Tampered Image Recognition Algorithm Based on Progressive Hybrid Feature

被引:0
作者
Peng Yihang [1 ]
Ye Wujian [1 ]
Liu Yijun [1 ]
机构
[1] Guangdong Univ Technol, Sch Informat Engn, Guangzhou 510006, Guangdong, Peoples R China
关键词
imaging systems; copy-move forgery; hybrid feature; image tamper recognition; SIFT; Hu moment; MOVE FORGERY DETECTION;
D O I
10.3788/LOP202259.0211001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Aiming at the disadvantage that the existing detection algorithms are difficult to resist combined attacks, a copy-move forgery recognition algorithm based on mixed features is proposed. Different from the traditional algorithm using fixed threshold, the proposed algorithm uses the similar sub-block extraction method without threshold to select the sub-block with high correlation. At the same time, in order to obtain more local information, an adaptive sub-block synthesis scheme is proposed to avoid sub-block aliasing. In addition, aiming at the problem that scale-invariant feature transform (SIFT) features cannot distinguish natural similar regions from tampered regions, the proposed algorithm combines the advantages of moment features to extract the progressive hybrid features of synthetic sub-blocks, so as to reduce the false alarm rate of the algorithm. The experimental results show that the true positive rate (TPR) and F1 of the proposed algorithm are 97.2% and 92.9% on MICC-F2000 data set and 98.2% and 95.1% on MICC-F220 data set, respectively, indicating that the proposed algorithm has good detection ability.
引用
收藏
页数:9
相关论文
共 30 条
  • [1] CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
    Abd Warif, Nor Bakiah
    Idris, Mohd Yamani Idna
    Wahab, Ainuddin Wahid Abdul
    Salleh, Rosli
    Ismail, Ahsiah
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2019, 295 : 83 - 99
  • [2] A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
    Amerini, Irene
    Ballan, Lamberto
    Caldelli, Roberto
    Del Bimbo, Alberto
    Serra, Giuseppe
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 1099 - 1110
  • [3] [Anonymous], 2017, ENG APPL ARTIF INTEL, DOI DOI 10.1016/j.engappai.2016.12.022
  • [4] [Anonymous], 2015, IEEE T INF FOREN SEC, DOI DOI 10.1109/TIFS.2015.2455334
  • [5] [Anonymous], 2013, SIGNAL PROCESS-IMAGE, DOI DOI 10.1016/j.image.2013.03.006
  • [6] [Anonymous], 2003, P DIG FOR RES WORKSH
  • [7] PCET based copy-move forgery detection in images under geometric transforms
    Emam, Mahmoud
    Han, Qi
    Niu, Xiamu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 11513 - 11527
  • [8] RANDOM SAMPLE CONSENSUS - A PARADIGM FOR MODEL-FITTING WITH APPLICATIONS TO IMAGE-ANALYSIS AND AUTOMATED CARTOGRAPHY
    FISCHLER, MA
    BOLLES, RC
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (06) : 381 - 395
  • [9] Application of AFMT method for composite forgery detection
    Gan, Yanfen
    Zhong, Junliu
    [J]. NONLINEAR DYNAMICS, 2016, 84 (01) : 341 - 353
  • [10] Segmentation-Based Image Copy-Move Forgery Detection Scheme
    Li, Jian
    Li, Xiaolong
    Yang, Bin
    Sun, Xingming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 507 - 518