Abstract
This paper proposes a robust method for detecting copy-move forgery in images under various JPEG compression and Gaussian noise and blurring attacks. The method comprises feature extraction, feature matching, and duplicate block identification. The fast Fourier transform (FFT), singular value decomposition (SVD), and principal component analysis (PCA) are utilized for feature extraction. Then, the cascading matchers of FFT, SVD, and PCA are adopted for feature matching. Matched blocks are identified using cascade filtering with city block, horizontal, vertical, and frequency filters. Finally, the pixels on upper left corners of detected duplicate blocks are output for visual inspection. The major contributions of this paper are: (1) the proposed method is fully threshold-free; (2) only one-dimensional features are generated using FFT and SVD for feature matching; and (3) a high accuracy rate (> 97 %) is obtained even if the JPEG quality factor Q is 20. In extensive experiments, a 98 % accuracy rate and a 6 % false negative rate were obtained for the worst case of Q = 20 and a region size of 32 × 32 pixels compared to existing works, indicating the feasibility of the proposed method.
Similar content being viewed by others
References
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099–1110
Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensic Secur 7(3):1003–1017
Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1–3):33–43
CASIA image tampering detection evaluation database, national laboratory of pattern recognition, institute of automation, Chinese academy of science [On-line]. Available: http://forensics.idealtest.org
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841–1854
Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. In: Proc. of Digital Forensic Research Workshop, pp. 19–23
Fu L, Zhang M, Liu Z, Li H, He T (2012) Adaptive hybrid feature extraction for leaf image classification by support vector machine. Journal of Convergence Information Technology 7(2):160–166
Hu W-C, Chen W-H (2013) Effective forgery detection using DCT + SVD-based watermarking for region of interest in key frames of vision-based surveillance. Int J Comput Sci Eng 8(4):297–305
Hu W-C, Chen W-H, Huang D-Y, Yang C-Y (2015) Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimed Tools Appl. doi:10.1007/s11042-015-2449-0
Hu WC, Dai JS, Jian JS (2015) Effective composite image detection method based on feature inconsistency of image components. Digital Signal Processing 39:50–62
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184
Ketenci S, Ulutas G (2013) Copy-move forgery detection in images via 2D-Fourier transform. In: Proc. of 36th International Conference on Telecommunications and Signal Processing, pp. 813–816
Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimedia Signal Process 4(1):46–56
Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proc. of IEEE International Conference on Multimedia and Expo, pp. 1750–1753
Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454
Muhammad G, Dewan M-S, Moniruzzaman M, Hussain M, Huda M-N (2014) Image forgery detection using Gabor filters and DCT. In: Proc. of the International Conference on Electrical Engineering and Information & Communication Technology, pp. 1–5
Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515
Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using Zernike moments. In: Proc. of 12th International Conference on Information Hiding, pp. 51–65
Wang Y, Gurule K, Wise J, Zheng J (2012) Wavelet based region duplication forgery detection. In: Proc. of 2012 Ninth International Conference on Information Technology: New Generations, pp. 30–35
Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: Proc. of 2010 International Conference on Multimedia Information Networking and Security, pp. 889–892
Zhang T, Wang R-D (2009) Copy-move forgery detection based on SVD in digital image. In: Proc. of IEEE International Congress on Image and Signal Processing, pp. 1–5
Acknowledgments
This paper was in part financially supported by the Ministry of Science and Technology, Taiwan, under grants NSC 102-2221-E-212-015, MOST 104-2221-E-212-005, and MOST 104-2218-E-212-001.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, DY., Huang, CN., Hu, WC. et al. Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed Tools Appl 76, 1509–1530 (2017). https://doi.org/10.1007/s11042-015-3152-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3152-x