Skip to main content

2017 | OriginalPaper | Buchkapitel

An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points

verfasst von : Yong Liu, Hong-Xia Wang, Han-Zhou Wu, Yi Chen

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Region duplication is a commonly used operation in digital image processing. Since region duplication could be utilized to easily tamper the raw content by intentional attackers, it has become a very important topic in image forensics. Most of the existing detection methods designed to region duplication are based on the exhaustive block-matching of image pixels or transformed coefficients. They may be not efficient when the duplicate regions are relatively smooth, or processed by some geometrical transformations. This has motivated us to propose a reliable copy-move forgery detection algorithm based on super-pixel segmentation and Harris key-points to improve the detection accuracy due to these specified attacks. For a given image, the proposed method first uses SLIC super-pixel segmentation and cluster analysis technique to partition the image content into complex regions and smooth regions. Then, a region description method based on sector mean is introduced to represent the relatively small image regions around each Harris point by adopting a well-designed feature vector. Thereafter, for both complex regions and smooth regions, we perform the feature matching operation, which is finally exploited to locate the tampered region. Experimental results have shown that, our algorithm significantly outperform some related works in terms of the detection accuracy when the test images are processed by blurring, adding noise, JPEG compression and rotating, which has shown the superior of our work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRef Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRef
2.
Zurück zum Zitat Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceeding on Digital Forensic Research Workshop, August 2003 Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceeding on Digital Forensic Research Workshop, August 2003
3.
Zurück zum Zitat Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions in computer science. Dartmouth College, Technical Report TR2004-515 (2004) Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions in computer science. Dartmouth College, Technical Report TR2004-515 (2004)
4.
Zurück zum Zitat Li, G., Wu, Q., Tu, D., Sun, S.J.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceeding of IEEE International Conference on Multimedia Expo (ICME), Beijing, 1750–1753, July 2007 Li, G., Wu, Q., Tu, D., Sun, S.J.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceeding of IEEE International Conference on Multimedia Expo (ICME), Beijing, 1750–1753, July 2007
5.
Zurück zum Zitat Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 1053–1056. IEEE (2015) Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 1053–1056. IEEE (2015)
6.
Zurück zum Zitat Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2–3), 180–189 (2007)CrossRef Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171(2–3), 180–189 (2007)CrossRef
7.
Zurück zum Zitat Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital image. Chin. J. Comput. 4(11), 746–749 (2007) Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital image. Chin. J. Comput. 4(11), 746–749 (2007)
8.
Zurück zum Zitat Khan, E.S., Kulkarni, E.A.: An efficient method for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Sci. Eng. 2(5), 1801–1806 (2010) Khan, E.S., Kulkarni, E.A.: An efficient method for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Sci. Eng. 2(5), 1801–1806 (2010)
9.
Zurück zum Zitat Shih, F.Y., Yuan, Y.: A comparison study on copy-cover image forgery detection. Open Artif. Intell. J. 4(1), 49–54 (2010)CrossRef Shih, F.Y., Yuan, Y.: A comparison study on copy-cover image forgery detection. Open Artif. Intell. J. 4(1), 49–54 (2010)CrossRef
10.
Zurück zum Zitat Lynch, G., Shih, F.Y., Liao, H.Y.M.: An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239(4), 253–265 (2013)CrossRef Lynch, G., Shih, F.Y., Liao, H.Y.M.: An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239(4), 253–265 (2013)CrossRef
11.
Zurück zum Zitat Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using sift algorithm. In: The Workshop on Computational Intelligence & Industrial Application, pp. 272–276. IEEE (2008) Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using sift algorithm. In: The Workshop on Computational Intelligence & Industrial Application, pp. 272–276. IEEE (2008)
12.
Zurück zum Zitat Zhou, Z., Wang, Y., Wu, J.Q.M., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017). doi:10.1109/TIFS.2016.2601065 CrossRef Zhou, Z., Wang, Y., Wu, J.Q.M., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2017). doi:10.​1109/​TIFS.​2016.​2601065 CrossRef
13.
Zurück zum Zitat Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef
14.
Zurück zum Zitat Kumar, S., Desai, J., Mukherjee, S.: A fast keypoint based hybrid method for copy move forgery detection. Int. J. Comput. Digital Syst. 4(2), 91–99 (2015)CrossRef Kumar, S., Desai, J., Mukherjee, S.: A fast keypoint based hybrid method for copy move forgery detection. Int. J. Comput. Digital Syst. 4(2), 91–99 (2015)CrossRef
15.
Zurück zum Zitat Chen, L., Lu, W., Ni, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Present. 24(3), 244–254 (2013)CrossRef Chen, L., Lu, W., Ni, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Present. 24(3), 244–254 (2013)CrossRef
17.
Zurück zum Zitat Wang, X., He, G., Tang, C.: Keypoints-based image passive forensics method for copy-move attacks. Int. J. Pattern Recognit. Artif. Intell. 30(3), 304–308 (2016)MathSciNet Wang, X., He, G., Tang, C.: Keypoints-based image passive forensics method for copy-move attacks. Int. J. Pattern Recognit. Artif. Intell. 30(3), 304–308 (2016)MathSciNet
18.
Zurück zum Zitat Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: SLIC super pixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 2274–2282 (2012)CrossRef Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., Susstrunk, S.: SLIC super pixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 2274–2282 (2012)CrossRef
19.
Zurück zum Zitat Zheng, Y., Jeon, B., Xu, D., Wu, J.Q.M., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), pp. 961–973 (2015). DOI:10.3233/IFS-141378,2015 Zheng, Y., Jeon, B., Xu, D., Wu, J.Q.M., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), pp. 961–973 (2015). DOI:10.​3233/​IFS-141378,2015
20.
Zurück zum Zitat Harris, C.; Stephens, M.: A combined corner and edge detector. In: Proceedings of the Alvey Vision Conference, Manchester, UK, 2 September 1988 Harris, C.; Stephens, M.: A combined corner and edge detector. In: Proceedings of the Alvey Vision Conference, Manchester, UK, 2 September 1988
21.
Zurück zum Zitat Yan-Ming, M., Mei-Hui, L., Yun-Qiong, W., Qiao-Sheng, F.: An improved corner detection method based on Harris. Comput. Technol. Develop. 19(5), 130–133 (2009) Yan-Ming, M., Mei-Hui, L., Yun-Qiong, W., Qiao-Sheng, F.: An improved corner detection method based on Harris. Comput. Technol. Develop. 19(5), 130–133 (2009)
22.
Zurück zum Zitat Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move at tack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef Atnerini, I., Ballan, L., Caldelli, R., et al.: A SIFT-based forensic method for copy-move at tack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef
23.
Zurück zum Zitat Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381–395 (1981)CrossRefMathSciNet Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381–395 (1981)CrossRefMathSciNet
24.
Zurück zum Zitat Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security (WIFS), 119–124 (2014) Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security (WIFS), 119–124 (2014)
Metadaten
Titel
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points
verfasst von
Yong Liu
Hong-Xia Wang
Han-Zhou Wu
Yi Chen
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68505-2_6