Abstract
Copy-move forgery is a common way of image tampering. Matching algorithm is the key step in copy-move forgery detection. Usually, the classical block-based matching algorithm (CBMA) can’t find all matched sub-blocks. In this paper, we propose an improved block-based matching algorithm (IBMA) to solve the problem. Firstly, we put the sum of feature vectors in the first column to get a new matrix. Secondly, the matrix is sorted by first column. Finally, every row of the matrix will search the following rows until the difference in the first column is larger than the threshold value. Experiment results show that the improved block-based matching algorithm is better than the classical block-based matching algorithm when an image was distorted by Gaussian noise, salt-pepper noise, or JPEG compression. The reason is that improved block-based matching algorithm can look for all matched sub-blocks, which makes copy-move forgery detection methods more robust.
Similar content being viewed by others
Change history
06 September 2017
An erratum to this article has been published.
References
Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1):284–295
Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1):33–43
CASIA tampered image detection evaluation (TIDE) database, v2.0, http://forensics.idealtest.org (2011)
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841–1854
Fridrich J, Soukal D, Lukáarticleš J (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop
Hu MK (1962) Visual pattern recognition by moment invariants. IEEE Trans Inf Theory 8(2):179–187
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184
Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1):59–67
Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962
Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. Jnetw Comput Appl 34 (5):1557–1565
Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. In: Information Hiding, pp 51–65
Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image R 29:16–32
Uncompressed Colour Image Dataset. http://homepages.lboro.ac.uk/cogs/datasets/ucid/ucid.html (2003)
Wang J, Liu G, Li H, Dai Y, Wang Z (2009) Detection of image region duplication forgery using model with circle block. In: International Conference on Multimedia Information Networking and Security, pp 25–29
Zhou L, Chao HC, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Area Comm 29(7):1358–1367
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant No. 61070062,61502103) ,the Industry-University Cooperation Major Projects in Fujian Province (Grant No. 2015H6007),Fuzhou science and technology project (Grant No. 2014-G-76),the Science and Technology Department of Fujian province K-class Foundation Project(Grant No. JK2011007),and The Education Department of Fujian Province A-class Foundation Project (Grant No. JA10064).
Author information
Authors and Affiliations
Corresponding author
Additional information
The original version of this article was revised: Reference citations in Fig. 4 were incorrectly written as [5], [6], [7], [10] and [11]. It should be written as [14], [9], [11], [7] and [6].
Appendix
Appendix
We assume \(Q1=\left [ {{I}^{1}},{{I}^{2}},{\ldots } ,{{I}^{n}} \right ]\) and \(Q2=\left [ {{L}^{1}},{{L}^{2}},{\ldots } ,{{L}^{n}} \right ]\). V e u r is a constant and more than zero.
- Condition \(\mathcal {A}\)::
-
\(\left | \left ({{I}^{1}}+{{I}^{2}}+{\ldots } +{{I}^{n}} \right )-\left ({{L}^{1}}+{{L}^{2}}+{\ldots } +{{L}^{n}} \right ) \right |>\sqrt {n}\times {{V}_{eur}}\).
- Condition \(\mathcal {B}\)::
-
\(SIM\left (Q1,Q2 \right )>{{V}_{eur}}\).
$$\begin{array}{@{}rcl@{}} &&\because \left| ({{I}^{1}}+{{I}^{2}}+...+{{I}^{n}})-({{L}^{1}}+{{L}^{2}}+...+{{L}^{n}}) \right|> \sqrt{n}\times V_{eur} \\ &&\therefore \frac{\left| ({{I}^{1}}-{{L}^{1}})+({{I}^{2}}-{{L}^{2}})+...+({{I}^{n}}-{{L}^{n}}) \right|}{\sqrt{n}}>V_{eur} \\ &&\therefore \frac{{{\left( ({{I}^{1}}-{{L}^{1}})+({{I}^{2}}-{{L}^{2}})+...+({{I}^{n}}-{{L}^{n}}) \right)}^{2}}}{n}>{{(V_{eur})}^{2}} \end{array} $$
From average inequality for every real number x i ,i = 1, 2,...,n we can get: \(x_{_{1}}^{2}+x_{_{2}}^{2}+...+x_{_{n}}^{2}\ge \frac {{{({{x}_{1}}+{{x}_{2}}+...+{{x}_{n}})}^{2}}}{n}\) we define: x i = (I i − L i),i = 1, 2,...,n, obviously:
Rights and permissions
About this article
Cite this article
Lai, Y., Huang, T., Lin, J. et al. An improved block-based matching algorithm of copy-move forgery detection. Multimed Tools Appl 77, 15093–15110 (2018). https://doi.org/10.1007/s11042-017-5094-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5094-y