Skip to main content
Erschienen in: Pattern Analysis and Applications 2/2018

31.10.2016 | Theoretical Advances

Robust copy–move forgery detection using quaternion exponent moments

verfasst von: Xiang-yang Wang, Yu-nan Liu, Huan Xu, Pei Wang, Hong-ying Yang

Erschienen in: Pattern Analysis and Applications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The detection of forgeries in color images is a very important topic in forensic science. Copy–move (or copy–paste) forgery is the most common form of tampering associated with color images. Conventional copy–move forgeries detection techniques usually suffer from the problems of false positives and susceptibility to many signal processing operations. It is a challenging work to design a robust copy–move forgery detection method. In this paper, we present a novel block-based robust copy–move forgery detection approach using invariant quaternion exponent moments (QEMs). Firstly, original tempered color image is preprocessed with Gaussian low-pass filter, and the filtered color image is divided into overlapping circular blocks. Then, the accurate and robust feature descriptor, QEMs modulus, is extracted from color image block holistically as a vector field. Finally, exact Euclidean locality sensitive hashing is utilized to find rapidly the matching blocks, and the falsely matched block pairs are removed by customizing the random sample consensus with QEMs magnitudes differences. Extensive experimental results show the efficacy of the newly proposed approach in detecting copy–paste forgeries under various challenging conditions, such as noise addition, lossy compression, scaling, and rotation. We obtain the average forgery detection accuracy (F-measure) in excess of 96 and 88% across postprocessing operations, at image level and at pixel level, respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Muhammad AQ, Mohamed D (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46–74 Muhammad AQ, Mohamed D (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39(Part A):46–74
2.
Zurück zum Zitat Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy–move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef Christlein V, Riess C, Jordan J (2012) An evaluation of popular copy–move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854CrossRef
3.
Zurück zum Zitat Chambers J, Yan W, Garhwal A (2015) Currency security and forensics: a survey. Multimed Tools Appl 74(11):4013–4043CrossRef Chambers J, Yan W, Garhwal A (2015) Currency security and forensics: a survey. Multimed Tools Appl 74(11):4013–4043CrossRef
4.
Zurück zum Zitat Ali Qureshi M, Deriche M (2014) A review on copy move image forgery detection techniques. In: 11th International multi-conference on systems, signals and devices (SSD). Barcelona, Spain, pp 1–5 Ali Qureshi M, Deriche M (2014) A review on copy move image forgery detection techniques. In: 11th International multi-conference on systems, signals and devices (SSD). Barcelona, Spain, pp 1–5
5.
Zurück zum Zitat Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef
6.
Zurück zum Zitat Al-Qershi OM, Khoo BE (2013) Passive detection of copy–move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1–3):284–295CrossRef Al-Qershi OM, Khoo BE (2013) Passive detection of copy–move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1–3):284–295CrossRef
7.
Zurück zum Zitat Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef
8.
Zurück zum Zitat Qazi T, Hayat K, Khan SU (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670CrossRef Qazi T, Hayat K, Khan SU (2013) Survey on blind image forgery detection. IET Image Process 7(7):660–670CrossRef
9.
Zurück zum Zitat Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716CrossRef Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716CrossRef
10.
Zurück zum Zitat Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). Prague, pp 1880–1883 Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). Prague, pp 1880–1883
11.
Zurück zum Zitat Ryu SJ, Kirchner M, Lee MJ (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef Ryu SJ, Kirchner M, Lee MJ (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370CrossRef
12.
Zurück zum Zitat Davarzani R, Yaghmaie K, Mozaffari S (2013) Copy–move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72CrossRef Davarzani R, Yaghmaie K, Mozaffari S (2013) Copy–move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1–3):61–72CrossRef
13.
Zurück zum Zitat Cozzolino D, Poggi G, Verdoliva L (2014) Copy–move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP). Paris, France, pp 5312–5316 Cozzolino D, Poggi G, Verdoliva L (2014) Copy–move forgery detection based on patchmatch. In: 2014 IEEE international conference on image processing (ICIP). Paris, France, pp 5312–5316
14.
Zurück zum Zitat Fattah SA, Ullah MMI, Ahmed M (2014) A scheme for copy–move forgery detection in digital images based on 2D-DWT. In: IEEE 57th international midwest symposium on circuits and systems (MWSCAS). College Station, TX, pp 801–804 Fattah SA, Ullah MMI, Ahmed M (2014) A scheme for copy–move forgery detection in digital images based on 2D-DWT. In: IEEE 57th international midwest symposium on circuits and systems (MWSCAS). College Station, TX, pp 801–804
15.
Zurück zum Zitat Imamoglu M, Ulutas G, Ulutas M (2013) Detection of copy–move forgery using Krawtchouk moment. In: 2013 8th International conference on electrical and electronics engineering. Bursa, Turkey, pp 311–314 Imamoglu M, Ulutas G, Ulutas M (2013) Detection of copy–move forgery using Krawtchouk moment. In: 2013 8th International conference on electrical and electronics engineering. Bursa, Turkey, pp 311–314
16.
Zurück zum Zitat Lee J, Chang C, Chen W (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262CrossRef Lee J, Chang C, Chen W (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262CrossRef
17.
Zurück zum Zitat Wu YJ, Yu D, Duan HB (2014) Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci China Inf Sci 57(1):1–12 Wu YJ, Yu D, Duan HB (2014) Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci China Inf Sci 57(1):1–12
18.
Zurück zum Zitat Jie Z, Guo J (2013) Passive forensics for copy–move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166 Jie Z, Guo J (2013) Passive forensics for copy–move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166
19.
Zurück zum Zitat Ketenci S, Ulutas G, Ulutas M (2014) Detection of duplicated regions in images using 1D-Fourier transform. In: International conference on systems, signals and image processing. Dubrovnik, Croatia, pp 171–174 Ketenci S, Ulutas G, Ulutas M (2014) Detection of duplicated regions in images using 1D-Fourier transform. In: International conference on systems, signals and image processing. Dubrovnik, Croatia, pp 171–174
20.
Zurück zum Zitat Lee JC (2015) Copy–move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334CrossRef Lee JC (2015) Copy–move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent 31:320–334CrossRef
21.
Zurück zum Zitat Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRef Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57CrossRef
22.
Zurück zum Zitat Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy–move forgery detection by means of Zernike moments. In: 13th International workshop on digital-forensics and watermarking (IWDW 2014), LNCS 9023, pp 485–497 Al-Qershi OM, Khoo BE (2015) Enhanced matching method for copy–move forgery detection by means of Zernike moments. In: 13th International workshop on digital-forensics and watermarking (IWDW 2014), LNCS 9023, pp 485–497
23.
Zurück zum Zitat Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef Amerini I, Ballan L, Caldelli R (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef
24.
Zurück zum Zitat Silva E, Carvalho T, Ferreira A (2015) Going deeper into copy–move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32CrossRef Silva E, Carvalho T, Ferreira A (2015) Going deeper into copy–move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32CrossRef
25.
Zurück zum Zitat Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028CrossRef
26.
Zurück zum Zitat Caldelli R, Amerini I, Ballan L (2012) On the effectiveness of local warping against SIFT-based copy–move detection. In: Proceedings of the 5th international symposium on communications, control and signal processing. Rome, Italy, pp 1–5 Caldelli R, Amerini I, Ballan L (2012) On the effectiveness of local warping against SIFT-based copy–move detection. In: Proceedings of the 5th international symposium on communications, control and signal processing. Rome, Italy, pp 1–5
27.
Zurück zum Zitat Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef Ardizzone E, Bruno A, Mazzola G (2015) Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur 10(10):2084–2094CrossRef
28.
Zurück zum Zitat Costanzo A, Amerini I, Caldelli R (2014) Forensic analysis of SIFT keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(9):1450–1464CrossRef Costanzo A, Amerini I, Caldelli R (2014) Forensic analysis of SIFT keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(9):1450–1464CrossRef
29.
Zurück zum Zitat Li J, Li X, Yang B (2015) Segmentation-based image copy–move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518MathSciNetCrossRef Li J, Li X, Yang B (2015) Segmentation-based image copy–move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518MathSciNetCrossRef
30.
Zurück zum Zitat Chen L, Lu W, Ni J, Sun W (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254CrossRef Chen L, Lu W, Ni J, Sun W (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254CrossRef
31.
Zurück zum Zitat Jaberi M, Bebis G, Hussain M (2014) Accurate and robust localization of duplicated region in copy–move image forgery. Mach Vis Appl 25(2):451–475CrossRef Jaberi M, Bebis G, Hussain M (2014) Accurate and robust localization of duplicated region in copy–move image forgery. Mach Vis Appl 25(2):451–475CrossRef
33.
Zurück zum Zitat Jiang YJ (2011) Exponent moments and its application in pattern recognition. Beijing University of Posts and Telecommunications, Beijing Jiang YJ (2011) Exponent moments and its application in pattern recognition. Beijing University of Posts and Telecommunications, Beijing
34.
Zurück zum Zitat Xiang-yang Wang, Pan-pan Niu, Hong-ying Yang, Chun-peng Wang, Ai-long Wang (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754CrossRef Xiang-yang Wang, Pan-pan Niu, Hong-ying Yang, Chun-peng Wang, Ai-long Wang (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754CrossRef
35.
Zurück zum Zitat Zong T, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717–729CrossRef Zong T, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25(5):717–729CrossRef
36.
Zurück zum Zitat Zhang R, Wei F, Li B (2014) E2LSH based multiple kernel approach for object detection. Neurocomputing 124(2):105–110CrossRef Zhang R, Wei F, Li B (2014) E2LSH based multiple kernel approach for object detection. Neurocomputing 124(2):105–110CrossRef
37.
Zurück zum Zitat Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRef Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395MathSciNetCrossRef
Metadaten
Titel
Robust copy–move forgery detection using quaternion exponent moments
verfasst von
Xiang-yang Wang
Yu-nan Liu
Huan Xu
Pei Wang
Hong-ying Yang
Publikationsdatum
31.10.2016
Verlag
Springer London
Erschienen in
Pattern Analysis and Applications / Ausgabe 2/2018
Print ISSN: 1433-7541
Elektronische ISSN: 1433-755X
DOI
https://doi.org/10.1007/s10044-016-0588-1

Weitere Artikel der Ausgabe 2/2018

Pattern Analysis and Applications 2/2018 Zur Ausgabe

Premium Partner