Abstract
Copy-move forgery detection (CMFD) is probably one of the most active research subtopics within the blind image forensics field. Among existing algorithms, block-based methods achieve better detection result, but suffer from not being robust to the scaling of the copied region, which is limited to a small scaling range between 91 and 109%. To overcome this issue, a novel copy-move forgery detection method based on the pyramid model and Zernike moments is proposed in this work. First, a non-uniform sampling approach is used to build the pyramid model to improve the speed of detection, where each level of the model is a rescaled image with different scale factors. Then, the Zernike moments method is used to extract image rotation invariant feature. Furthermore, to make the proposed model be robust to the rotation and the combination of the rotation and scaling of the copied region, the random sample consensus (RANSAC) algorithm is adopted to look for the same affine transformation parameters. Compared with the existing methods, experimental results show that the proposed method has a good effect on the arbitrary rotation angle, the scaling range between 50 and 200%, and the combination of both.
Similar content being viewed by others
References
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110
Bayram S, Sencar HT, Memon, N (2009) An efficient and robust method for detecting copy-move forgery. IEEE International Conference on Acoustics, p 1053–1056
Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245
Bo X, Junwen W, Guangjie, L, Yuewei D (2010) Image copy-move forgery detection based on SURF. International Conference on Multimedia Information Networking and Security, p 889–892
Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91(8):1759–1770
Bravo-Solorio S, Nandi AK (2011) Exposing duplicated regions affected by reflection, rotation and scaling. IEEE International Conference on Acoustics, p 1880–1883
Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1):33–43
Chen CC, Wang H (2017) An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. Multimedia Tools Appl 76(24):26503–26522
Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. IEEE International Workshop on Information Forensic, p 1–6
Christlein V, Riess C, Jordan J, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854
Coatrieux G, Huang H, Shu H, Luo L, Roux C (2013) A watermarking based medical image integrity control system and an image moment signature for tampering characterization. IEEE J Biomed Health Inform 17(4):1057–1067
Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231(1):61–72
Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395
Flusser J, Suk T, Zitová B (2009) Moments and moment invariants in pattern recognition[M]. John Wiley & Sons Ltd, Chichester
Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop, p 55–61
Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. Computational Intelligence and Industrial Application: 272–276
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1):178–184
Li JW, Yang F (2017) Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching. Multimedia Tools Appl 76(20):20483–20497
Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. IEEE International Conference on Multimedia & Expo, p 1750–1753
Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Transactions on Signal Processing 5(5):188–197
Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565
Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. Chinese J Comput 4(11):746–749
Mahdian B, Saic S (2007) Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2):180–189
Myrna A, Venkateshmurthy M, Patil C (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping. International Conference on Conference on Computational Intelligence & Multimedia Applications, p 371–377
Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867
Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004–515
Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51(1):133–162
Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using Zernike moments. Inform Hiding, p 51–65
Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8(8):1355–1370
Vedaldi A, Fulkerson B (2010) VLFeat: an open and portable library of computer vision algorithms. International Conference on Multimedea, p 1469–1472
Vedaldi A, Fulkerson B (2010) VLFeat: an open and portable library of computer vision algorithms. http://www.vlfeat.org/
Wang XY, Li S (2017) A new keypoint-based copy-move forgery detection for small smooth regions. Multimedia Tools Appl 76(22):23353–23382
Wang J, Liu G, Zhang Z, Dai Y, Wang Z (2009) Fast and robust forensics for image region-duplication forgery. Acta Automat Sin 35(12):1488–1495
Wang J, Liu G, Li H, Daim Y, Wang Z (2009) Detection of image region duplication forgery using model with circle block. International Conference on Multimedia Information Networking and Security, p 25–29
Wang X, Zhang X, Li Z, Wang S (2011) A DWT-DCT based passive forensics method for copy-move attacks. International Conference on Multimedia Information Networking and Security, p 304–308
Wu Q, Wang S, Zhang X (2011) Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Proc Let 18(10):559–562
Yao H, Qiao T, Tang Z, Zhao Y, Mao H (2011) Detecting copy-move forgery using non-negative matrix factorization. International Conference on Multimedia Information Networking and Security, p 591–594
Zhong JL, Gan YF (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools Appl 76(13):14887–14903
Acknowledgements
The authors would like to thank all the anonymous reviewers for their helpful comments and suggestions. This work was supported by the natural science foundation of Hunan province under Grants 2017JJ2099, 2017JJ3091, by the Hunan province education department under Grants 16C0642, 17C0643, by the Doctor Fund University of Science and Technology of Hunan under Grants E51684, E51754, by the National Natural Science Foundation of China 61702179, by National Science and Technology Support Project of China, under grant number 2015BAF32B01.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ouyang, J., Liu, Y. & Liao, M. Robust copy-move forgery detection method using pyramid model and Zernike moments. Multimed Tools Appl 78, 10207–10225 (2019). https://doi.org/10.1007/s11042-018-6605-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6605-1