An Evaluation of Popular Copy-Move Forgery Detection Approaches

被引:498
作者
Christlein, Vincent [1 ]
Riess, Christian [1 ]
Jordan, Johannes [1 ]
Riess, Corinna [2 ]
Angelopoulou, Elli [1 ]
机构
[1] Univ Erlangen Nurnberg, Pattern Recognit Lab, D-91058 Nurnberg, Germany
[2] Xeomed, D-90441 Nurnberg, Germany
关键词
Benchmark dataset; comparative study; copy-move forgery; image forensics; manipulation detection; WATERMARKING;
D O I
10.1109/TIFS.2012.2218597
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A copy-move forgery is created by copying and pasting content within the same image, and potentially postprocessing it. In recent years, the detection of copy-move forgeries has become one of the most actively researched topics in blind image forensics. A considerable number of different algorithms have been proposed focusing on different types of postprocessed copies. In this paper, we aim to answer which copy-move forgery detection algorithms and processing steps (e.g., matching, filtering, outlier detection, affine transformation estimation) perform best in various postprocessing scenarios. The focus of our analysis is to evaluate the performance of previously proposed feature sets. We achieve this by casting existing algorithms in a common pipeline. In this paper, we examined the 15 most prominent feature sets. We analyzed the detection performance on a per-image basis and on a per-pixel basis. We created a challenging real-world copy-move dataset, and a software framework for systematic image manipulation. Experiments show, that the keypoint-based features Sift and Surf, as well as the block-based DCT, DWT, KPCA, PCA, and Zernike features perform very well. These feature sets exhibit the best robustness against various noise sources and downsampling, while reliably identifying the copied regions.
引用
收藏
页码:1841 / 1854
页数:14
相关论文
共 42 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], 2010, P IEEE WORKSH INF FO
[3]  
[Anonymous], 2010, SICHERHEIT
[4]  
[Anonymous], P SPIE MEDIA FORENSI
[5]  
[Anonymous], CASIA IM TAMP DET EV
[6]  
[Anonymous], 2004, 20320043 COL U
[7]  
[Anonymous], P EUR SIGN PROC C AN
[8]  
Bashar Khayrul., 2007, Conference on Machine Vision Application, P264
[9]  
Bashar M., IEEEE T IMA IN PRESS
[10]  
Battiato S., 2009, P 1 ACM WORKSHOP MUL, P37