Skip to main content
Log in

Dual tree complex wavelet transform approach to copy-rotate-move forgery detection

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

As a common scheme of image tampering, copy-move forgery plays an important role in image forgery committee. Although several blind methods aimed at detecting replicated regions have been proposed, these methods cannot detect the rotation changes in the duplicated areas efficiently. In this paper, a new forensic method is presented to detect the replicated areas rotated by arbitrary angles, even by JPEG compression. To achieve this, overlapping blocks of pixels are decomposed using dual tree complex wavelet transform (DTCWT), and then channel energies are extracted from each subband at each decomposition level using the L1 norm. Finally, the anisotropic rotationally invariant features are extracted using magnitudes of discrete Fourier transform for these channel energies. The implementation procedure of the proposed method is described in detail. Extensive experimental results, including a comparative evaluation with existing methods and the special applications in practice, are also presented to demonstrate the robustness and effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Farid H. Image forgery detection. IEEE Signal Process Mag, 2009, 26: 16–25

    Article  Google Scholar 

  2. Pan F, Chen J B, Huang J W. Discriminating between photorealistic computer graphics and natural images using fractal geometry. Sci China Ser F-Inf Sci, 2009, 52: 329–337

    Article  MATH  Google Scholar 

  3. Rekhis S, Boudriga N. A system for formal digital forensic investigation aware of anti-forensic attacks. IEEE Trans Inf Forensic Secur, 2012, 7: 635–650

    Article  Google Scholar 

  4. Hyoung J K, Soomin L, Jongsub M, et al. A photographic forensic case study: myths, principles and techniques. Math Comput Model, 2012, 55: 3–11

    Article  Google Scholar 

  5. Kakar P, Natarajan S. Verifying temporal data in geotagged images via Sun azimuth estimation. IEEE Trans Inf Forensic Secur, 2012, 7: 1029–1039

    Article  Google Scholar 

  6. Fridrich J, Soukalm D. Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, Cleveland, 2003. 5–8

    Google Scholar 

  7. Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515. Dartmouth College, 2004

    Google Scholar 

  8. Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm. In: Proceedings of IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, 2008. 19–20

    Google Scholar 

  9. Bayram S, Sencar H T, Memon N. An efficient and robust method for detecting copy-move forgery. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, 2009. 1053–1057

    Google Scholar 

  10. Lin H, Wang C, Kao Y. Fast copy-move forgery detection. WSEAS Trans Signal Process, 2009, 5: 1790–5052

    Google Scholar 

  11. Amerini I, Ballan L, Caldelli R, et al. Geometric tampering estimation by means of a SIFT-based forensic analysis. In: Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing, Dallas, 2010. 1702–1705

    Google Scholar 

  12. Pan X, Lyu S. Detecting image region duplication using SIFT features. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Dallas, 2010. 1706–1709

    Google Scholar 

  13. Ryu S, Lee M, Lee H. Detection of copy-rotate-move forgery using Zernike moments. In: Proceedings of the 12th International Conference on Information Hiding. Berlin/Heidelberg: Springer-Verlag, 2010. 51–65

    Google Scholar 

  14. Solorio S B, Nandi A K. Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process, 2011, 91: 728–739

    Article  MATH  Google Scholar 

  15. Hill P, Bull D. Rotationally invariant texture features using the dual-tree complex wavelet transform. In: Proceedings of IEEE International Conference on Image Processing, Vancouver, 2000. 901–904

    Google Scholar 

  16. Kingsbury N G. The dual-tree complex wavelet transform: A new efficient tool for image restoration and enhancement. Proceedings of European Signal Processing Conference, Rhodes, 1998. 319–322

    Google Scholar 

  17. Kingsbury N G. Image processing with complex wavelets. Philos Trans R Soc A-Math Phys Eng Sci, 1999 357: 2543–2560

    Article  MATH  Google Scholar 

  18. Kingsbury N G. A dual-tree complex wavelet transform with improved orthogonality and symmetry properties. In: Proceedings of International Conference on Image Processing, Vancouver, 2000. 375–378

    Google Scholar 

  19. Selesnick I W, Baraniuk R G, Kingsbury N C. The dual-tree complex wavelet transform. IEEE Signal Process Mag, 2005, 22: 123–151

    Article  Google Scholar 

  20. Manning C D, Raghavan P. An Introduction to Information Retrieval. Cambridge: Cambridge University Press, 2009. 168–191

    Google Scholar 

  21. Griffin G, Holub A, Perona P. Caltech-256 object category dataset. http://resolver.caltech.edu/CaltechAUTHORS: CNS-TR-2007-001. 2007

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu Deng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, Y., Deng, Y., Duan, H. et al. Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci. China Inf. Sci. 57, 1–12 (2014). https://doi.org/10.1007/s11432-013-4823-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-013-4823-8

Keywords

Navigation