Abstract
Image manipulation has become commonplace with growing easy access to sophisticated photo editing softwares. One of the most common types of image forgeries is the copy–move forgery, wherein a region from an image is replaced with another region from the same image. Many existing forensic methods suffer from their inability to detect the cloned area, which is subjected to various transformations such as scaling, rotation, flipping and blurring. In this paper, we propose a novel forensic method based on high-speed corner detection (HSCD) technique and improved scale invariant features transform (SIFT) descriptor. Machine learning technique is used to detect feature points which greatly decreasing the processing time compare to other feather detectors. Experimental results show the efficacy of this technique in detecting copy-move forgeries and estimating the geometric transformation parameters. Compared with the state of the art, our approach obtains a higher true positive rate and a lower false positive rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fridrich, J., Soukal, B.D., Lukáš, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, Cleveland, OH (2003)
Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Sig. Process. 53, 758–767 (2005)
Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, Taipei, Taiwan, pp. 1053–1056 (2009)
He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45(12), 4292–4299 (2012)
Yang, B., Sun, X., Chen, X., Zhang, J., Li, X.: An efficient forensic method for copy-move forgery detection based on DWT-FWHT. Radioengineering 22, 1098–1105 (2013)
Kakar, P., Sudha, N.: Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Trans. Inf. Forensics Secur. 7, 1018–1028 (2012)
Amerini, I., Barni, M., Caldelli, R., Costanzo, A.: Counter-forensics of SIFT-based copy-move detection by means of keypoint classification. EURASIP J. Image Video Process. 2013, 1–17 (2013)
Pan, X., Lyu, S.: Region duplication detection using image feature matching. IEEE Trans. Inf. Forensics Secur. 5, 857–867 (2010)
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-Based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6, 1099–1110 (2011)
Lowe, D.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 91–110 (2004)
Neamtu, C., Barca, C., Achimescu, E., Gavriloaia, B.: Exposing copy-move image tampering using forensic method based on SURF. In: 2013 International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1–4 (2013)
Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (SURF). Comput. Vis. Image Underst. 110, 346–359 (2008)
Luo, J., Oubong, G.: A comparison of SIFT, PCA-SIFT and SURF. Int. J. Image Process. 3, 143–152 (2009)
Zhu, Y., Shen, X., Chen, H.: Copy-move forgery detection based on scaled ORB. Multimedia Tools Appl. 75(6), 3221–3233 (2016)
Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26, 1403–1416 (2015)
Gu, B., Sheng, V.S.: A robust regularization path algorithm for v-support vector classification. IEEE Trans. Neural Netw. Learn. Syst. PP, 1–8 (2016)
Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10, 2284–2297 (2015)
Guo, J.-M., Liu, Y.-F., Wu, Z.-J.: Duplication forgery detection using improved DAISY descriptor. Expert Syst. Appl. 40, 707–714 (2013)
Shivakumar, B.L., Baboo, S.: Detection of region duplication forgery in digital images using SURF. Int. J. Comput. Sci. Issues 8, 199–205 (2011)
Rosten, E., Porter, R., Drummond, T.: Faster and better: a machine learning approach to corner detection. IEEE Trans. Pattern Anal. Mach. Intell. 32, 105–119 (2010)
Li, C., Ma, L.: A new framework for feature descriptor based on SIFT. Pattern Recogn. Lett. 30, 544–557 (2009)
Liao, K., Liu, G., Hui, Y.: An improvement to the SIFT descriptor for image representation and matching. Pattern Recogn. Lett. 34, 1211–1220 (2013)
Lindeberg, T., Gårding, J.: Shape-adapted smoothing in estimation of 3-D shape cues from affine deformations of local 2-D brightness structure. Image Vis. Comput. 15, 415–434 (1997)
Friedman, J., Hastie, T., Tibshirani, R.: The elements of statistical learning[M]. Springer, Berlin (2001). Springer series in statistics
Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD—new database for copy-move forgery detection. In: 2013 55th International Symposium on ELMAR, pp. 49–54 (2013)
Acknowledgment
This work is supported in part by the National Natural Science Foundation of China (NO. 61232016, U1405254, 61173141, 61173142, 61173136, 61373133, 51503084); the Fundamental Research Funds for the Central Universities (NO. JUSRP11534);Â the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD); Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Yang, B., Guo, H. (2016). An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-48674-1_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48673-4
Online ISBN: 978-3-319-48674-1
eBook Packages: Computer ScienceComputer Science (R0)