Robust Region Duplication Detection on Log-Polar Domain Using Band Limitation

被引:5
作者
Yuan, Yue [1 ,2 ]
Zhang, Yun [3 ]
Chen, Shuang [4 ]
Wang, Hong [5 ]
机构
[1] Northeastern Univ, Sch SINO DUTCH Biomed & Informat Engn, Shenyang 110819, Peoples R China
[2] Shenyang Univ, Sch Informat Engn, Shenyang 110042, Peoples R China
[3] Zhejiang Univ Media & Commun, Inst Zhejiang Radio & TV Technol, Hangzhou 310018, Zhejiang, Peoples R China
[4] Shenyang Univ Technol, Sch Informat Sci & Engn, Shenyang 110870, Peoples R China
[5] Northeastern Univ, Sch Mech Engn & Automat, Shenyang 110819, Peoples R China
关键词
Duplication detection; Log-polar domain; Band limitation; Scaling manipulation;
D O I
10.1007/s13369-016-2268-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Region duplication is one of the image-tampering techniques in which a part of image is copied and pasted into another region of the same image. In this paper, a robust duplication detection algorithm is proposed against severe degradations such as illumination changes, blurring, large scaling, noise contamination and JPEG compression. We introduce an adaptive phase correlation scheme in the log-polar domain, which is effective to locate the most salient local feature of an image patch on frequency band. By using the information collected from the band limitation, duplicated regions can be correctly located. Our contribution is to present a robust image duplication detection algorithm which can handle large scaling manipulation while preserving detection performance under other manipulations or degradations. We perform degradation and comparison test on various tampered images, and experimental results show that the proposed algorithm achieves satisfactory performance.
引用
收藏
页码:559 / 565
页数:7
相关论文
共 19 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], 2004, TECHNICAL REPORT
[3]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[4]   Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (08) :1759-1770
[5]   Region duplication detection based on Harris corner points and step sector statistics [J].
Chen, Likai ;
Lu, Wei ;
Ni, Jiangqun ;
Sun, Wei ;
Huang, Jiwu .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (03) :244-254
[6]  
Fridrich A. J., 2003, P DIG FOR RES WORKSH
[7]   SVD BASED IMAGE MANIPULATION DETECTION [J].
Gul, Gokhan ;
Avcibas, Ismail ;
Kurugollu, Fatih .
2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, :1765-1768
[8]  
Ito K, 2004, IEICE T FUND ELECTR, VE87A, P682
[9]  
Kuo T., 2013, Proceedings of the ASME 2013 International Mechanical Engineering Congress and Exposition, P1
[10]  
Li GH, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, P1750