Skip to main content

A Fast Plain Copy-Move Detection Algorithm Based on Structural Pattern and 2D Rabin-Karp Rolling Hash

  • Conference paper
  • First Online:
Image Analysis and Recognition (ICIAR 2014)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 8814))

Included in the following conference series:

Abstract

Image forgery detection problem is challenging and important for many years. One of the most frequently used type of forgery is copying and pasting content within the same image or copy-move. Copy-move forgery detection has become one of the most actively researched topics in blind image forensics. We propose a novel plain copy-move detection algorithm using structural pattern and two-dimensional Rabin-Karp rolling hash. The novelty of proposed method is zero false negative error and high execution speed for large images. We also present the results of quality and speed investigations of the proposed algorithm, which depend on structural pattern construction type.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Popescu, A.C., Farid, H.: Statistical tools for digital forensics. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 128–147. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Fridrich, J., Soukal, D., Lukas, J.: Detection of copy–move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, pp. 55–61 (2003)

    Google Scholar 

  3. Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Science International 171(2), 180–189 (2007)

    Article  Google Scholar 

  4. Zhang, J., Feng, Z., Su, Y.: A new approach for detecting copy-move forgery in digital images. In: Proceedings of the International Conference on Communication Systems, pp. 362–366 (2008)

    Google Scholar 

  5. Dybala, B., Jennings, B., Letscher, D.: Detecting filtered cloning in digital images. In: Proceedings of the Workshop on Multimedia and Security, pp. 43–50 (2007)

    Google Scholar 

  6. Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: Proceedings of the Pacific-Asia Workshop on Computational Intelligence and Industrial Application, pp. 272–276 (2008)

    Google Scholar 

  7. Pan, X., Lyu, S.: Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security 5(4), 857–867 (2010)

    Article  Google Scholar 

  8. Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6), 1841–1854 (2012)

    Article  Google Scholar 

  9. Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuznetsov Andrey Vladimirovich .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Vladimirovich, K.A., Valerievich, M.V. (2014). A Fast Plain Copy-Move Detection Algorithm Based on Structural Pattern and 2D Rabin-Karp Rolling Hash. In: Campilho, A., Kamel, M. (eds) Image Analysis and Recognition. ICIAR 2014. Lecture Notes in Computer Science(), vol 8814. Springer, Cham. https://doi.org/10.1007/978-3-319-11758-4_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11758-4_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11757-7

  • Online ISBN: 978-3-319-11758-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics