014. DCT-PCA based method for copy-move forgery detection. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II Springer, 577--583.
[37]
Uliyan, D.M., Jalab, H.A., Abdul Wahab, A.W., and Sadeghi, S., 2016. Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points. Symmetry 8, 7, 62.
[38]
Uliyan, D.M., Jalab, H.A., and Wahab, A.W.A., 2015. Copy move image forgery detection using Hessian and center symmetric local binary pattern. In Open Systems (ICOS), 2015 IEEE Confernece on IEEE, 7--11.
[39]
Zimba, M. and Xingming, S., 2011. DWT-PCA(EVD) Based Copy-move Image Forgery Detection. International Journal of Digital Content Technology and its Applications 5, 1.

Cited By

View all
  • (2018)Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)10.1109/ICSCEE.2018.8538432(1-6)Online publication date: Jul-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
July 2017
325 pages
ISBN:9781450348447
DOI:10.1145/3102304
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • LABSTICC: Labsticc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 July 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Image forgery detection
  2. copy move forgery
  3. image forensics
  4. keypoints matching
  5. region duplication

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICFNDS '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)10.1109/ICSCEE.2018.8538432(1-6)Online publication date: Jul-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media