Segmentation-Based Image Copy-Move Forgery Detection Scheme

被引:715
作者
Li, Jian [1 ]
Li, Xiaolong [2 ]
Yang, Bin [2 ]
Sun, Xingming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[2] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
关键词
Copy-move forgery detection; image forensics; segmentation; ENERGY MANAGEMENT;
D O I
10.1109/TIFS.2014.2381872
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the traditional methods is that the proposed scheme first segments the test image into semantically independent patches prior to keypoint extraction. As a result, the copy-move regions can be detected by matching between these patches. The matching process consists of two stages. In the first stage, we find the suspicious pairs of patches that may contain copy-move forgery regions, and we roughly estimate an affine transform matrix. In the second stage, an Expectation-Maximization-based algorithm is designed to refine the estimated matrix and to confirm the existence of copy-move forgery. Experimental results prove the good performance of the proposed scheme via comparing it with the state-of-the-art schemes on the public databases.
引用
收藏
页码:507 / 518
页数:12
相关论文
共 36 条
[1]   SLIC Superpixels Compared to State-of-the-Art Superpixel Methods [J].
Achanta, Radhakrishna ;
Shaji, Appu ;
Smith, Kevin ;
Lucchi, Aurelien ;
Fua, Pascal ;
Suesstrunk, Sabine .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2012, 34 (11) :2274-2281
[2]  
Akhin M., 2010, 2010 6th Central and Eastern European Software Engineering Conference in Russia (CEE-SECR 2010), P36, DOI 10.1109/CEE-SECR.2010.5783148
[3]   Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Del Tongo, Luca ;
Serra, Giuseppe .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (06) :659-669
[4]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[5]  
[Anonymous], IPSJ T COMP VIS APPL
[6]  
[Anonymous], 2011, P INT C WORKSH EM TR
[7]  
[Anonymous], 2011, 2011 18 INT C SYST S
[8]  
[Anonymous], 2006, P 8 WORKSH MULT SEC
[9]  
[Anonymous], 2004, Multiple view geometry in computer vision, DOI DOI 10.1017/CBO9780511811685
[10]  
[Anonymous], 1997, Technical Report TR-97-021