Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model

被引:0
|
作者
K Sunitha
A N Krishna
B G Prasad
机构
[1] RNS Institute of Technology,Department of Information Science & Engineering
[2] SJB Institute of Technology,Department of Computer Science & Engineering
[3] BMS College of Engineering,Department of Computer Science & Engineering
来源
Applied Intelligence | 2022年 / 52卷
关键词
Clustering; Feature extraction; Hybrid descriptor; Keypoint extraction; Copy-move tampering detection (CMFD);
D O I
暂无
中图分类号
学科分类号
摘要
Digitally tampered images or fake images when propagated across the Web and social media, have the power to mislead, emotionally distress and influence public attitudes and behavior. Copy-Move tampering is one of the most commonly used attacks for damaging the semantics of an image. Keypoint-based methodologies are one of the effective ways of identifying a copy-move attack on an image. Existing key-point based methodologies fails to obtain a sufficient number of points on the small-smooth tampered region. Thus, for obtaining a good number of features this paper presents Hybrid Feature Detection (HFD) methodology employing Speeded-Up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT) descriptor. Further, hierarchical clustering optimization and an improved mismatch elimination model is presented for detecting and demarking tampered segments. Experiments are conducted on standard datasets such as Dataset (D0, D1-2 and D3), GRIP, MICC-F600 and MICC-F8Multi. Better results are achieved from the proposed HFD methodology when compared with existing state-of-art tampering detection methodologies in terms of Recall, F1-score, Precision and False Positive Rate (FPR).
引用
收藏
页码:15405 / 15416
页数:11
相关论文
共 50 条
  • [31] An enhanced copy-move forgery detection using machine learning based hybrid optimization model
    Rao, Allu Venkateswara
    Rao, Chanamallu Srinivasa
    Cheruku, Dharma Raj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 25383 - 25403
  • [32] An enhanced copy-move forgery detection using machine learning based hybrid optimization model
    Allu Venkateswara Rao
    Chanamallu Srinivasa Rao
    Dharma Raj Cheruku
    Multimedia Tools and Applications, 2022, 81 : 25383 - 25403
  • [33] Copy-move forgery detection using adaptive keypoint filtering and iterative region merging
    Jun-Liu Zhong
    Chi-Man Pun
    Multimedia Tools and Applications, 2019, 78 : 26313 - 26339
  • [34] Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering
    Thirunavukkarasu, V.
    Kumar, J. Satheesh
    Chae, Gyoo Soo
    Kishorkumar, J.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (04) : 3039 - 3057
  • [35] Copy-move forgery detection using adaptive keypoint filtering and iterative region merging
    Zhong, Jun-Liu
    Pun, Chi-Man
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) : 26313 - 26339
  • [36] A new keypoint-based copy-move forgery detection for small smooth regions
    Xiang-Yang Wang
    Shuo Li
    Yu-Nan Liu
    Ying Niu
    Hong-Ying Yang
    Zhi-li Zhou
    Multimedia Tools and Applications, 2017, 76 : 23353 - 23382
  • [37] Copy-Move Forgery Detection Based on Keypoint Clustering and Similar Neighborhood Search Algorithm
    Chen, Haipeng
    Yang, Xiwen
    Lyu, Yingda
    IEEE ACCESS, 2020, 8 (08): : 36863 - 36875
  • [38] Copy-move forgery detection using SURF feature extraction and SVM supervised learning technique
    Dhivya, S.
    Sangeetha, J.
    Sudhakar, B.
    SOFT COMPUTING, 2020, 24 (19) : 14429 - 14440
  • [39] Passive Blind Forensic Scheme for Copy-Move Temporal Tampering Detection
    Gavade, Jayashree D.
    Chougule, Sangeeta R.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 155 - 160
  • [40] Non-intrusive Forensic Detection Method Using DSWT with Reduced Feature Set for Copy-Move Image Tampering
    V. Thirunavukkarasu
    J. Satheesh Kumar
    Gyoo Soo Chae
    J. Kishorkumar
    Wireless Personal Communications, 2018, 98 : 3039 - 3057