Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching

被引:104
作者
Li, Yuenan [1 ]
机构
[1] Tianjin Univ, Sch Elect & Informat Engn, Tianjin 300072, Peoples R China
基金
美国国家科学基金会;
关键词
Authentication; Image forensics; Copy-move forgery; Duplicated region detection;
D O I
10.1016/j.forsciint.2012.10.031
中图分类号
DF [法律]; D9 [法律]; R [医药、卫生];
学科分类号
0301 ; 10 ;
摘要
Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting. (C) 2012 Elsevier Ireland Ltd. All rights reserved.
引用
收藏
页码:59 / 67
页数:9
相关论文
共 14 条
[1]  
[Anonymous], 2004, TECHNICAL REPORT
[2]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[3]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[4]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[5]   Image Forgery Detection A survey [J].
Farid, Hany .
IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) :16-25
[6]  
Fridrich A.J., 2003, P DIGITAL FORENSIC R
[7]   Improved DCT-based detection of copy-move forgery in images [J].
Huang, Yanping ;
Lu, Wei ;
Sun, Wei ;
Long, Dongyang .
FORENSIC SCIENCE INTERNATIONAL, 2011, 206 (1-3) :178-184
[8]  
Indyk P., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P604, DOI 10.1145/276698.276876
[9]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[10]  
Li GH, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, P1750