Skip to main content

An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10040))

Included in the following conference series:

  • 1929 Accesses

Abstract

Image manipulation has become commonplace with growing easy access to sophisticated photo editing softwares. One of the most common types of image forgeries is the copy–move forgery, wherein a region from an image is replaced with another region from the same image. Many existing forensic methods suffer from their inability to detect the cloned area, which is subjected to various transformations such as scaling, rotation, flipping and blurring. In this paper, we propose a novel forensic method based on high-speed corner detection (HSCD) technique and improved scale invariant features transform (SIFT) descriptor. Machine learning technique is used to detect feature points which greatly decreasing the processing time compare to other feather detectors. Experimental results show the efficacy of this technique in detecting copy-move forgeries and estimating the geometric transformation parameters. Compared with the state of the art, our approach obtains a higher true positive rate and a lower false positive rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fridrich, J., Soukal, B.D., Lukáš, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, Cleveland, OH (2003)

    Google Scholar 

  2. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Sig. Process. 53, 758–767 (2005)

    Article  MathSciNet  Google Scholar 

  3. Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, Taipei, Taiwan, pp. 1053–1056 (2009)

    Google Scholar 

  4. He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45(12), 4292–4299 (2012)

    Article  Google Scholar 

  5. Yang, B., Sun, X., Chen, X., Zhang, J., Li, X.: An efficient forensic method for copy-move forgery detection based on DWT-FWHT. Radioengineering 22, 1098–1105 (2013)

    Google Scholar 

  6. Kakar, P., Sudha, N.: Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Trans. Inf. Forensics Secur. 7, 1018–1028 (2012)

    Article  Google Scholar 

  7. Amerini, I., Barni, M., Caldelli, R., Costanzo, A.: Counter-forensics of SIFT-based copy-move detection by means of keypoint classification. EURASIP J. Image Video Process. 2013, 1–17 (2013)

    Article  Google Scholar 

  8. Pan, X., Lyu, S.: Region duplication detection using image feature matching. IEEE Trans. Inf. Forensics Secur. 5, 857–867 (2010)

    Article  Google Scholar 

  9. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-Based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6, 1099–1110 (2011)

    Article  Google Scholar 

  10. Lowe, D.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 91–110 (2004)

    Article  Google Scholar 

  11. Neamtu, C., Barca, C., Achimescu, E., Gavriloaia, B.: Exposing copy-move image tampering using forensic method based on SURF. In: 2013 International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1–4 (2013)

    Google Scholar 

  12. Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (SURF). Comput. Vis. Image Underst. 110, 346–359 (2008)

    Article  Google Scholar 

  13. Luo, J., Oubong, G.: A comparison of SIFT, PCA-SIFT and SURF. Int. J. Image Process. 3, 143–152 (2009)

    Google Scholar 

  14. Zhu, Y., Shen, X., Chen, H.: Copy-move forgery detection based on scaled ORB. Multimedia Tools Appl. 75(6), 3221–3233 (2016)

    Article  Google Scholar 

  15. Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26, 1403–1416 (2015)

    Article  MathSciNet  Google Scholar 

  16. Gu, B., Sheng, V.S.: A robust regularization path algorithm for v-support vector classification. IEEE Trans. Neural Netw. Learn. Syst. PP, 1–8 (2016)

    Google Scholar 

  17. Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10, 2284–2297 (2015)

    Article  Google Scholar 

  18. Guo, J.-M., Liu, Y.-F., Wu, Z.-J.: Duplication forgery detection using improved DAISY descriptor. Expert Syst. Appl. 40, 707–714 (2013)

    Article  Google Scholar 

  19. Shivakumar, B.L., Baboo, S.: Detection of region duplication forgery in digital images using SURF. Int. J. Comput. Sci. Issues 8, 199–205 (2011)

    Google Scholar 

  20. Rosten, E., Porter, R., Drummond, T.: Faster and better: a machine learning approach to corner detection. IEEE Trans. Pattern Anal. Mach. Intell. 32, 105–119 (2010)

    Article  Google Scholar 

  21. Li, C., Ma, L.: A new framework for feature descriptor based on SIFT. Pattern Recogn. Lett. 30, 544–557 (2009)

    Article  Google Scholar 

  22. Liao, K., Liu, G., Hui, Y.: An improvement to the SIFT descriptor for image representation and matching. Pattern Recogn. Lett. 34, 1211–1220 (2013)

    Article  Google Scholar 

  23. Lindeberg, T., Gårding, J.: Shape-adapted smoothing in estimation of 3-D shape cues from affine deformations of local 2-D brightness structure. Image Vis. Comput. 15, 415–434 (1997)

    Article  Google Scholar 

  24. Friedman, J., Hastie, T., Tibshirani, R.: The elements of statistical learning[M]. Springer, Berlin (2001). Springer series in statistics

    MATH  Google Scholar 

  25. Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD—new database for copy-move forgery detection. In: 2013 55th International Symposium on ELMAR, pp. 49–54 (2013)

    Google Scholar 

Download references

Acknowledgment

This work is supported in part by the National Natural Science Foundation of China (NO. 61232016, U1405254, 61173141, 61173142, 61173136, 61373133, 51503084); the Fundamental Research Funds for the Central Universities (NO. JUSRP11534); the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD); Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Yang, B., Guo, H. (2016). An Efficient Forensic Method Based on High-speed Corner Detection Technique and SIFT Descriptor. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48674-1_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48673-4

  • Online ISBN: 978-3-319-48674-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics