Abstract
With the increasing popularity of digital media and the ubiquitous availability of media editing software, innocuous multimedia are easily tampered for malicious purposes. Copy-move forgery is one important category of image forgery, in which a part of an image is duplicated, and substitutes another part of the same image at a different location. Many schemes have been proposed to detect and locate the forged regions. However, these schemes fail when the copied region is affected by post-processing operations before being pasted. To rectify the problem and further improve the detection accuracy, we propose a robust copy-move forgery detection method based on dual-transform to detect such specific artifacts, in which a cascade of Radon transform (RT) and Discrete Cosine Transform (DCT) is used. It will be shown that the dual-transform coefficients well conform the efficient assumption and therefore leads to more robust feature extraction results. Experimental results demonstrate that our method is robust not only to noise contamination, blurring, and JPEG compression, but also to region scaling, rotation and flipping, respectively.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2013R1A1A4A01009848) and a Research Grant of Pukyong National University (2013-0472).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. J. Forensic Sci. Int. 206(13), 178–184 (2011)
Khan, S., Kulkarni, A.: Reduced time complexity for detection of copy-move forgery using discrete wavelet transform. Int. J. Comput. Appl. 6(7), 31–36 (2010)
Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. J. Forensic Sci. Int. 171(27), 180–189 (2007)
Ryu, S.-J., Lee, M.-J., Lee, H.-K.: Detection of copy-rotate-move forgery using zernike moments. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 51–65. Springer, Heidelberg (2010)
Liu, G.J., Wang, J.W., Lian, S.G., Wang, Z.Q.: A passive image authentication scheme for detecting region duplication forgery with rotation. J. Netw. Comput. Appl. 34(5), 1557–1565 (2011)
Fiffy, M.A.: The radon transform and some of its applications. J. Mod. Optics. 32(1), 3–4 (1985)
Khayam, S.A.: The Discrete Cosine Transform (DCT): Theory and Application. J. Inf. Theor. Coding, 1–31 (2003)
Fridrich, A.: Detection of copy-move forgery in digital images. In: Proceedings of the Digital Forensic Research Workshop, Cleveland OH, USA (2003)
Li, L., Li, S., Zhu, H.: An efficient scheme for detecting copy-move forged images by local binary patterns. J. Inf. Hiding Multimedia Signal Process. 4(1), 46–56 (2013)
Christlein, V., Riess, R., Angelopoulou, E.: On rotation invariance on copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security, pp. 1–6 (2010)
Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)
Chrislein, V., Riess, R., Jordan, J., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Doyoddorj, M., Rhee, KH. (2014). Robust Copy-Move Forgery Detection Based on Dual-Transform. In: Gladyshev, P., Marrington, A., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 132. Springer, Cham. https://doi.org/10.1007/978-3-319-14289-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-14289-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14288-3
Online ISBN: 978-3-319-14289-0
eBook Packages: Computer ScienceComputer Science (R0)