An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection

被引:7
作者
Chen, Likai [1 ]
Lu, Wei [1 ]
Ni, Jiangqun [1 ]
机构
[1] Sun Yat Sen Univ, Guangzhou, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Copy-Rotate-Move; Digital Image Forensics; Flip; Mask; Step Sector Statistics;
D O I
10.4018/jdcf.2012010104
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A robust method for local image region feature description based on step sector statistics is proposed in this paper. The means and the standard deviations along the radial direction of the circle image region are extracted through the sector masks, and the rearrangement of these statistics makes this image region description method rotation-robust. The proposed description method is applied in the detection of copy-rotate-move forgery, and it can detect the exact rotation angle between the duplicate regions. With minor extension, the proposed description method can also be applied in the detection of copy-flip-move forgery. The experimental results show that the proposed description method can work well for the detection of copy-rotate/flip-move forgery.
引用
收藏
页码:49 / 62
页数:14
相关论文
共 25 条
[1]   GEOMETRIC TAMPERING ESTIMATION BY MEANS OF A SIFT-BASED FORENSIC ANALYSIS [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :1702-1705
[2]  
[Anonymous], 2008, IR TEST FIR LONG RAN
[3]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[4]  
Bayram S., 2009, SURVEY COPY MOVE FOR
[5]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[6]   Photo Fakery and Forensics [J].
Farid, Hany .
ADVANCES IN COMPUTERS, VOL 77, 2009, 77 :1-55
[7]  
Fridrich AJ, 2003, P DIG FOR RES WORKSH, DOI DOI 10.1109/PACIIA.2008.240
[8]   Invertible authentication [J].
Fridrich, J ;
Gojan, M ;
Du, R .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :197-208
[9]  
Huang HL, 2008, PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, P1241
[10]   Metadata-based image watermarking for copyright protection [J].
Huang, Hsiang-Cheh ;
Fang, Wai-Chi .
SIMULATION MODELLING PRACTICE AND THEORY, 2010, 18 (04) :436-445