Skip to main content
Top
Published in: Pattern Analysis and Applications 2/2018

31-10-2016 | Theoretical Advances

Robust copy–move forgery detection using quaternion exponent moments

Authors: Xiang-yang Wang, Yu-nan Liu, Huan Xu, Pei Wang, Hong-ying Yang

Published in: Pattern Analysis and Applications | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The detection of forgeries in color images is a very important topic in forensic science. Copy–move (or copy–paste) forgery is the most common form of tampering associated with color images. Conventional copy–move forgeries detection techniques usually suffer from the problems of false positives and susceptibility to many signal processing operations. It is a challenging work to design a robust copy–move forgery detection method. In this paper, we present a novel block-based robust copy–move forgery detection approach using invariant quaternion exponent moments (QEMs). Firstly, original tempered color image is preprocessed with Gaussian low-pass filter, and the filtered color image is divided into overlapping circular blocks. Then, the accurate and robust feature descriptor, QEMs modulus, is extracted from color image block holistically as a vector field. Finally, exact Euclidean locality sensitive hashing is utilized to find rapidly the matching blocks, and the falsely matched block pairs are removed by customizing the random sample consensus with QEMs magnitudes differences. Extensive experimental results show the efficacy of the newly proposed approach in detecting copy–paste forgeries under various challenging conditions, such as noise addition, lossy compression, scaling, and rotation. We obtain the average forgery detection accuracy (F-measure) in excess of 96 and 88% across postprocessing operations, at image level and at pixel level, respectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Muhammad AQ, Mohamed D (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46–74 Muhammad AQ, Mohamed D (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46–74
2.
go back to reference Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy–move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy–move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef
3.
go back to reference Chambers J, Yan W, Garhwal A (2015) Currency security and forensics: a survey. Multimed Tools Appl 74(11):4013–4043CrossRef Chambers J, Yan W, Garhwal A (2015) Currency security and forensics: a survey. Multimed Tools Appl 74(11):4013–4043CrossRef
4.
go back to reference Ali Qureshi M, Deriche M (2014) A review on copy move image forgery detection techniques. In: 11th International multi-conference on systems, signals and devices (SSD). Barcelona, Spain, pp 1–5 Ali Qureshi M, Deriche M (2014) A review on copy move image forgery detection techniques. In: 11th International multi-conference on systems, signals and devices (SSD). Barcelona, Spain, pp 1–5
5.
go back to reference Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef
6.
go back to reference Al-Qershi OM, Khoo BE (2013) Passive detection of copy–move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1–3):284–295CrossRef Al-Qershi OM, Khoo BE (2013) Passive detection of copy–move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1–3):284–295CrossRef
7.
go back to reference Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef
8.
go back to reference Qazi T, Hayat K, Khan SU (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670CrossRef Qazi T, Hayat K, Khan SU (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670CrossRef
9.
go back to reference Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716CrossRef Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716CrossRef
10.
go back to reference Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). Prague, pp 1880–1883 Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). Prague, pp 1880–1883
11.
go back to reference Ryu SJ, Kirchner M, Lee MJ (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef Ryu SJ, Kirchner M, Lee MJ (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef
12.
go back to reference Davarzani R, Yaghmaie K, Mozaffari S (2013) Copy–move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72CrossRef Davarzani R, Yaghmaie K, Mozaffari S (2013) Copy–move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72CrossRef
13.
go back to reference Cozzolino D, Poggi G, Verdoliva L (2014) Copy–move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP). Paris, France, pp 5312–5316 Cozzolino D, Poggi G, Verdoliva L (2014) Copy–move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP). Paris, France, pp 5312–5316
14.
go back to reference Fattah SA, Ullah MMI, Ahmed M (2014) A scheme for copy–move forgery detection in digital images based on 2D-DWT. In: IEEE 57th international midwest symposium on circuits and systems (MWSCAS). College Station, TX, pp 801–804 Fattah SA, Ullah MMI, Ahmed M (2014) A scheme for copy–move forgery detection in digital images based on 2D-DWT. In: IEEE 57th international midwest symposium on circuits and systems (MWSCAS). College Station, TX, pp 801–804
15.
go back to reference Imamoglu M, Ulutas G, Ulutas M (2013) Detection of copy–move forgery using Krawtchouk moment. In: 2013 8th International conference on electrical and electronics engineering. Bursa, Turkey, pp 311–314 Imamoglu M, Ulutas G, Ulutas M (2013) Detection of copy–move forgery using Krawtchouk moment. In: 2013 8th International conference on electrical and electronics engineering. Bursa, Turkey, pp 311–314
16.
go back to reference Lee J, Chang C, Chen W (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262CrossRef Lee J, Chang C, Chen W (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262CrossRef
17.
go back to reference Wu YJ, Yu D, Duan HB (2014) Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci China Inf Sci 57(1):1–12 Wu YJ, Yu D, Duan HB (2014) Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci China Inf Sci 57(1):1–12
18.
go back to reference Jie Z, Guo J (2013) Passive forensics for copy–move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166 Jie Z, Guo J (2013) Passive forensics for copy–move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166
19.
go back to reference Ketenci S, Ulutas G, Ulutas M (2014) Detection of duplicated regions in images using 1D-Fourier transform. In: International conference on systems, signals and image processing. Dubrovnik, Croatia, pp 171–174 Ketenci S, Ulutas G, Ulutas M (2014) Detection of duplicated regions in images using 1D-Fourier transform. In: International conference on systems, signals and image processing. Dubrovnik, Croatia, pp 171–174
20.
go back to reference Lee JC (2015) Copy–move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334CrossRef Lee JC (2015) Copy–move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334CrossRef
21.
go back to reference Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRef Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRef
22.
go back to reference Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy–move forgery detection by means of Zernike moments. In: 13th International workshop on digital-forensics and watermarking (IWDW 2014), LNCS 9023, pp 485–497 Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy–move forgery detection by means of Zernike moments. In: 13th International workshop on digital-forensics and watermarking (IWDW 2014), LNCS 9023, pp 485–497
23.
go back to reference Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef
24.
go back to reference Silva E, Carvalho T, Ferreira A (2015) Going deeper into copy–move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32CrossRef Silva E, Carvalho T, Ferreira A (2015) Going deeper into copy–move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32CrossRef
25.
go back to reference Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef
26.
go back to reference Caldelli R, Amerini I, Ballan L (2012) On the effectiveness of local warping against SIFT-based copy–move detection. In: Proceedings of the 5th international symposium on communications, control and signal processing. Rome, Italy, pp 1–5 Caldelli R, Amerini I, Ballan L (2012) On the effectiveness of local warping against SIFT-based copy–move detection. In: Proceedings of the 5th international symposium on communications, control and signal processing. Rome, Italy, pp 1–5
27.
go back to reference Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef
28.
go back to reference Costanzo A, Amerini I, Caldelli R (2014) Forensic analysis of SIFT keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(9):1450–1464CrossRef Costanzo A, Amerini I, Caldelli R (2014) Forensic analysis of SIFT keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(9):1450–1464CrossRef
29.
go back to reference Li J, Li X, Yang B (2015) Segmentation-based image copy–move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518MathSciNetCrossRef Li J, Li X, Yang B (2015) Segmentation-based image copy–move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518MathSciNetCrossRef
30.
go back to reference Chen L, Lu W, Ni J, Sun W (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254CrossRef Chen L, Lu W, Ni J, Sun W (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254CrossRef
31.
go back to reference Jaberi M, Bebis G, Hussain M (2014) Accurate and robust localization of duplicated region in copy–move image forgery. Mach Vis Appl 25(2):451–475CrossRef Jaberi M, Bebis G, Hussain M (2014) Accurate and robust localization of duplicated region in copy–move image forgery. Mach Vis Appl 25(2):451–475CrossRef
33.
go back to reference Jiang YJ (2011) Exponent moments and its application in pattern recognition. Beijing University of Posts and Telecommunications, Beijing Jiang YJ (2011) Exponent moments and its application in pattern recognition. Beijing University of Posts and Telecommunications, Beijing
34.
go back to reference Xiang-yang Wang, Pan-pan Niu, Hong-ying Yang, Chun-peng Wang, Ai-long Wang (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754CrossRef Xiang-yang Wang, Pan-pan Niu, Hong-ying Yang, Chun-peng Wang, Ai-long Wang (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754CrossRef
35.
go back to reference Zong T, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717–729CrossRef Zong T, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717–729CrossRef
36.
go back to reference Zhang R, Wei F, Li B (2014) E2LSH based multiple kernel approach for object detection. Neurocomputing 124(2):105–110CrossRef Zhang R, Wei F, Li B (2014) E2LSH based multiple kernel approach for object detection. Neurocomputing 124(2):105–110CrossRef
37.
go back to reference Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRef Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRef
Metadata
Title
Robust copy–move forgery detection using quaternion exponent moments
Authors
Xiang-yang Wang
Yu-nan Liu
Huan Xu
Pei Wang
Hong-ying Yang
Publication date
31-10-2016
Publisher
Springer London
Published in
Pattern Analysis and Applications / Issue 2/2018
Print ISSN: 1433-7541
Electronic ISSN: 1433-755X
DOI
https://doi.org/10.1007/s10044-016-0588-1

Other articles of this Issue 2/2018

Pattern Analysis and Applications 2/2018 Go to the issue

Premium Partner