Skip to main content

Detection of Copy-Rotate-Move Forgery Using Zernike Moments

  • Conference paper
Book cover Information Hiding (IH 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6387))

Included in the following conference series:

Abstract

As forgeries have become popular, the importance of forgery detection is much increased. Copy-move forgery, one of the most commonly used methods, copies a part of the image and pastes it into another part of the the image. In this paper, we propose a detection method of copy-move forgery that localizes duplicated regions using Zernike moments. Since the magnitude of Zernike moments is algebraically invariant against rotation, the proposed method can detect a forged region even though it is rotated. Our scheme is also resilient to the intentional distortions such as additive white Gaussian noise, JPEG compression, and blurring. Experimental results demonstrate that the proposed scheme is appropriate to identify the forged region by copy-rotate-move forgery.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. In an Iranian image, a missile too many, http://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-too-many/

  2. Fridrich, J., Soukal, D., Lukáš, J.: Detection of copy-move forgery in digital images. In: Digital Forensic Research Workshop (2003)

    Google Scholar 

  3. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting duplicated image regions. In: Technical Report, TR2004-515, Dartmouth College, Computer Science (2004)

    Google Scholar 

  4. Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: IEEE International Conference on Multimedia and Expo. IEEE Press, New York (2007)

    Google Scholar 

  5. Luo, W., Huang, J., Qiu, G.: Robust detection of region-duplication forgery in digital image. In: The 18th International Conference on Pattern Recognition (2006)

    Google Scholar 

  6. Mahdian, B., Saic, S.: Detection of copy-move forgery using a method based on blur moment invariants. Forensic Science International 171, 180–189 (2007)

    Article  Google Scholar 

  7. Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE Press, New York (2009)

    Google Scholar 

  8. Bravo-Solorio, S., Nandi, A.K.: Passive method for detecting duplicated regions affected by reflection, rotation and scaling. In: 17th European Signal Processing Conference (2009)

    Google Scholar 

  9. Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using SIFT algorithm. In: Pacific-Asia Conference on Computational Intelligence and Industrial Applications (2008)

    Google Scholar 

  10. Amerini, I., Ballan, L., Caldelli, R., Bimbo, A.D., Serra, G.: Geometric tampering estimation by means of a SIFT-based forensic analysis. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE Press, New York (2010)

    Google Scholar 

  11. Pan, X., Lyu, S.: Detecting image region duplication using SIFT features. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE Press, New York (2010)

    Google Scholar 

  12. Hu, M.K.: Visual pattern recognition by moment invariants. IEEE Trans. Information Theory 8, 179–187 (1962)

    MATH  Google Scholar 

  13. Kim, H.S., Lee, H.K.: Invariant image watermark using Zernike moments. IEEE Trans. Circuits and Systems for Video Technology 13(8), 766–775 (2003)

    Article  Google Scholar 

  14. Teh, C.H., Chin, R.T.: On image analysis by the methods of moments. IEEE Trans. Pattern Analysis and Machine Intelligence 10(4), 496–513 (1988)

    Article  MATH  Google Scholar 

  15. Khotanzad, A., Hong, Y.H.: Invariant image recognition by Zernike moments. IEEE Trans. Pattern Analysis and Machine Intelligence 12(5), 489–497 (1990)

    Article  Google Scholar 

  16. Zernike, F.: Beugungstheorie des Schneidenverfahrens und seiner verbesserten Form, der Phasenkontrastmethode. Physica 1, 689–704 (1934)

    Article  MATH  Google Scholar 

  17. Manning, C.D., Raghavan, P., Schütze, H.: An Introduction to Information Retrieval. Cambridge University Press, Cambridge (2009)

    MATH  Google Scholar 

  18. National Geographic, http://photography.nationalgeographic.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ryu, SJ., Lee, MJ., Lee, HK. (2010). Detection of Copy-Rotate-Move Forgery Using Zernike Moments. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16435-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16434-7

  • Online ISBN: 978-3-642-16435-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics