Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform

被引:37
作者
Hashmi, Mohammad Farukh [1 ]
Anand, Vijay [1 ]
Keskar, Avinas G. [1 ]
机构
[1] Visvesvaraya Natl Inst Technol, Dept Elect Engn, Nagpur 440010, Maharashtra, India
来源
2014 AASRI CONFERENCE ON CIRCUIT AND SIGNAL PROCESSING (CSP 2014) | 2014年 / 9卷
关键词
Digital Image Forgery; DyWT (Dyadic Wavelet Transform); SIFT (Scale Invariant Feature Transfrom);
D O I
10.1016/j.aasri.2014.09.015
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the present digital world, digital images and videos are the main carrier of information. However, these sources of information can be easily tampered by using readily available software thus making authenticity and integrity of the digital images an important issue of concern. And in most of the cases copy-move image forgery is used to tamper the digital images. Therefore, as a solution to the aforementioned problem we are going to propose a unique method for copy-move forgery detection which can sustained various pre-processing attacks using a combination of Dyadic Wavelet Transform (DyWT) and Scale Invariant Feature Transform (SIFT). In this process first DyWT is applied on a given image to decompose it into four parts LL, LH, HL, and HH. Since LL part contains most of the information, we intended to apply SIFT on LL part only to extract the key features and find a descriptor vector of these key features and then find similarities between various descriptors vector to conclude that there has been some copy-move tampering done to the given image. And by using DyWT with SIFT we are able to extract more numbers of key points that are matched and thus able to detect copy-move forgery more efficiently. (C) 2014 The Authors. Published by Elsevier B. V.
引用
收藏
页码:84 / 91
页数:8
相关论文
共 16 条
[1]   Passive detection of copy-move forgery in digital images: State-of-the-art [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
FORENSIC SCIENCE INTERNATIONAL, 2013, 231 (1-3) :284-295
[2]   Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Del Tongo, Luca ;
Serra, Giuseppe .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (06) :659-669
[3]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[4]  
Anand V, 2014, LECT NOTES COMPUT SC, V8397, P530, DOI 10.1007/978-3-319-05476-6_54
[5]  
[Anonymous], 2013, J. Inf. Hiding Multimedia Signal Process.
[6]   Digital image forgery detection using passive techniques: A survey [J].
Birajdar, Gajanan K. ;
Mankar, Vijay H. .
DIGITAL INVESTIGATION, 2013, 10 (03) :226-245
[7]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854
[8]  
Hashmi MF, 2013, INT CONF INTELL SYST, P188, DOI 10.1109/ISDA.2013.6920733
[9]  
Huang HL, 2008, PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, P1241
[10]  
Li GH, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, P1750