Forensic approach for distinguishing between source and destination regions in copy-move forgery

被引:1
作者
Iseed, Saed Yacoub [1 ]
Mahmoud, Khaled Walid [1 ]
机构
[1] Princess Sumaya Univ Technol, Cybersecur Dept, Amman, Jordan
关键词
Copy-move forgery; Joint probability matrix; Local binary pattern; DCT; Jensen Shannon divergence; LOCAL BINARY PATTERN; DETECTION ALGORITHM; MARKOV FEATURES; OBJECT REMOVAL; IMAGE FORGERY; CLASSIFICATION;
D O I
10.1007/s11042-023-14824-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The copy-move forgery involves copying a semantically part from an image and pasting it into a different location within the same image to change the context of the image and deceive people. The copy-move forensic detectors authenticate the image and localize similar regions without identifying which region is original or forged. Because the forged region is replicated from another region of the same image, its characteristics have been inherited, making it difficult to distinguish between the original and forged regions. This paper proposes two approaches as a second stage, after localizing duplicated regions, to distinguish between source and destination regions. The adjacent pixels in images are non-independent and have some correlations that would be destroyed due to modifying the image. The deviation of these correlations would expose traces left due to the image forgery and is evaluated by the Joint Probability Matrix (JPM) in the first approach and by the Local Binary Pattern (LBP) in the second approach. Both approaches employ Jensen Shannon Divergence (JSD) to measure the correlation between feature vectors and generate similarity scores to distinguish between the source and the destination regions. The proposed approaches were demonstrated by employing the GRIP dataset with six post-processing operations to conceal forgery. The experiments exhibit a high accuracy rate of 96.25%.
引用
收藏
页码:31181 / 31210
页数:30
相关论文
共 57 条
  • [1] [Anonymous], IMAGE PROCESSING RES
  • [2] Beli ILK, 2017, J IMAGING, V3, DOI 10.3390/jimaging3030037
  • [3] Identifying tampering operations in image operator chains based on decision fusion
    Chen, Jiaxin
    Liao, Xin
    Qin, Zheng
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 95
  • [4] Cozzolino D, 2013, NOVEL FRAMEWORK IMAG
  • [5] Cozzolino D, 2014, IEEE IMAGE PROC, P5312, DOI 10.1109/ICIP.2014.7026075
  • [6] Dekking FM., 2005, MODERN INTRO PROBABI, DOI 10.1007/1-84628-168-7
  • [7] Dong J, 2009, LECT NOTES COMPUT SC, V5450, P76, DOI 10.1007/978-3-642-04438-0_7
  • [8] A review of digital image forensics
    Ferreira, William D.
    Ferreira, Cristiane B. R.
    Junior, Gelson da Cruz
    Soares, Fabrizzio
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 85
  • [9] Fridrich J, 2004, LECT NOTES COMPUT SC, V3200, P67
  • [10] Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion
    Han, Jong Goo
    Park, Tae Hee
    Moon, Yong Ho
    Eom, Il Kyu
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2016, 25 (02)