Skip to main content
Log in

An improved block-based matching algorithm of copy-move forgery detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

An Erratum to this article was published on 06 September 2017

This article has been updated

Abstract

Copy-move forgery is a common way of image tampering. Matching algorithm is the key step in copy-move forgery detection. Usually, the classical block-based matching algorithm (CBMA) can’t find all matched sub-blocks. In this paper, we propose an improved block-based matching algorithm (IBMA) to solve the problem. Firstly, we put the sum of feature vectors in the first column to get a new matrix. Secondly, the matrix is sorted by first column. Finally, every row of the matrix will search the following rows until the difference in the first column is larger than the threshold value. Experiment results show that the improved block-based matching algorithm is better than the classical block-based matching algorithm when an image was distorted by Gaussian noise, salt-pepper noise, or JPEG compression. The reason is that improved block-based matching algorithm can look for all matched sub-blocks, which makes copy-move forgery detection methods more robust.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Change history

  • 06 September 2017

    An erratum to this article has been published.

References

  1. Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1):284–295

    Article  Google Scholar 

  2. Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1):33–43

    Article  Google Scholar 

  3. CASIA tampered image detection evaluation (TIDE) database, v2.0, http://forensics.idealtest.org (2011)

  4. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7(6):1841–1854

    Article  Google Scholar 

  5. Fridrich J, Soukal D, Lukáarticleš J (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop

  6. Hu MK (1962) Visual pattern recognition by moment invariants. IEEE Trans Inf Theory 8(2):179–187

    Article  MATH  Google Scholar 

  7. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184

    Article  Google Scholar 

  8. Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224(1):59–67

    Article  MathSciNet  Google Scholar 

  9. Li L, Li S, Zhu H, Wu X (2014) Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng 40(6):1951–1962

    Article  Google Scholar 

  10. Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. Jnetw Comput Appl 34 (5):1557–1565

    Article  Google Scholar 

  11. Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. In: Information Hiding, pp 51–65

  12. Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image R 29:16–32

    Article  Google Scholar 

  13. Uncompressed Colour Image Dataset. http://homepages.lboro.ac.uk/cogs/datasets/ucid/ucid.html (2003)

  14. Wang J, Liu G, Li H, Dai Y, Wang Z (2009) Detection of image region duplication forgery using model with circle block. In: International Conference on Multimedia Information Networking and Security, pp 25–29

  15. Zhou L, Chao HC, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Area Comm 29(7):1358–1367

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 61070062,61502103) ,the Industry-University Cooperation Major Projects in Fujian Province (Grant No. 2015H6007),Fuzhou science and technology project (Grant No. 2014-G-76),the Science and Technology Department of Fujian province K-class Foundation Project(Grant No. JK2011007),and The Education Department of Fujian Province A-class Foundation Project (Grant No. JA10064).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tianqiang Huang.

Additional information

The original version of this article was revised: Reference citations in Fig. 4 were incorrectly written as [5], [6], [7], [10] and [11]. It should be written as [14], [9], [11], [7] and [6].

Appendix

Appendix

We assume \(Q1=\left [ {{I}^{1}},{{I}^{2}},{\ldots } ,{{I}^{n}} \right ]\) and \(Q2=\left [ {{L}^{1}},{{L}^{2}},{\ldots } ,{{L}^{n}} \right ]\). V e u r is a constant and more than zero.

Condition \(\mathcal {A}\)::

\(\left | \left ({{I}^{1}}+{{I}^{2}}+{\ldots } +{{I}^{n}} \right )-\left ({{L}^{1}}+{{L}^{2}}+{\ldots } +{{L}^{n}} \right ) \right |>\sqrt {n}\times {{V}_{eur}}\).

Condition \(\mathcal {B}\)::

\(SIM\left (Q1,Q2 \right )>{{V}_{eur}}\).

$$\begin{array}{@{}rcl@{}} &&\because \left| ({{I}^{1}}+{{I}^{2}}+...+{{I}^{n}})-({{L}^{1}}+{{L}^{2}}+...+{{L}^{n}}) \right|> \sqrt{n}\times V_{eur} \\ &&\therefore \frac{\left| ({{I}^{1}}-{{L}^{1}})+({{I}^{2}}-{{L}^{2}})+...+({{I}^{n}}-{{L}^{n}}) \right|}{\sqrt{n}}>V_{eur} \\ &&\therefore \frac{{{\left( ({{I}^{1}}-{{L}^{1}})+({{I}^{2}}-{{L}^{2}})+...+({{I}^{n}}-{{L}^{n}}) \right)}^{2}}}{n}>{{(V_{eur})}^{2}} \end{array} $$

From average inequality for every real number x i ,i = 1, 2,...,n we can get: \(x_{_{1}}^{2}+x_{_{2}}^{2}+...+x_{_{n}}^{2}\ge \frac {{{({{x}_{1}}+{{x}_{2}}+...+{{x}_{n}})}^{2}}}{n}\) we define: x i = (I iL i),i = 1, 2,...,n, obviously:

$$\begin{array}{@{}rcl@{}} &&{{({{I}^{1}}-{{L}^{1}})}^{2}}+{{({{I}^{2}}-{{L}^{2}})}^{2}}+...+{{({{I}^{n}}-{{L}^{n}})}^{2}}\ge \frac{{{\left( ({{I}^{1}}-{{L}^{1}})+({{I}^{2}}-{{L}^{2}})+...+({{I}^{n}}-{{L}^{n}}) \right)}^{2}}}{n} \\ &&\because \frac{{{\left( ({{I}^{1}}-{{L}^{1}})+({{I}^{2}}-{{L}^{2}})+...+({{I}^{n}}-{{L}^{n}}) \right)}^{2}}}{n}>{{(V_{eur})}^{2}} \\ &&\therefore {{({{I}^{1}}-{{L}^{1}})}^{2}}+{{({{I}^{2}}-{{L}^{2}})}^{2}}+...+{{({{I}^{n}}-{{L}^{n}})}^{2}}>{{(V_{eur})}^{2}}\\ &&\therefore\sqrt{{{({{I}^{1}}-{{L}^{1}})}^{2}}+{{({{I}^{2}}-{{L}^{2}})}^{2}}+...+{{({{I}^{n}}-{{L}^{n}})}^{2}}}>V_{eur} \end{array} $$

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lai, Y., Huang, T., Lin, J. et al. An improved block-based matching algorithm of copy-move forgery detection. Multimed Tools Appl 77, 15093–15110 (2018). https://doi.org/10.1007/s11042-017-5094-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5094-y

Keywords

Navigation