Skip to main content
Log in

Multi-scale feature extraction and adaptive matching for copy-move forgery detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A copy-move forgery detection scheme by using multi-scale feature extraction and adaptive matching is proposed in this paper. First, the host image is segmented into the non-overlapping patches of irregular shape in different scales. Then, Scale Invariant Feature Transform is applied to extract feature points from all patches, to generate the multi-scale features. An Adaptive Patch Matching algorithm is subsequently proposed for finding the matching that indicate the suspicious forged regions in each scale. Finally, the suspicious regions in all scales are merged to generate the detected forgery regions in the proposed Matched Keypoints Merging algorithm. Experimental results show that the proposed scheme performs much better than the existing state-of-the-art copy-move forgery detection algorithms, even under various challenging conditions, including the geometric transforms, such as scaling and rotation, and the common signal processing, such as JPEG compression and noise addition; in addition, the special cases such as the multiple copies and the down-sampling are also evaluated, the results indicate the very good performance of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Achanta R, Shaji A, Smith K, Lucchi A, Fua P, Susstrunk S (2012) SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274–2282. doi:10.1109/TPAMI.2012.120

    Article  Google Scholar 

  2. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110

    Article  Google Scholar 

  3. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28(6):659–669

    Article  Google Scholar 

  4. Bay H, Tuytelaars T, Van Gool L (2006) Surf: Speeded up robust features. In: Computer Vision–ECCV 2006. Springer, pp 404-417

  5. Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on, IEEE, pp 1053–1056

  6. Bi XL, Pun CM, Yuan XC (2016) Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection. Inf Sci 345:226–242

    Article  Google Scholar 

  7. Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. In: Acoustics, Speech and Signal Processing (ICASSP), 2011 I.E. International Conference on, IEEE, pp 1880–1883

  8. Bravo-Solorio S, Nandi AK (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028

    Article  Google Scholar 

  9. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854. doi:10.1109/Tifs.2012.2218597

    Article  Google Scholar 

  10. Costanzo A, Amerini I, Caldelli R, Barni M (2014) Forensic analysis of sift keypoint removal and injection. IEEE Trans Inf Forensics Secur 9(Sept.2014):1450–1464

    Article  Google Scholar 

  11. Emam M, Han Q, Niu X (2015) PCET based copy-move forgery detection in images under geometric transforms. Multimed Tools Appl:1–15. doi:10.1007/s11042-015-2872-2

  12. Fridrich J, Soukal D, Lukáš J (2003) Detection of copy-move forgery in digital images. In: In Proceedings of Digital Forensic Research Workshop, Citeseer

  13. Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: Computational Intelligence and Industrial Application, 2008. PACIIA'08. Pacific-Asia Workshop on, IEEE, pp 272–276

  14. Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: Computer Science and Software Engineering, 2008 International Conference on, IEEE, pp 926–930

  15. Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Multimedia and Expo, 2007 I.E. International Conference on, IEEE, pp 1750–1753

  16. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518

    Article  Google Scholar 

  17. Lin H, Wang C, Kao Y (2009) Fast copy-move forgery detection. WSEAS. Trans Signal Process 5(5):188–197

    Google Scholar 

  18. Lowe DG (1999) Object recognition from local scale-invariant features. In: Computer vision, 1999. The proceedings of the seventh IEEE international conference on, IEEE, pp 1150–1157

  19. Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: Pattern Recognition, 2006. ICPR 2006. 18th International Conference on, IEEE, pp 746–749

  20. Mahdian B, Saic S (2007) Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189

    Article  Google Scholar 

  21. Pan XY, Lyu S (2010) region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867. doi:10.1109/Tifs.2010.2078506

    Article  Google Scholar 

  22. Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Dept Comput Sci, Dartmouth College, Tech Rep TR2004–515

  23. Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive over-segmentation and feature points matching. IEEE Trans Inf Forensics Secur 10(8):1705–1716

    Article  Google Scholar 

  24. Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370. doi:10.1109/Tifs.2013.2272377

    Article  Google Scholar 

  25. Sekhar R, Shaji RS (2016) A study on segmentation-based copy-move forgery detection using DAISY descriptor. In Proceedings of the International Conference on Soft Computing Systems. Springer, India, pp 223–233

  26. Shivakumar B, Baboo LDSS (2011) Detection of region duplication forgery in digital images using SURF. IJCSI International Journal of Computer Science Issues 8(4):199–205

  27. Wang J, Liu G, Li H, Dai Y, Wang Z (2009a) Detection of image region duplication forgery using model with circle block. In: Multimedia Information Networking and Security, 2009. MINES'09. International Conference on, IEEE, pp 25–29

  28. Wang J, Liu G, Zhang Z, Dai Y, Wang Z (2009b) Fast and robust forensics for image region-duplication forgery. Acta Automat Sin 35(12):1488–1495

    Article  Google Scholar 

  29. Xu B, Wang J, Liu G, Dai Y (2010) Image copy-move forgery detection based on SURF. In: Multimedia Information Networking and Security (MINES), 2010 International Conference on, IEEE, pp 889–892

  30. Yu L, Han Q, Niu X (2014) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimed Tools Appl 75(2):1159–1176. doi:10.1007/s11042-014-2362-y

    Article  Google Scholar 

  31. Zhu Y, Shen X, Chen H (2015) Copy-move forgery detection based on scaled ORB. Multimed Tools Appl 75(6):3221–3233. doi:10.1007/s11042-014-2431-2

    Article  Google Scholar 

Download references

Acknowledgement

This research was supported in part by the Research Committee of the University of Macau (MYRG2015-00011-FST, MYRG2015-00012-FST) and the Science and Technology Development Fund of Macau SAR (008/2013/A1, 093-2014-A2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Man Pun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bi, X., Pun, CM. & Yuan, XC. Multi-scale feature extraction and adaptive matching for copy-move forgery detection. Multimed Tools Appl 77, 363–385 (2018). https://doi.org/10.1007/s11042-016-4276-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4276-3

Keywords

Navigation