Skip to main content
Top

2020 | OriginalPaper | Chapter

5. Copy-Move Forgery Detection with Similar But Genuine Objects

Authors : Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty

Published in: Digital Image Forensics

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Copy-Move Forgery Detection (CMFD) is a classic image forensics problem. However, CMFD with Similar but Genuine Objects (SGO) has received relatively less attention in the current literature. Recently, it has been observed that state-of-the-art CMFD techniques are not quite effective in solving this important yet less explored problem variant. We have addressed this specific problem by using Rotated Local Binary Pattern (RLBP) texture features, followed by feature matching by Generalized 2-Nearest Neighborhood (g2NN) technique, agglomerative hierarchical clustering, and geometric transformation estimation through homography computation among the clusters. Experimental results verify that our CMFD framework not only outperforms the state-of-the-art CMFD schemes for tampered images having similar but genuine objects, but also commensurates with the accuracy of state-of-the-art schemes for other copy-move forgery types. The proposed method has also been found to be robust with respect to several post-processing operations, e.g., compression and filtering.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., Serra, G.: Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Process. Image Commun. 28(6), 659–669 (2013) Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., Serra, G.: Copy-move forgery detection and localization by means of robust clustering with j-linkage. Signal Process. Image Commun. 28(6), 659–669 (2013)
2.
go back to reference Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRef
3.
go back to reference Bay, H., Tuytelaars, T., Van Gool, L.: Surf: speeded up robust features. In: European Conference on Computer Vision, pp. 404–417. Springer (2006) Bay, H., Tuytelaars, T., Van Gool, L.: Surf: speeded up robust features. In: European Conference on Computer Vision, pp. 404–417. Springer (2006)
4.
go back to reference Chen, L., Wei, L., Ni, J., Wei, S., Huang, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3), 244–254 (2013)CrossRef Chen, L., Wei, L., Ni, J., Wei, S., Huang, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3), 244–254 (2013)CrossRef
5.
go back to reference Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRef Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRef
6.
go back to reference Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284–2297 (2015)CrossRef Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284–2297 (2015)CrossRef
7.
go back to reference Davarzani, R., Yaghmaie, K., Mozaffari, S., Tapak, M.: Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci. Int. 231(1), 61–72 (2013)CrossRef Davarzani, R., Yaghmaie, K., Mozaffari, S., Tapak, M.: Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci. Int. 231(1), 61–72 (2013)CrossRef
8.
go back to reference Fridrich, A.J., Soukal, B.D., Lukáš, A.J. Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop. Citeseer (2003) Fridrich, A.J., Soukal, B.D., Lukáš, A.J. Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop. Citeseer (2003)
9.
go back to reference Friedman, J., Hastie, T., Tibshirani, R.: The Elements of Statistical Learning, vol 1. Springer series in statistics Springer, Berlin (2001) Friedman, J., Hastie, T., Tibshirani, R.: The Elements of Statistical Learning, vol 1. Springer series in statistics Springer, Berlin (2001)
10.
go back to reference Guo, J., Liu, Y.-F., Wu, Z.-J.: Duplication forgery detection using improved daisy descriptor. Expert. Syst. Appl. 40(2), 707–714 (2013)CrossRef Guo, J., Liu, Y.-F., Wu, Z.-J.: Duplication forgery detection using improved daisy descriptor. Expert. Syst. Appl. 40(2), 707–714 (2013)CrossRef
11.
go back to reference Hartley R., Zisserman A.: Multiple View Geometry in Computer Vision. Cambridge University Press, Cambridge (2003) Hartley R., Zisserman A.: Multiple View Geometry in Computer Vision. Cambridge University Press, Cambridge (2003)
12.
go back to reference Huang, H., Guo, W., Zhang, Yu.: Detection of copy-move forgery in digital images using sift algorithm. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA’08, vol. 2, pp. 272–276. IEEE (2008) Huang, H., Guo, W., Zhang, Yu.: Detection of copy-move forgery in digital images using sift algorithm. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA’08, vol. 2, pp. 272–276. IEEE (2008)
13.
go back to reference Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. In: 2008 International Conference on Computer Science and Software Engineering, vol. 3, pp. 926–930. IEEE (2008) Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. In: 2008 International Conference on Computer Science and Software Engineering, vol. 3, pp. 926–930. IEEE (2008)
14.
go back to reference Li, W., Yu, N.: Rotation robust detection of copy-move forgery. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2113–2116. IEEE (2010) Li, W., Yu, N.: Rotation robust detection of copy-move forgery. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2113–2116. IEEE (2010)
15.
go back to reference Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004)CrossRef Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004)CrossRef
16.
go back to reference Mehta, R., Egiazarian, K.O.: Rotated local binary pattern (rlbp)-rotation invariant texture descriptor. In: ICPRAM, pp. 497–502 (2013) Mehta, R., Egiazarian, K.O.: Rotated local binary pattern (rlbp)-rotation invariant texture descriptor. In: ICPRAM, pp. 497–502 (2013)
17.
go back to reference Méndez-Vázquez, H., García-Reyes, E., Condes-Molleda, Y.: A new combination of local appearance based methods for face recognition under varying lighting conditions. In: Iberoamerican Congress on Pattern Recognition, pp. 535–542. Springer (2008) Méndez-Vázquez, H., García-Reyes, E., Condes-Molleda, Y.: A new combination of local appearance based methods for face recognition under varying lighting conditions. In: Iberoamerican Congress on Pattern Recognition, pp. 535–542. Springer (2008)
18.
go back to reference Muhammad, G., Muhammad, H., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1), 49–57 (2012)CrossRef Muhammad, G., Muhammad, H., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1), 49–57 (2012)CrossRef
20.
go back to reference Pan, X., Lyu, S.: Region duplication detection using image feature matching. IEEE Trans. Inf. Forensics Secur. 5(4), 857–867 (2010)CrossRef Pan, X., Lyu, S.: Region duplication detection using image feature matching. IEEE Trans. Inf. Forensics Secur. 5(4), 857–867 (2010)CrossRef
21.
go back to reference Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515, Department of Computer Science, Dartmouth College (2004) Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515, Department of Computer Science, Dartmouth College (2004)
22.
go back to reference Roy, A., Konda, A., Chakraborty, R.S.: Copy move forgery detection with similar but genuine objects. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 4083–4087. IEEE (2017) Roy, A., Konda, A., Chakraborty, R.S.: Copy move forgery detection with similar but genuine objects. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 4083–4087. IEEE (2017)
23.
go back to reference Ryu, S.-J., Lee, M.-J. Lee, H.-K.: Detection of copy-rotate-move forgery using zernike moments. In: International Workshop on Information Hiding, pp. 51–65. Springer (2010) Ryu, S.-J., Lee, M.-J. Lee, H.-K.: Detection of copy-rotate-move forgery using zernike moments. In: International Workshop on Information Hiding, pp. 51–65. Springer (2010)
24.
go back to reference Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: Comofod–new database for copy-move forgery detection. In: 2013 55th International Symposium on ELMAR, pp. 49–54. IEEE (2013) Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: Comofod–new database for copy-move forgery detection. In: 2013 55th International Symposium on ELMAR, pp. 49–54. IEEE (2013)
25.
go back to reference Wen, B., Zhu, Y., Subramanian, R., Ng, T.-T., Shen, X., Winkler, S.: Coverage–a novel database for copy-move forgery detection. In 2016 IEEE International Conference on Image Processing (ICIP), pp. 161–165. IEEE (2016) Wen, B., Zhu, Y., Subramanian, R., Ng, T.-T., Shen, X., Winkler, S.: Coverage–a novel database for copy-move forgery detection. In 2016 IEEE International Conference on Image Processing (ICIP), pp. 161–165. IEEE (2016)
26.
go back to reference Xu, B., Wang, J., Liu, G., and Dai, Y.: Image copy-move forgery detection based on surf. In: 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 889–892. IEEE (2010) Xu, B., Wang, J., Liu, G., and Dai, Y.: Image copy-move forgery detection based on surf. In: 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 889–892. IEEE (2010)
27.
go back to reference Yuille, A.: Lecture 10: the lambertian reflectance model (2012) Yuille, A.: Lecture 10: the lambertian reflectance model (2012)
28.
go back to reference Zhu, Y., Ng, T.-T., Shen, X., Wen, B.: Revisiting copy-move forgery detection by considering realistic image with similar but genuine objects. arXiv preprint. arXiv:1601.07262 (2016) Zhu, Y., Ng, T.-T., Shen, X., Wen, B.: Revisiting copy-move forgery detection by considering realistic image with similar but genuine objects. arXiv preprint. arXiv:​1601.​07262 (2016)
Metadata
Title
Copy-Move Forgery Detection with Similar But Genuine Objects
Authors
Aniket Roy
Rahul Dixit
Ruchira Naskar
Rajat Subhra Chakraborty
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7644-2_5