Detection of copy-move image forgery using histogram of orientated gradients

被引:93
作者
Lee, Jen-Chun
Chang, Chien-Ping [1 ]
Chen, Wei-Kuei [1 ]
机构
[1] Chien Hsin Univ Sci & Technol, Dept Comp Sci & Informat Engn, Jhongli 320, Taiwan
关键词
Copy-move forgery; Digital image forensics; Histogram orientated gradients; Duplicated region detection; EFFICIENT;
D O I
10.1016/j.ins.2015.03.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing popularity of digital media and media editing software has led to widespread tampering of multimedia files for malicious purposes. The most common form of tampering associated with digital images is copy-move forgery, in which a portion of an image is duplicated and substituted in a different location. Thus, law enforcement and forensics experts require reliable and efficient means of detecting copy-move forgery. This paper proposes a blind forensics approach to the detection of copy-move forgery. The input image is segmented into overlapping blocks, whereupon a histogram of orientated gradients is applied to each block. Statistical features are extracted and reduced to facilitate the measurement of similarity. Finally, feature vectors are lexicographically sorted, and duplicated image blocks are detected by identifying similar block pairs after post-processing. Experiment results demonstrate that the proposed method is able to detect multiple examples of copy-move forgery and precisely locate the duplicated regions, even when dealing with images distorted by translation involving small rotations, blurring, adjustment of brightness, and color reduction. We are currently working to improve detection in regions with rotation and scaling adjustment over large areas. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:250 / 262
页数:13
相关论文
共 24 条
[1]   Passive detection of copy-move forgery in digital images: State-of-the-art [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
FORENSIC SCIENCE INTERNATIONAL, 2013, 231 (1-3) :284-295
[2]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[3]  
[Anonymous], 2013, J. Inf. Hiding Multimedia Signal Process.
[4]  
[Anonymous], 2010, International Journal on Computer Science and Engineering
[5]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[6]   Region duplication detection based on Harris corner points and step sector statistics [J].
Chen, Likai ;
Lu, Wei ;
Ni, Jiangqun ;
Sun, Wei ;
Huang, Jiwu .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (03) :244-254
[7]   Forensic Analysis of SIFT Keypoint Removal and Injection [J].
Costanzo, Andrea ;
Amerini, Irene ;
Caldelli, Roberto ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) :1450-1464
[8]  
Dalal N., 2005, P IEEE COMPUTER SOC
[9]  
Fridrich J., 2003, DIG FOR RES WORKSH, P652
[10]  
Fridrich J., 1999, P ACM WORKSH MULT SE, P19