Copy-Move Forgery Detection by Matching Triangles of Keypoints

被引:173
作者
Ardizzone, Edoardo [1 ]
Bruno, Alessandro [1 ]
Mazzola, Giuseppe [1 ]
机构
[1] Univ Palermo, Dipartimento Ingn Chim Gest Informat & Meccan, I-90128 Palermo, Italy
关键词
Digital image forensics; copy-move forgery; SIFT; SURF; Harris; Delaunay triangulation;
D O I
10.1109/TIFS.2015.2445742
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (color information), and the local feature vectors extracted onto the vertices of the triangles. Our methods are designed to be robust to geometric transformations. Results are compared with a state-of-the-art block matching method and a point-based method. Furthermore, our data set is available for use by academic researchers.
引用
收藏
页码:2084 / 2094
页数:11
相关论文
共 25 条
[1]   Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Del Tongo, Luca ;
Serra, Giuseppe .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (06) :659-669
[2]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[3]  
[Anonymous], 2011, International Journal of Computer Science Issues
[4]   DETECTING MULTIPLE COPIES IN TAMPERED IMAGES [J].
Ardizzone, E. ;
Bruno, A. ;
Mazzola, G. .
2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, :2117-2120
[5]  
Ardizzone E., 2010, Proceedings of the 2nd acm workshop on multimedia in forensics, security and intelligence, P59
[6]  
Ardizzone E, 2013, LECT NOTES COMPUT SC, V8156, P773
[7]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[8]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854
[9]  
Dyer R., 2009, COMPUT SCI
[10]   Image Forgery Detection A survey [J].
Farid, Hany .
IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) :16-25