Skip to main content
Log in

A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Copy-move forgery is a commonly used operation for digital image. Most of the existing copy-move schemes designed to region duplication are block-based and keypoint-based. In general, block-based methods fail to handle geometric transformations. Though keypoint-based methods can handle geometric transformations, they have a poor detection effect on the smooth region. This has motivated us to propose an efficient copy-move forgery detection method, which is based on superpixel segmentation and cluster analysis to improve the detection accuracy due to some specified attacks in this paper. In the proposed method, K-means clustering technology is used to divide the superpixel of the image into complex regions and smooth regions. The clustering rule is based on the mean and standard deviation of the pixels, and the ratio of the feature points in the superpixel block, this clustering method can distinguish complex regions (non-smooth regions) and smooth regions. In complex regions, Scale-Invariant Feature Transform (SIFT) features are used to detect tampering. In smooth regions, the sector mask feature and RGB color feature are proposed to detect tampering. Filtering out error matching is applied to these two kinds of regions for the copy-move detection. Experimental results have shown that the proposed method can detect the tampering of complex regions and smooth regions and it indeed has the advantage in the detection accuracy compared with some related works when the test images are processed by blurring, adding noise, JPEG compression and rotation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Achanta R, Shaji A, Smith K, Lucchi A, Fua P, Susstrunk S (2012) SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274–2281

    Article  Google Scholar 

  2. Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6(3):1099–1110

    Article  Google Scholar 

  3. Avola D, Bernardi M, Cinque L, Foresti GL, Massaroni C (2017) Adaptive bootstrapping management by keypoint clustering for background initialization. Pattern Recogn Lett 100:110–116

    Article  Google Scholar 

  4. Avola D, Bernardi M, Cinque L, Foresti GL, Massaroni C (2018) Combining keypoint clustering and neural background subtraction for real-time moving object detection by PTZ cameras. In: Proceedings of international conference on pattern recognition applications and methods, pp 638–645

  5. Chen L, Lu W, Ni J, Sun W, Huang J (2013) Region duplication detection based on Harris corner points and step sector statistics. J Vis Commun Image Represent 24(3):244–254

    Article  Google Scholar 

  6. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6):1841–1854

    Article  Google Scholar 

  7. Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395

    Article  MathSciNet  Google Scholar 

  8. Fridrich J, Soukalm D, Lukas J (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, Cleveland, pp 19–23

  9. Hamdi D, Iqbal F, Baker T, Shah B (2016) Multimedia file signature analysis for smartphone forensics. In: IEEE international conference international conference on developments in Esystems engineering, pp 130–137

  10. Huang H, Guo W, Zhang Y (2009) Detection of copy-move forgery in digital images using SIFT algorithm. In: The workshop on computational intelligence and industrial application, vol 2, pp 272–276

  11. Jing H, He X, Han Q, Abd El-Latif AA, Niu X (2014) Saliency detection based on integrated features. Neurocomputing 129:114–121

    Article  Google Scholar 

  12. Kang L, Cheng XP, Li K (2010) Copy-move forgery detection in digital image. In: Image and signal processing (CISP), vol 5, pp 2419–2421

  13. Kumar S, Desai JV, Mukherjee S (2016) A fast Keypoint based hybrid method for copy move forgery detection. Ijcds Journal 4(2):91–99

    Article  Google Scholar 

  14. Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: IEEE international conference on multimedia and expo, pp 1750–1753

  15. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507–518

    Article  Google Scholar 

  16. Lian S, Kanellopoulos D (2009) Recent advances in multimedia information system security. Informatica 33:3–24

    MathSciNet  Google Scholar 

  17. Liu Y, Wang HX, Wu HZ, Chen Y (2017) An efficient copy-move detection algorithm based on Superpixel segmentation and Harris key-points. In: International conference on cloud computing and security, pp 61–73

    Chapter  Google Scholar 

  18. Macdermott A, Baker T, Shi Q, Shah B (2018) Iot forensics: challenges for the Ioa era. In: IFIP international conference on new technologies, mobility and security, pp 1–5

  19. Mao YM, Lan MH, Wang YQ, Feng QS (2009) An improved corner detection method based on Harris. Computer technology and development 19(5):130–133

    Google Scholar 

  20. Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. In: Comput.sci.dartmouth College Private Ivy League Res.univ, p 646

  21. Prakash CS, Kumar A, Maheshkar S, Maheshkar V (2018) An integrated method of copy-move and splicing for image forgery detection. Multimed Tools Appl 77(20):26939–26963

    Article  Google Scholar 

  22. Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using Zernike moments. Lect Notes Comput Sci 6387:51–65

    Article  Google Scholar 

  23. Sharif SA, Ali MA, Reqabi NA, Iqbal F, Baker T (2016) Magec: an image searching tool for detecting forged images in forensic investigation. In: IFIP international conference on new technologies, mobility and security, pp 1–6

  24. Shi Z, Yu L, Abd El-Latif AA, Niu X (2012) Skeleton modulated topological perception map for rapid viewpoint selection. IEICE Trans Inf Syst E95D(10):2585–2588

    Article  Google Scholar 

  25. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28:301–308

    Article  Google Scholar 

  26. Wang JW, Liu GJ, Zhang Z, Dai YW, Wang ZQ (2009) Fast and robust forensics for image region-duplication forgery. Acta Automat Sin 35(12):1488–1495

    Article  Google Scholar 

  27. Wang X, He G, Tang C, Han Y, Wang S (2016) Keypoints-based image passive forensics method for copy-move attacks. Int J Pattern Recognit Artif Intell 30(3):304–308

    MathSciNet  Google Scholar 

  28. Wang H, Wang H, Sun X, Qian Q (2017) A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multimed Tools Appl 76(10):12627–12644

    Article  Google Scholar 

  29. Wu HZ, Shi YQ, Wang HX, Zhou LN (2017) Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1620–1631

    Article  Google Scholar 

  30. Zandi M, Mahmoudi-Aznaveh A, Mansouri A (2014) Adaptive matching for copy-move forgery detection. In: The workshop on information forensics and security, pp 119–124

  31. Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detector. IEEE Transactions on Information Forensics and Security 11(11):2499–2512

    Article  Google Scholar 

  32. Zhang T, Abd El-Latif AA, Wang N, Li Q, Niu X (2012) A new image segmentation method via fusing NCut eigenvectors maps. In: International conference on digital image processing, vol 8334

  33. Zhang T, Han Q, Abd El-Latif AA, Bai X, Niu X (2013) 2-D cartoon character detection based on scalable-shape context and Hough voting. Inf Technol J 12(12):2342–2349

    Article  Google Scholar 

  34. Zhou L, Wang D, Guo Y, Zhang J (2007) Blur detection of digital forgery using mathematical morphology. In: Proceedings of the 1st KES International symposium on agent and multi-agent systems. Technologies and applications. Springer-verlag, Wroclaw

    Chapter  Google Scholar 

  35. Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security 12(1):48–63

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the Fundamental Research Funds for the Central Universities under the grant No. YJ201881 and Doctoral Innovation Fund Program of Southwest Jiaotong University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Liu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Wang, H., Chen, Y. et al. A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering. Multimed Tools Appl 79, 477–500 (2020). https://doi.org/10.1007/s11042-019-08044-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08044-8

Keywords

Navigation