PCET based copy-move forgery detection in images under geometric transforms

被引:77
作者
Emam, Mahmoud [1 ,2 ]
Han, Qi [1 ]
Niu, Xiamu [1 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150080, Peoples R China
[2] Menoufia Univ, Fac Sci, Dept Math, Shibin Al Kawm 32511, Egypt
基金
中国国家自然科学基金;
关键词
Copy-move; Region duplication; Locality sensitive hashing; Polar complex exponential transform;
D O I
10.1007/s11042-015-2872-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of the powerful editing software and sophisticated digital cameras, it is now possible to manipulate images. Copy-move is one of the most common methods for image manipulation. Several methods have been proposed to detect and locate the tampered regions, while many methods failed when the copied region undergone some geometric transformations before being pasted, because of the de-synchronization in the searching procedure. This paper presents an efficient technique for detecting the copy-move forgery under geometric transforms. Firstly, the forged image is divided into overlapping circular blocks, and Polar Complex Exponential Transform (PCET) is employed to each block to extract the invariant features, thus, the PCET kernels represent each block. Secondly, the Approximate Nearest Neighbor (ANN) Searching Problem is used for identifying the potential similar blocks by means of locality sensitive hashing (LSH). In order to make the algorithm more robust, morphological operations are applied to remove the wrong similar blocks. Experimental results show that our proposed technique is robust to geometric transformations with low computational complexity.
引用
收藏
页码:11513 / 11527
页数:15
相关论文
共 22 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], 2010, SICHERHEIT
[3]  
[Anonymous], 2013, J. Inf. Hiding Multimedia Signal Process.
[4]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[5]   A robust detection algorithm for copy-move forgery in digital images [J].
Cao, Yanjun ;
Gao, Tiegang ;
Fan, Li ;
Yang, Qunting .
FORENSIC SCIENCE INTERNATIONAL, 2012, 214 (1-3) :33-43
[6]  
Christlein V, 2012, EVALUATION POPULAR S
[7]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854
[8]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[9]   A Survey of Partition-Based Techniques for Copy-Move Forgery Detection [J].
Diane, Wandji Nanda Nathalie ;
Sun Xingming ;
Moise, Fah Kue .
SCIENTIFIC WORLD JOURNAL, 2014,
[10]  
Fridrich A. J., 2003, P DIG FOR RES WORKSH