Detection of copy-move forgery using a method based on blur moment invariants

被引:263
作者
Mahdian, Babak [1 ]
Saic, Stanislav [1 ]
机构
[1] Acad Sci Czech Republ, Inst Informat Theory & Automat, CR-18208 Prague 8, Czech Republic
关键词
authentication; image forensics; image tampering; duplicated image regions; copy-move forgery; image moments;
D O I
10.1016/j.forsciint.2006.11.002
中图分类号
DF [法律]; D9 [法律]; R [医药、卫生];
学科分类号
0301 ; 10 ;
摘要
In our society digital images are a powerful and widely used communication medium. They have an important impact on our life. In recent years, due to the advent of high-performance commodity hardware and improved human-computer interfaces, it has become relatively easy to create fake images. Modem, easy to use image processing software enables forgeries that are undetectable by the naked eye. In this work we propose a method to automatically detect and localize duplicated regions in digital images. The presence of duplicated regions in an image may signify a common type of forgery called copy-move forgery. The method is based on blur moment invariants, which allows successful detection of copy-move forgery, even when blur degradation, additional noise, or arbitrary contrast changes are present in the duplicated regions. These modifications are commonly used techniques to conceal traces of copy-move forgery. Our method works equally well for lossy format such as JPEG. We demonstrate our method on several images affected by copy-move forgery. (c) 2006 Elsevier Ireland Ltd. All rights reserved.
引用
收藏
页码:180 / 189
页数:10
相关论文
共 15 条
[1]  
[Anonymous], 2004, TR20042518 DARTM COL
[2]  
[Anonymous], MULTIMEDIA 00
[3]   MULTIDIMENSIONAL BINARY SEARCH TREES USED FOR ASSOCIATIVE SEARCHING [J].
BENTLEY, JL .
COMMUNICATIONS OF THE ACM, 1975, 18 (09) :509-517
[4]  
Duda R., 1973, PATTERN RECOGN
[5]   Recognition of blurred images by the method of moments [J].
Flusser, J ;
Suk, T ;
Saic, S .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1996, 5 (03) :533-538
[6]   IMAGE FEATURES INVARIANT WITH RESPECT TO BLUR [J].
FLUSSER, J ;
SUK, T ;
SAIC, S .
PATTERN RECOGNITION, 1995, 28 (11) :1723-1732
[7]   Degraded image analysis: An invariant approach [J].
Flusser, J ;
Suk, T .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998, 20 (06) :590-603
[8]  
FRIDRICH J, 1999, P ACM WORKSH MULT SE, P19
[9]  
Johnson M.K., 2005, Proceedings of the 7th Workshop on Multimedia and Security, P1, DOI [10.1145/1073170.1073171, DOI 10.1145/1073170.1073171]
[10]  
POPESCU A. C., 2004, TR2004515 DARTM COLL