Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics

被引:70
作者
Bravo-Solorio, Sergio [1 ]
Nandi, Asoke K. [1 ]
机构
[1] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, Merseyside, England
关键词
Image forensics; Copy-move; Log-polar mapping; Security; WATERMARKING;
D O I
10.1016/j.sigpro.2011.01.022
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although the detection of duplicated regions plays an important role in image forensics, most of the existing methods aimed at detecting duplicates are too sensitive to geometric changes in the replicated areas. As a result, a slight rotation can be used not only for the copied region to fit better the scene in the image, but also to hinder the detection of the tampering. In this paper, a novel forensic method is presented to detect duplicated regions, even when the copied portions have undergone reflection, rotation and/or scaling. To achieve this, overlapping blocks of pixels are mapped to log-polar coordinates, and then summed along the angle axis, to produce a one-dimensional (1-D) descriptor invariant to reflection and rotation. Besides, scaling in rectangular coordinates results in a simple translation of the descriptor. The dimension-reduced representation of each block has a favourable impact in the computational cost of the search of similar regions. Extensive experimental results, including a comparative evaluation with two existing methods, are presented to demonstrate the effectiveness of the proposed method. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1759 / 1770
页数:12
相关论文
共 25 条
[1]   GEOMETRIC TAMPERING ESTIMATION BY MEANS OF A SIFT-BASED FORENSIC ANALYSIS [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :1702-1705
[2]  
[Anonymous], WSEAS T SIGNAL PROCE
[3]  
[Anonymous], P DIG FOR RES WORKSH
[4]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[5]  
Bracewell R.N., 1986, FOURIER TRANSFORM IT, V2nd
[6]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[7]  
Dybala B, 2007, MM&SEC'07: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2007, P43
[8]   Security of fragile authentication watermarks with localization [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :691-700
[9]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[10]  
Griffin G., 2007, Caltech-256 object category dataset