Skip to main content

Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 623))

Abstract

Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo some manipulations before being shared without leaving any obvious traces of tampering; due to existence of the powerful image editing softwares. Copy-move forgery technique is a very simple and common type of image forgery, where a part of the image is copied and then pasted in the same image to replicate or hide some parts from the image. In this paper, we proposed a copy-scale-move forgery detection method based on Scale Invariant Feature Operator (SFOP) detector. The keypoints are then described using MROGH descriptor. Experimental results show that the proposed method is able to locate and detect the forgery even if under some geometric transformations such as scaling.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Al-Qershi, O.M., Khoo, B.E.: Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci. Int. 231(1), 284–295 (2013)

    Article  Google Scholar 

  2. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  3. Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-Up Robust Features (SURF). Comput. Vis. Image Underst. 110(3), 346–359 (2008)

    Article  Google Scholar 

  4. Bigu, J., et al.: A structure feature for some image processing applications based on spiral functions. Computer Vis. Graph. Image Process. 51(2), 166–194 (1990)

    Article  Google Scholar 

  5. Bo, X., Junwen, W., Guangjie, L., Yuewei, D.: Image copy-move forgery detection based on surf. In: 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 889–892. IEEE (2010)

    Google Scholar 

  6. Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)

    Article  Google Scholar 

  7. Ehsan, S., Kanwal, N., Clark, A.F., McDonald-Maier, K.D.: Measuring the coverage of interest point detectors. In: Kamel, M., Campilho, A. (eds.) ICIAR 2011, Part I. LNCS, vol. 6753, pp. 253–261. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Fan, B., Wu, F., Hu, Z.: Aggregating gradient distributions into intensity orders: a novel local image descriptor. In: 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2377–2384. IEEE (2011)

    Google Scholar 

  9. Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381–395 (1981)

    Article  MathSciNet  Google Scholar 

  10. Förstner, W.: A framework for low level feature extraction. In: Eklundh, J.-O. (ed.) Computer Vision—ECCV 1994. LNCS, vol. 801, pp. 383–394. Springer, Heidelberg (1994)

    Google Scholar 

  11. Förstner, W., Dickscheid, T., Schindler, F.: Detecting interpretable and accurate scale-invariant keypoints. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 2256–2263. IEEE (2009)

    Google Scholar 

  12. Huang, H., Guo, W., Zhang, Y.: Detection of copy-move forgery in digital images using sift algorithm. In: 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA 2008, vol. 2, pp. 272–276. IEEE (2008)

    Google Scholar 

  13. Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004)

    Article  Google Scholar 

  14. Nathalie Diane, W.N., Xingming, S., Moise, F.K.: A survey of partition-based techniques for copy-move forgery detection. Sci. World J. 2014, 13 (2014)

    Article  Google Scholar 

  15. Pan, X., Lyu, S.: Detecting image region duplication using sift features. In: 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 1706–1709. IEEE (2010)

    Google Scholar 

  16. Powers, D.M.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation (2011)

    Google Scholar 

Download references

Acknowledgment

The authors would like to thank all anonymous reviewers for their insightful comments. Additionally, This work is supported by the National Natural Science Foundation of China (Grant Number: 61471141, 61301099, 61361166006), the Fundamental Research Funds for the Central Universities (Grant Number: HIT. KISTP. 201416, HIT. KISTP. 201414).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Mahmoud Emam or Qi Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Emam, M., Han, Q., Zhang, H. (2016). Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH. In: Che, W., et al. Social Computing. ICYCSEE 2016. Communications in Computer and Information Science, vol 623. Springer, Singapore. https://doi.org/10.1007/978-981-10-2053-7_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2053-7_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2052-0

  • Online ISBN: 978-981-10-2053-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics