Single and Multiple Copy-Move Forgery Detection and Localization in Digital Images Based on the Sparsely Encoded Distinctive Features and DBSCAN Clustering

被引:27
作者
Bilal, Muhammad [1 ]
Habib, Hafiz Adnan [2 ]
Mehmood, Zahid [2 ]
Saba, Tanzila [3 ]
Rashid, Muhammad [4 ]
机构
[1] Univ Engn & Technol, Dept Software Engn, Taxila, Pakistan
[2] Univ Engn & Technol, Dept Comp Engn, Taxila, Pakistan
[3] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[4] Umm Al Qura Univ, Dept Comp Engn, Mecca, Saudi Arabia
关键词
Forgery detection; SURF features; BRISK features; DBSCAN clustering; WAVELET; SIFT;
D O I
10.1007/s13369-019-04238-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Due to the advancements in digital image processing and multimedia devices, the digital image can be easily tampered and presented as evidence in judicial courts, print media, social media, and for insurance claims. The most commonly used image tampering technique is the copy-move forgery (CMF) technique, where the region from the original image is copied and pasted in some other part of the same image to manipulate the original image content. The CMFD techniques may not provide robust performance after various post-processing attacks and multiple forged regions within the images. This article introduces a robust CMF detection technique to mitigate the aforementioned problems. The proposed CMF detection technique utilizes a fusion of speeded up robust features (SURF) and binary robust invariant scalable keypoints (BRISK) descriptors for CMF detection. The SURF features are robust against different post-processing attacks such as rotation, blurring, and additive noise. However, the BRISK features are considered as robust in the detection of the scale-invariant forged regions as well as poorly localized keypoints of the objects within the forged image. The fused features are matched using hamming distance and second nearest neighbor. The matched features grouped into clusters by applying density-based spatial clustering of applications with noise clustering algorithm. The random sample consensus technique is applied to the clusters to remove the remaining false matches. After some post-processing, the forged regions are detected and localized. The performance of the proposed CMFD technique is assessed using three standard datasets (i.e., CoMoFoD, MICC-F220, and MICC-F2000). The proposed technique surpasses the state-of-the-art techniques used for CMF detection in terms of true and false detection rates.
引用
收藏
页码:2975 / 2992
页数:18
相关论文
共 56 条
[1]  
Abdel-Basset Mohamed, 2018, Wiley, Concurrency and Computation Practice and Experience, V31, P1
[2]   Detection of copy-move image forgery based on discrete cosine transform [J].
Alkawaz, Mohammed Hazim ;
Sulong, Ghazali ;
Saba, Tanzila ;
Rehman, Amjad .
NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01) :183-192
[3]   Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Del Tongo, Luca ;
Serra, Giuseppe .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (06) :659-669
[4]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[5]  
[Anonymous], 2009, COMPUT SCI TELECOMMU
[6]  
[Anonymous], 2009, Int. J. Image Process.
[7]   Copy-Move Forgery Detection by Matching Triangles of Keypoints [J].
Ardizzone, Edoardo ;
Bruno, Alessandro ;
Mazzola, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2084-2094
[8]   Copy-move and splicing image forgery detection and localization techniques: a review [J].
Asghar, Khurshid ;
Habib, Zulfiqar ;
Hussain, Muhammad .
AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2017, 49 (03) :281-307
[9]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[10]   Extended Self in a Digital World [J].
Belk, Russell W. .
JOURNAL OF CONSUMER RESEARCH, 2013, 40 (03) :477-500