Abstract
In the paper, the approach is focused on the Zernike Moment-based model of ROI image (Region of Interest) and its parameters for an efficient image processing in the forensic issue. By considering the factors affecting the identification of an duplicated image, the change of ROI’s size is determined through the proposed algorithm. The proposed technique has shown a good improvement in reducing significantly Geometrical Errors (G.E) and Numerical Errors (N.E) performed better than that of the Zernike-based traditional technique. The duplicated detection program has been written by C++ and supporting OpenCV and Boost libraries that help to verify the images authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Popescu, A.C., Farid, H.: Exposing Digital Forgeries in Color Filter Array Interpolated Images. IEEE Trans. Signal Processing 53(10), October 2005
Sheng, Y., Shen, L.: Orthogonal Fourier-Mellin moments for invariant pattern recognition. J. Opt. Soc. Am. A 11, 1748–1757 (1994)
Farid, H.: Image Forgery Detection- A survey. IEEE Signal Processing Magazine 26(2), 16–25 (2009)
Chong, C.-W.: A formulation of a new class of continuous orthogonal moment invariants, and the analysis of their computational aspects. Ph.D thesis, Faculty of Engineering, University of Malaya, 50603 Kuala Lumpur, Malaysia, May 2003
Liao, S.X., Pawlak, M.: On the accuracy of Zernike moments for image analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(12), 1358–1364 (1998)
Chong, C.W., Raveendran, P., Mukundan, R.: A comparative analysis of algorithm for fast computation of Zernike moments. Pattern Recognition. 36(3), 731–742 (2003)
Papakostas, G.A., Boutalisn, Y.S., Papaodysseus, C.N., Fragoulis, D.K.: Numerical error analysis in Zernike moments computation. Image and Vision Computing 24 (2006)
Teh, C.H., Chin, R.T.: On image analysis by the methods of moments. Pattern Analysis and Machine Intelligence 10(4), 496–513 (1988)
http://www.lumetrics.com/documents/wavefront/Zernike_table.pdf
Chong-Yaw, W., Paramesran, R.: On the computational aspects of Zernike moments. Image Vision Computing 25(6), 967–980 (2007)
Arai, K., Barakbah, A.R.: Hierarchical K-means: an algorithm for centroids initialization for K-means. Reports of the Faculty of Science and Engineering, Saga University, pp. 840–8502 Saga Prefecture, Saga, Japan, 36, (1), (2007)
Liao, S.: Image analysis by moments. Ph.D thesis, University of Manitoba, Winnipeg, Manitoba, Canada (1993)
Kirschenhofer, P., Prodinger, H., Martınez, C.: Analysis of Hoare’s FIND Algorithm with Median-of-Three Partition. Journal Random Structures and Algorithm 10(1–2), 143–156 (1997)
Thacker, N.A., Aherne, F.J., Rockett, P.I.: The Bhattacharyya Metric as an Absolute Similarity Measure for Frequency Coded Data. TIPR 1997, pp. 9–11, Prague, June, 1997
Amerini, I., Ballan, L., Caldelli, R., Bimbo, A.D., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Security 6(3), 1099–1110 (2011)
Christlein, V., Riess, C., et al.: An Evaluation of Popular Copy-Move Forgery Detection Approaches. IEEE Transactions on Information Forensics and Security 7(6), 1841–1854 (2012)
http://www.italiadavay.ru/public/images/marche/marche_san_lorenzo.jpg
http://www.nacht-der-wissenschaften.de/2011/ansicht.php?id=%20%20%20%20%20%20%20%20101
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Le-Tien, T., Huynh-Ngoc, T., Huynh-Kha, T., Marie, L. (2015). Zernike Moment-Based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2015. ICCSA 2015. Lecture Notes in Computer Science(), vol 9158. Springer, Cham. https://doi.org/10.1007/978-3-319-21410-8_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-21410-8_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21409-2
Online ISBN: 978-3-319-21410-8
eBook Packages: Computer ScienceComputer Science (R0)