Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model

被引:5
|
作者
Sunitha, K. [1 ]
Krishna, A. N. [2 ]
Prasad, B. G. [3 ]
机构
[1] RNS Inst Technol, Dept Informat Sci & Engn, Bengaluru, India
[2] SJB Inst Technol, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
[3] BMS Coll Engn, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
关键词
Clustering; Feature extraction; Hybrid descriptor; Keypoint extraction; Copy-move tampering detection (CMFD); FORGERY DETECTION; IMAGES; LOCALIZATION;
D O I
10.1007/s10489-022-03207-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digitally tampered images or fake images when propagated across the Web and social media, have the power to mislead, emotionally distress and influence public attitudes and behavior. Copy-Move tampering is one of the most commonly used attacks for damaging the semantics of an image. Keypoint-based methodologies are one of the effective ways of identifying a copy-move attack on an image. Existing key-point based methodologies fails to obtain a sufficient number of points on the small-smooth tampered region. Thus, for obtaining a good number of features this paper presents Hybrid Feature Detection (HFD) methodology employing Speeded-Up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT) descriptor. Further, hierarchical clustering optimization and an improved mismatch elimination model is presented for detecting and demarking tampered segments. Experiments are conducted on standard datasets such as Dataset (D0, D1-2 and D3), GRIP, MICC-F600 and MICC-F8Multi. Better results are achieved from the proposed HFD methodology when compared with existing state-of-art tampering detection methodologies in terms of Recall, F1-score, Precision and False Positive Rate (FPR).
引用
收藏
页码:15405 / 15416
页数:12
相关论文
共 50 条
  • [1] Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model
    K Sunitha
    A N Krishna
    B G Prasad
    Applied Intelligence, 2022, 52 : 15405 - 15416
  • [2] Detection of copy-move forgery using AKAZE and SIFT keypoint extraction
    Choudhary Shyam Prakash
    Prajwal Pralhad Panzade
    Hari Om
    Sushila Maheshkar
    Multimedia Tools and Applications, 2019, 78 : 23535 - 23558
  • [3] Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching
    Li, Jingwei
    Yang, Fan
    Lu, Wei
    Sun, Wei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 20483 - 20497
  • [4] Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching
    Jingwei Li
    Fan Yang
    Wei Lu
    Wei Sun
    Multimedia Tools and Applications, 2017, 76 : 20483 - 20497
  • [5] Copy-Move Forgery Detection by Using HSV Preprocessing and Keypoint Extraction
    Panzade, Prajwal Pralhad
    Prakash, Choudhary Shyam
    Maheshkar, Sushila
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 264 - 269
  • [6] Detection of copy-move forgery using AKAZE and SIFT keypoint extraction
    Prakash, Choudhary Shyam
    Panzade, Prajwal Pralhad
    Om, Hari
    Maheshkar, Sushila
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) : 23535 - 23558
  • [7] Keypoint based comprehensive copy-move forgery detection
    Diwan, Anjali
    Sharma, Rajat
    Roy, Anil K.
    Mitra, Suman K.
    IET IMAGE PROCESSING, 2021, 15 (06) : 1298 - 1309
  • [8] Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature
    Soni, Badal
    Das, Pradip K.
    Thounaojam, Dalton Meitei
    7TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT - 2017), 2017, : 78 - 83
  • [9] Copy-move tampering detection using affine transformation property preservation on clustered keypoints
    Manu, V. T.
    Mehtre, B. M.
    SIGNAL IMAGE AND VIDEO PROCESSING, 2018, 12 (03) : 549 - 556
  • [10] Copy-move tampering detection using affine transformation property preservation on clustered keypoints
    V. T. Manu
    B. M. Mehtre
    Signal, Image and Video Processing, 2018, 12 : 549 - 556