Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching

被引:204
作者
Pun, Chi-Man [1 ]
Yuan, Xiao-Chen [1 ]
Bi, Xiu-Li [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
关键词
Copy-move forgery detection; adaptive over-segmentation; local color feature; forgery region extraction;
D O I
10.1109/TIFS.2015.2423261
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A novel copy-move forgery detection scheme using adaptive oversegmentation and feature point matching is proposed in this paper. The proposed scheme integrates both block-based and keypoint-based forgery detection methods. First, the proposed adaptive oversegmentation algorithm segments the host image into nonoverlapping and irregular blocks adaptively. Then, the feature points are extracted from each block as block features, and the block features are matched with one another to locate the labeled feature points; this procedure can approximately indicate the suspected forgery regions. To detect the forgery regions more accurately, we propose the forgery region extraction algorithm, which replaces the feature points with small superpixels as feature blocks and then merges the neighboring blocks that have similar local color features into the feature blocks to generate the merged regions. Finally, it applies the morphological operation to the merged regions to generate the detected forgery regions. The experimental results indicate that the proposed copy-move forgery detection scheme can achieve much better detection results even under various challenging conditions compared with the existing state-of-the-art copy-move forgery detection methods.
引用
收藏
页码:1705 / 1716
页数:12
相关论文
共 23 条
[1]   SLIC Superpixels Compared to State-of-the-Art Superpixel Methods [J].
Achanta, Radhakrishna ;
Shaji, Appu ;
Smith, Kevin ;
Lucchi, Aurelien ;
Fua, Pascal ;
Suesstrunk, Sabine .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2012, 34 (11) :2274-2281
[2]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[3]  
[Anonymous], 2011, International Journal of Computer Science Issues
[4]   SURF: Speeded up robust features [J].
Bay, Herbert ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION - ECCV 2006 , PT 1, PROCEEDINGS, 2006, 3951 :404-417
[5]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[6]  
Bravo-Solorio S, 2011, INT CONF ACOUST SPEE, P1880
[7]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854
[8]  
Fridrich J. L., 2003, Proc. Digit. forensic Res. Work., V3, P652
[9]  
Huang HL, 2008, PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, P1241
[10]  
Hwei-Jen Lin, 2009, WSEAS Transactions on Signal Processing, V5, P188