Skip to main content
Top

2017 | OriginalPaper | Chapter

Comparison of Matching Methods for Copy-Move Image Forgery Detection

Authors : Osamah M. Al-Qershi, Bee Ee Khoo

Published in: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Copy-Move is one of the most common image forgery types, where a region of an image is copied and pasted into another location of the same image. Such a forgery is simple to achieve but hard to be detected as the pasted region shares the same characteristics with the image. Although plenty of algorithms have been proposed to tackle the copy-move detection problem, those algorithms differ in two things; matching method and type of features. In this paper, we focus on analyzing and comparing four matching methods in terms of accuracy and robustness against different image processing operations. Such analysis and comparison provide indispensable information for the design of new accurate and reliable copy-move detection techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process: Image Commun 25:389–399 Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process: Image Commun 25:389–399
2.
go back to reference Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multim Tools Appl 51:133–162CrossRef Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multim Tools Appl 51:133–162CrossRef
3.
go back to reference Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284–295CrossRef Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284–295CrossRef
4.
go back to reference Kim HS, Lee HK (2003) Invariant image watermark using zernike moments. IEEE Trans Circuits Syst Video Technol 13:766–775CrossRef Kim HS, Lee HK (2003) Invariant image watermark using zernike moments. IEEE Trans Circuits Syst Video Technol 13:766–775CrossRef
5.
go back to reference Teh CH, Chin RT (1988) On image analysis by the methods of moments. IEEE Trans Pattern Anal Mach Intell 10:496–513CrossRefMATH Teh CH, Chin RT (1988) On image analysis by the methods of moments. IEEE Trans Pattern Anal Mach Intell 10:496–513CrossRefMATH
6.
go back to reference Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91:1759–1770CrossRefMATH Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91:1759–1770CrossRefMATH
7.
go back to reference Al-Qershi OM, Khoo BE (2014) Enhanced matching method for copy-move forgery detection by means of zernike moments. In: Digital-forensics and watermarking. Springer, pp 485–497 Al-Qershi OM, Khoo BE (2014) Enhanced matching method for copy-move forgery detection by means of zernike moments. In: Digital-forensics and watermarking. Springer, pp 485–497
8.
go back to reference Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRef Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265CrossRef
9.
go back to reference Bentley JL (1975) Multidimensional binary search trees used for associative searching. Commun ACM 18:509–517CrossRefMATH Bentley JL (1975) Multidimensional binary search trees used for associative searching. Commun ACM 18:509–517CrossRefMATH
10.
go back to reference Shivakumar B, Baboo LDSS (2011) Detection of region duplication forgery in digital images using surf. IJCSI Int J Comput Sci Issues 8 Shivakumar B, Baboo LDSS (2011) Detection of region duplication forgery in digital images using surf. IJCSI Int J Comput Sci Issues 8
11.
go back to reference Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: The 3rd Canadian conference on computer and robot vision, 2006. IEEE, pp 64–64 Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: The 3rd Canadian conference on computer and robot vision, 2006. IEEE, pp 64–64
12.
go back to reference Indyk P, Motwani R (1998) Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, ACM, pp 604–613 Indyk P, Motwani R (1998) Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, ACM, pp 604–613
13.
go back to reference Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur 8:1355–1370CrossRef Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur 8:1355–1370CrossRef
14.
go back to reference Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224:59–67CrossRef Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224:59–67CrossRef
15.
go back to reference Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. In: Information hiding. Springer, pp 51–65 Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. In: Information hiding. Springer, pp 51–65
Metadata
Title
Comparison of Matching Methods for Copy-Move Image Forgery Detection
Authors
Osamah M. Al-Qershi
Bee Ee Khoo
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1721-6_23