Copy-move forgery detection and localization by means of robust clustering with J-Linkage

被引:223
作者
Amerini, Irene [1 ]
Ballan, Lamberto [1 ]
Caldelli, Roberto [1 ]
Del Bimbo, Alberto [1 ]
Del Tongo, Luca [1 ]
Serra, Giuseppe [1 ,2 ]
机构
[1] Univ Florence, Media Integrat & Commun Ctr MICC, I-50134 Florence, Italy
[2] Univ Modena & Reggio Emilia, Dipartimento Ingn Enzo Ferrari, I-41125 Modena, Italy
关键词
Digital image forensics; Tampering detection; Copy-move detection; Copy-move localization; IMAGE; FEATURES; DCT;
D O I
10.1016/j.image.2013.03.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Understanding if a digital image is authentic or not, is a key purpose of image forensics. There are several different tampering attacks but, surely, one of the most common and immediate one is copy-move. A recent and effective approach for detecting copy-move forgeries is to use local visual features such as SIFT. In this kind of methods, SIFT matching is often followed by a clustering procedure to group keypoints that are spatially close. Often, this procedure could be unsatisfactory, in particular in those cases in which the copied patch contains pixels that are spatially very distant among them, and when the pasted area is near to the original source. In such cases, a better estimation of the cloned area is necessary in order to obtain an accurate forgery localization. In this paper a novel approach is presented for copy-move forgery detection and localization based on the J-Linkage algorithm, which performs a robust clustering in the space of the geometric transformation. Experimental results, carried out on different datasets, show that the proposed method outperforms other similar state-of-the-art techniques both in terms of copy-move forgery detection reliability and of precision in the manipulated patch localization. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:659 / 669
页数:11
相关论文
共 30 条
[21]   Distinctive image features from scale-invariant keypoints [J].
Lowe, DG .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2004, 60 (02) :91-110
[22]  
Luo W., 2006, P ICPR WASH DC US
[23]   Detection of copy-move forgery using a method based on blur moment invariants [J].
Mahdian, Babak ;
Saic, Stanislav .
FORENSIC SCIENCE INTERNATIONAL, 2007, 171 (2-3) :180-189
[24]   A bibliography on blind methods for identifying image forgery [J].
Mahdian, Babak ;
Saic, Stanislav .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2010, 25 (06) :389-399
[25]   Region Duplication Detection Using Image Feature Matching [J].
Pan, Xunyu ;
Lyu, Siwei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :857-867
[26]  
Popescu A.C., 2004, TR2004515 DARTM COLL
[27]   Digital image forensics: a booklet for beginners [J].
Redi, Judith A. ;
Taktak, Wiem ;
Dugelay, Jean-Luc .
MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 51 (01) :133-162
[28]  
Shivakumar B., 2011, International Journal of Computer Science Issues (IJCSI), V8, P199
[29]  
Wang J, 2009, P MINES WASH DC US
[30]  
Yu N., 2010, P IEEE ICIP HONG KON