Skip to main content
Log in

Robust copy-move forgery detection method using pyramid model and Zernike moments

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Copy-move forgery detection (CMFD) is probably one of the most active research subtopics within the blind image forensics field. Among existing algorithms, block-based methods achieve better detection result, but suffer from not being robust to the scaling of the copied region, which is limited to a small scaling range between 91 and 109%. To overcome this issue, a novel copy-move forgery detection method based on the pyramid model and Zernike moments is proposed in this work. First, a non-uniform sampling approach is used to build the pyramid model to improve the speed of detection, where each level of the model is a rescaled image with different scale factors. Then, the Zernike moments method is used to extract image rotation invariant feature. Furthermore, to make the proposed model be robust to the rotation and the combination of the rotation and scaling of the copied region, the random sample consensus (RANSAC) algorithm is adopted to look for the same affine transformation parameters. Compared with the existing methods, experimental results show that the proposed method has a good effect on the arbitrary rotation angle, the scaling range between 50 and 200%, and the combination of both.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110

    Article  Google Scholar 

  2. Bayram S, Sencar HT, Memon, N (2009) An efficient and robust method for detecting copy-move forgery. IEEE International Conference on Acoustics, p 1053–1056

  3. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245

    Article  Google Scholar 

  4. Bo X, Junwen W, Guangjie, L, Yuewei D (2010) Image copy-move forgery detection based on SURF. International Conference on Multimedia Information Networking and Security, p 889–892

  5. Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91(8):1759–1770

    Article  MATH  Google Scholar 

  6. Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. IEEE International Conference on Acoustics, p 1880–1883

  7. Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1):33–43

    Article  Google Scholar 

  8. Chen CC, Wang H (2017) An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. Multimedia Tools Appl 76(24):26503–26522

    Article  Google Scholar 

  9. Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. IEEE International Workshop on Information Forensic, p 1–6

  10. Christlein V, Riess C, Jordan J, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854

    Article  Google Scholar 

  11. Coatrieux G, Huang H, Shu H, Luo L, Roux C (2013) A watermarking based medical image integrity control system and an image moment signature for tampering characterization. IEEE J Biomed Health Inform 17(4):1057–1067

    Article  Google Scholar 

  12. Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1):61–72

    Article  Google Scholar 

  13. Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395

    Article  MathSciNet  Google Scholar 

  14. Flusser J, Suk T, Zitová B (2009) Moments and moment invariants in pattern recognition[M]. John Wiley & Sons Ltd, Chichester

    Book  MATH  Google Scholar 

  15. Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, p 55–61

  16. Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. Computational Intelligence and Industrial Application: 272–276

  17. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184

    Article  Google Scholar 

  18. Li JW, Yang F (2017) Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching. Multimedia Tools Appl 76(20):20483–20497

    Article  Google Scholar 

  19. Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. IEEE International Conference on Multimedia & Expo, p 1750–1753

  20. Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Transactions on Signal Processing 5(5):188–197

    Google Scholar 

  21. Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565

    Article  Google Scholar 

  22. Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. Chinese J Comput 4(11):746–749

    Google Scholar 

  23. Mahdian B, Saic S (2007) Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189

    Article  Google Scholar 

  24. Myrna A, Venkateshmurthy M, Patil C (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping. International Conference on Conference on Computational Intelligence & Multimedia Applications, p 371–377

  25. Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867

    Article  Google Scholar 

  26. Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004–515

  27. Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51(1):133–162

    Article  Google Scholar 

  28. Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. Inform Hiding, p 51–65

  29. Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370

    Article  Google Scholar 

  30. Vedaldi A, Fulkerson B (2010) VLFeat: an open and portable library of computer vision algorithms. International Conference on Multimedea, p 1469–1472

  31. Vedaldi A, Fulkerson B (2010) VLFeat: an open and portable library of computer vision algorithms. http://www.vlfeat.org/

  32. Wang XY, Li S (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimedia Tools Appl 76(22):23353–23382

    Article  Google Scholar 

  33. Wang J, Liu G, Zhang Z, Dai Y, Wang Z (2009) Fast and robust forensics for image region-duplication forgery. Acta Automat Sin 35(12):1488–1495

    Article  Google Scholar 

  34. Wang J, Liu G, Li H, Daim Y, Wang Z (2009) Detection of image region duplication forgery using model with circle block. International Conference on Multimedia Information Networking and Security, p 25–29

  35. Wang X, Zhang X, Li Z, Wang S (2011) A DWT-DCT based passive forensics method for copy-move attacks. International Conference on Multimedia Information Networking and Security, p 304–308

  36. Wu Q, Wang S, Zhang X (2011) Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Proc Let 18(10):559–562

    Article  Google Scholar 

  37. Yao H, Qiao T, Tang Z, Zhao Y, Mao H (2011) Detecting copy-move forgery using non-negative matrix factorization. International Conference on Multimedia Information Networking and Security, p 591–594

  38. Zhong JL, Gan YF (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools Appl 76(13):14887–14903

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank all the anonymous reviewers for their helpful comments and suggestions. This work was supported by the natural science foundation of Hunan province under Grants 2017JJ2099, 2017JJ3091, by the Hunan province education department under Grants 16C0642, 17C0643, by the Doctor Fund University of Science and Technology of Hunan under Grants E51684, E51754, by the National Natural Science Foundation of China 61702179, by National Science and Technology Support Project of China, under grant number 2015BAF32B01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junlin Ouyang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ouyang, J., Liu, Y. & Liao, M. Robust copy-move forgery detection method using pyramid model and Zernike moments. Multimed Tools Appl 78, 10207–10225 (2019). https://doi.org/10.1007/s11042-018-6605-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6605-1

Keywords

Navigation