×

Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. (English) Zbl 1217.94008

Summary: Although the detection of duplicated regions plays an important role in image forensics, most of the existing methods aimed at detecting duplicates are too sensitive to geometric changes in the replicated areas. As a result, a slight rotation can be used not only for the copied region to fit better the scene in the image, but also to hinder the detection of the tampering. In this paper, a novel forensic method is presented to detect duplicated regions, even when the copied portions have undergone reflection, rotation and/or scaling. To achieve this, overlapping blocks of pixels are mapped to log-polar coordinates, and then summed along the angle axis, to produce a one-dimensional (1-D) descriptor invariant to reflection and rotation. Besides, scaling in rectangular coordinates results in a simple translation of the descriptor. The dimension-reduced representation of each block has a favourable impact in the computational cost of the search of similar regions. Extensive experimental results, including a comparative evaluation with two existing methods, are presented to demonstrate the effectiveness of the proposed method.

MSC:

94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
94A13 Detection theory in information and communication theory

Software:

Caltech-256
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Friedman, G.: The trustworthy digital camera: restoring credibility to the photographic image, IEEE transactions on consumer electronics 39, No. 4, 905-910 (1993)
[2] Cox, I. J.; Miller, M. L.; Bloom, J. A.; Fridrich, J.; Kalker, T.: Digital watermarking and steganography, (2008)
[3] Fridrich, J.: Security of fragile authentication watermarks with localization, Proceedings of security and watermarking of multimedia contents 4675, 691-700 (2002)
[4] Yuan, H.; Zhang, X. -P.: Multiscale fragile watermarking based on the Gaussian mixture model, IEEE transactions on image processing 15, No. 10, 3189-3200 (2006)
[5] Fridrich, J.; Soukal, D.; Lukaš\'{}, J.: Detection of copy-move forgery in digital images, , 55-61 (2003)
[6] A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, Department of Computer Science, Dartmouth College, 2004.
[7] Popescu, A. C.; Farid, H.: Exposing digital forgeries by detecting traces of resampling, IEEE transactions on signal processing 53, No. 2, 758-767 (2005) · Zbl 1370.94342
[8] Langille, A.; Gong, M.: An efficient match-based duplication detection algorithm, , 64-71 (2006)
[9] Mahdian, B.; Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants, Forensic science international 171, No. 2–3, 180-189 (2007)
[10] Luo, W.; Huang, J.; Qui, G.: Robust detection of region-duplication forgery in digital images, Proceedings of ICPR–IAPR international conference on pattern recognition 4, 746-749 (2006)
[11] Dybala, B.; Jennings, B.; Letscher, D.: Detecting filtered cloning in digital images, , 43-50 (2007)
[12] A.N. Myna, M.G. Venkateshmurthy, C.G. Patil, Detection of region duplication forgery in digital images using wavelets and log-polar mapping, in: Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, Washington, DC, USA, 2007, pp. 371–377.
[13] Huang, H.; Guo, W.; Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm, Proceedings of IEEE Pacific-Asia workshop on computational intelligence and industrial application 2, 272-276 (2008)
[14] Bayram, S.; Sencar, H.; Memon, N.: An efficient and robust method for detecting copy-move forgery, , 1053-1056 (2009)
[15] Lin, H. -J.; Wang, C. -W.; Kao, Y. -T.: Fast copy-move forgery detection, WSEAS transactions on signal processing 5, No. 5, 188-197 (2009)
[16] Amerini, I.; Ballan, L.; Caldelli, R.; Del Bimbo, A.; Serra, G.: Geometric tampering estimation by means of a SIFT-based forensic analysis, , 1702-1705 (2010)
[17] X. Pan, S. Lyu, Detecting image region duplication using SIFT features, in: Proceedings of ICASSP–IEEE International Conference on Acoustics, Speech, and Signal Processing, Dallas, TX, USA, 2010, pp. 1706–1709.
[18] S.-J. Ryu, M.-J. Lee, H.-K. Lee, Detection of copy-rotate-move forgery using Zernike moments, in: Proceedings of IH–Information Hiding, Calgary, Canada, 2010, pp. 51–65.
[19] Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue, , 11-20 (2008)
[20] B. Mahdian, S. Saic, Detection of resampling supplemented with noise inconsistencies analysis for image forensics, in: ICCSA–Proceedings of the International Conference on Computational Sciences and its Applications, Washington, DC, USA, 2008, pp. 546–556.
[21] Kirchner, M.: On the detectability of local resampling in digital images, Proceedings of electronic imaging: security, forensics, steganography, and watermarking of multimedia contents X 6819, 681915 (2008)
[22] Mahdian, B.; Saic, S.: Blind authentication using periodic properties of interpolation, IEEE transactions on information forensics and security 3, No. 3, 529-538 (2008)
[23] Lin, C. -Y.; Wu, M.; Bloom, J.; Cox, I.; Miller, M.; Lui, Y.: Rotation, scale, and translation resilient watermaking for images, IEEE transactions on image processing 10, No. 5, 767-782 (2001) · Zbl 1037.68778 · doi:10.1109/83.918569
[24] Bracewell, R. N.: The Fourier transform and its application, (1986) · Zbl 0608.42001
[25] G. Griffin, A. Holub, P. Perona, Caltech-256 object category dataset, Technical Report 7694, California Institute of Technology, URL \langlehttp://authors.library.caltech.edu/7694 angle, 2007.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.