Skip to main content
Log in

Robustness of copy-move forgery detection under high JPEG compression artifacts

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a robust method for detecting copy-move forgery in images under various JPEG compression and Gaussian noise and blurring attacks. The method comprises feature extraction, feature matching, and duplicate block identification. The fast Fourier transform (FFT), singular value decomposition (SVD), and principal component analysis (PCA) are utilized for feature extraction. Then, the cascading matchers of FFT, SVD, and PCA are adopted for feature matching. Matched blocks are identified using cascade filtering with city block, horizontal, vertical, and frequency filters. Finally, the pixels on upper left corners of detected duplicate blocks are output for visual inspection. The major contributions of this paper are: (1) the proposed method is fully threshold-free; (2) only one-dimensional features are generated using FFT and SVD for feature matching; and (3) a high accuracy rate (> 97 %) is obtained even if the JPEG quality factor Q is 20. In extensive experiments, a 98 % accuracy rate and a 6 % false negative rate were obtained for the worst case of Q = 20 and a region size of 32 × 32 pixels compared to existing works, indicating the feasibility of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099–1110

    Article  Google Scholar 

  2. Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensic Secur 7(3):1003–1017

    Article  Google Scholar 

  3. Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1–3):33–43

    Article  Google Scholar 

  4. CASIA image tampering detection evaluation database, national laboratory of pattern recognition, institute of automation, Chinese academy of science [On-line]. Available: http://forensics.idealtest.org

  5. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841–1854

    Article  Google Scholar 

  6. Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. In: Proc. of Digital Forensic Research Workshop, pp. 19–23

  7. Fu L, Zhang M, Liu Z, Li H, He T (2012) Adaptive hybrid feature extraction for leaf image classification by support vector machine. Journal of Convergence Information Technology 7(2):160–166

    Article  Google Scholar 

  8. Hu W-C, Chen W-H (2013) Effective forgery detection using DCT + SVD-based watermarking for region of interest in key frames of vision-based surveillance. Int J Comput Sci Eng 8(4):297–305

    Article  Google Scholar 

  9. Hu W-C, Chen W-H, Huang D-Y, Yang C-Y (2015) Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimed Tools Appl. doi:10.1007/s11042-015-2449-0

    Google Scholar 

  10. Hu WC, Dai JS, Jian JS (2015) Effective composite image detection method based on feature inconsistency of image components. Digital Signal Processing 39:50–62

    Article  Google Scholar 

  11. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184

    Article  Google Scholar 

  12. Ketenci S, Ulutas G (2013) Copy-move forgery detection in images via 2D-Fourier transform. In: Proc. of 36th International Conference on Telecommunications and Signal Processing, pp. 813–816

  13. Li L, Li S, Zhu H, Chu S-C, Roddick JF, Pan J-S (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimedia Signal Process 4(1):46–56

    Google Scholar 

  14. Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proc. of IEEE International Conference on Multimedia and Expo, pp. 1750–1753

  15. Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454

    Article  MathSciNet  Google Scholar 

  16. Muhammad G, Dewan M-S, Moniruzzaman M, Hussain M, Huda M-N (2014) Image forgery detection using Gabor filters and DCT. In: Proc. of the International Conference on Electrical Engineering and Information & Communication Technology, pp. 1–5

  17. Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515

  18. Ryu S-J, Lee M-J, Lee H-K (2010) Detection of copy-rotate-move forgery using Zernike moments. In: Proc. of 12th International Conference on Information Hiding, pp. 51–65

  19. Wang Y, Gurule K, Wise J, Zheng J (2012) Wavelet based region duplication forgery detection. In: Proc. of 2012 Ninth International Conference on Information Technology: New Generations, pp. 30–35

  20. Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: Proc. of 2010 International Conference on Multimedia Information Networking and Security, pp. 889–892

  21. Zhang T, Wang R-D (2009) Copy-move forgery detection based on SVD in digital image. In: Proc. of IEEE International Congress on Image and Signal Processing, pp. 1–5

Download references

Acknowledgments

This paper was in part financially supported by the Ministry of Science and Technology, Taiwan, under grants NSC 102-2221-E-212-015, MOST 104-2221-E-212-005, and MOST 104-2218-E-212-001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deng-Yuan Huang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, DY., Huang, CN., Hu, WC. et al. Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed Tools Appl 76, 1509–1530 (2017). https://doi.org/10.1007/s11042-015-3152-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3152-x

Keywords

Navigation