Skip to main content
Erschienen in: Soft Computing 1/2024

15.04.2023 | Application of soft computing

High-performance image forgery detection via adaptive SIFT feature extraction for low-contrast or small or smooth copy–move region images

verfasst von: J. S. Sujin, S. Sophia

Erschienen in: Soft Computing | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to their robustness against large-scale geometric transformations, keypoint-based detection methods play an important role in revealing copy–move evidence. However, where copy–move forgeries are only involved in low-contrast or small or smooth regions, these approaches do not yield high-performance results because the number of keypoints in these regions is very limited. We recommend a highly efficient copy–move forgery detection algorithm by ADaptive Scale-Invariant Feature Transform (ADSIFT). Initially, by adapting the gamma factor for contrast threshold and rescaling factor values for feature matching and forgery detection, we produce an adequate number of keypoints that occur even in low-contrast or small or smooth regions of noisy or noiseless images. The proposed approach delivers greater performance than the existing methods as compared to precision and efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef
Zurück zum Zitat Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659–669CrossRef Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process Image Commun 28(6):659–669CrossRef
Zurück zum Zitat Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) PatchMatch: a randomized correspondence algorithm for structural image editing. ACM Trans Graph 28(3):24CrossRef Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) PatchMatch: a randomized correspondence algorithm for structural image editing. ACM Trans Graph 28(3):24CrossRef
Zurück zum Zitat Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing, pp 1053–1056. IEEE Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: 2009 IEEE international conference on acoustics, speech and signal processing, pp 1053–1056. IEEE
Zurück zum Zitat Bi X, Pun CM (2017) Fast reflective offset-guided searching method for copy-move forgery detection. Inf Sci 418:531–545CrossRef Bi X, Pun CM (2017) Fast reflective offset-guided searching method for copy-move forgery detection. Inf Sci 418:531–545CrossRef
Zurück zum Zitat Birinci M, Diaz-de-Maria F, Abdollahian G, Delp EJ, Gabbouj M (2011) Neighborhood matching for object recognition algorithms based on local image features. In: 2011 digital signal processing and signal processing education meeting (DSP/SPE), pp 157–162. IEEE Birinci M, Diaz-de-Maria F, Abdollahian G, Delp EJ, Gabbouj M (2011) Neighborhood matching for object recognition algorithms based on local image features. In: 2011 digital signal processing and signal processing education meeting (DSP/SPE), pp 157–162. IEEE
Zurück zum Zitat Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1880–1883. IEEE Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1880–1883. IEEE
Zurück zum Zitat Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef
Zurück zum Zitat Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297CrossRef
Zurück zum Zitat Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP), pp 5312–5316. IEEE Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP), pp 5312–5316. IEEE
Zurück zum Zitat Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRef Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRef
Zurück zum Zitat Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop
Zurück zum Zitat Friedman J, Hastie T, Tibshirani R (2001) The elements of statistical learning, vol 1, no 10. Springer series in statistics, New York Friedman J, Hastie T, Tibshirani R (2001) The elements of statistical learning, vol 1, no 10. Springer series in statistics, New York
Zurück zum Zitat Guo JM, Liu YF, Wu ZJ (2013) Duplication forgery detection using improved DAISY descriptor. Expert Syst Appl 40(2):707–714CrossRef Guo JM, Liu YF, Wu ZJ (2013) Duplication forgery detection using improved DAISY descriptor. Expert Syst Appl 40(2):707–714CrossRef
Zurück zum Zitat Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef
Zurück zum Zitat Kim D, Rho S, Hwang E (2012) Local feature-based multi-object recognition scheme for surveillance. Eng Appl Artif Intell 25(7):1373–1380CrossRef Kim D, Rho S, Hwang E (2012) Local feature-based multi-object recognition scheme for surveillance. Eng Appl Artif Intell 25(7):1373–1380CrossRef
Zurück zum Zitat Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur 14(5):1307–1322CrossRef Li Y, Zhou J (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur 14(5):1307–1322CrossRef
Zurück zum Zitat Li J, Li X, Yang B, Sun X (2014) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518 Li J, Li X, Yang B, Sun X (2014) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518
Zurück zum Zitat Li Y, Zhou J, Cheng A, Liu X, Tang YY (2016) SIFT keypoint removal and injection via convex relaxation. IEEE Trans Inf Forensics Secur 11(8):1722–1735CrossRef Li Y, Zhou J, Cheng A, Liu X, Tang YY (2016) SIFT keypoint removal and injection via convex relaxation. IEEE Trans Inf Forensics Secur 11(8):1722–1735CrossRef
Zurück zum Zitat Li Y, Zhou J, Cheng A (2017) SIFT keypoint removal via directed graph construction for color images. IEEE Trans Inf Forensics Secur 12(12):2971–2985CrossRef Li Y, Zhou J, Cheng A (2017) SIFT keypoint removal via directed graph construction for color images. IEEE Trans Inf Forensics Secur 12(12):2971–2985CrossRef
Zurück zum Zitat Li Y, Zhou J (2016) Image copy-move forgery detection using hierarchical feature point matching. In: 2016 Asia-pacific signal and information processing association annual summit and conference (APSIPA), pp 1–4. IEEE Li Y, Zhou J (2016) Image copy-move forgery detection using hierarchical feature point matching. In: 2016 Asia-pacific signal and information processing association annual summit and conference (APSIPA), pp 1–4. IEEE
Zurück zum Zitat Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91–110CrossRef Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91–110CrossRef
Zurück zum Zitat Mian A, Bennamoun M, Owens R (2010) On the repeatability and quality of keypoints for local feature-based 3d object retrieval from cluttered scenes. Int J Comput Vision 89(2):348–361CrossRef Mian A, Bennamoun M, Owens R (2010) On the repeatability and quality of keypoints for local feature-based 3d object retrieval from cluttered scenes. Int J Comput Vision 89(2):348–361CrossRef
Zurück zum Zitat Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1615–1630CrossRef Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1615–1630CrossRef
Zurück zum Zitat Mikulka J, Gescheidtova E, Bartusek K (2012) Soft-tissues image processing: comparison of traditional segmentation methods with 2D active contour methods. Meas Science Review 12(4):153–161CrossRef Mikulka J, Gescheidtova E, Bartusek K (2012) Soft-tissues image processing: comparison of traditional segmentation methods with 2D active contour methods. Meas Science Review 12(4):153–161CrossRef
Zurück zum Zitat Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRef Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRef
Zurück zum Zitat Ouyang W, Tombari F, Mattoccia S, Di Stefano L, Cham WK (2011) Performance evaluation of full search equivalent pattern matching algorithms. IEEE Trans Pattern Anal Mach Intell 34(1):127–143CrossRef Ouyang W, Tombari F, Mattoccia S, Di Stefano L, Cham WK (2011) Performance evaluation of full search equivalent pattern matching algorithms. IEEE Trans Pattern Anal Mach Intell 34(1):127–143CrossRef
Zurück zum Zitat Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRef Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRef
Zurück zum Zitat Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions
Zurück zum Zitat Qin Z, Yan J, Ren K, Chen CW, Wang C (2014) Towards efficient privacy-preserving image feature extraction in cloud computing. In: Proceedings of the 22nd ACM international conference on Multimedia, pp 497–506 Qin Z, Yan J, Ren K, Chen CW, Wang C (2014) Towards efficient privacy-preserving image feature extraction in cloud computing. In: Proceedings of the 22nd ACM international conference on Multimedia, pp 497–506
Zurück zum Zitat Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef
Zurück zum Zitat Shivakumar BL, Baboo SS (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues (IJCSI) 8(4):199 Shivakumar BL, Baboo SS (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues (IJCSI) 8(4):199
Zurück zum Zitat Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J vis Commun Image Represent 29:16–32CrossRef Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J vis Commun Image Represent 29:16–32CrossRef
Zurück zum Zitat Vedaldi A, Fulkerson B (2010) VLFeat: An open and portable library of computer vision algorithms. In: Proceedings of the 18th ACM international conference on multimedia, pp 1469–1472 Vedaldi A, Fulkerson B (2010) VLFeat: An open and portable library of computer vision algorithms. In: Proceedings of the 18th ACM international conference on multimedia, pp 1469–1472
Zurück zum Zitat Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur 11(11):2499–2512CrossRef Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur 11(11):2499–2512CrossRef
Zurück zum Zitat Zhao J, Zhao W (2013) Passive forensics for region duplication image forgery based on harris feature points and local binary patterns. Math Prob Eng 2013 Zhao J, Zhao W (2013) Passive forensics for region duplication image forgery based on harris feature points and local binary patterns. Math Prob Eng 2013
Zurück zum Zitat Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166CrossRef Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166CrossRef
Metadaten
Titel
High-performance image forgery detection via adaptive SIFT feature extraction for low-contrast or small or smooth copy–move region images
verfasst von
J. S. Sujin
S. Sophia
Publikationsdatum
15.04.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 1/2024
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-023-08209-6

Weitere Artikel der Ausgabe 1/2024

Soft Computing 1/2024 Zur Ausgabe

Premium Partner