Skip to main content
Log in

Utilization of edge operators for localization of copy-move image forgery using WLD-HOG features with connected component labeling

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

One of the most popular image forgery technique is copy-move forgery. In this technique, one or more segments are copied and affixed at different positions within the image. This forgery technique is highly grievous as it can manipulate an image in various ways (such as by presenting additional information or by concealing the genuine information of image). We propose a novel blind forensic technique for copy-move image forgery detection. Our approach utilize different edge detection operators to extract high frequency features. Histogram of Oriented Gradients (HOG) and Weber Local Descriptor (WLD) are used to extract image block features. Radix and lexicographical sorting is enforced over feature vector matrix followed by correlation computation between feature vectors to detect similar feature vectors. Shift vectors are computed to locate similar group of blocks within image. Connected component labeling is applied as morphological operation to remove false matches. Proposed approach is robust to detect plain as well as multiple copy-move forgery in images with post-processing attacks such as contrast adjustment, image blurring, color reduction, and brightness change. Proposed approach achieve highest F-Measure(%) in comparision to other existing forgery detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Amerini I, Ballan L, Caldelli R, Bimbo A D, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Foren Secur 6(3):1099–1110

    Article  Google Scholar 

  2. Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process 2:1–40

    Google Scholar 

  3. Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: IEEE international conference on acoustics, speech and signal processing, pp 1053–1056

  4. Bay H, Tinney T, Gool LV (2006) Surf: Speeded up robust features. In: European Conference on Computer Vision, pp 404–417

  5. Chen J, Shan S, He C, Zhao G, Pietikainen M, Chen X, Gao W (2010) WLD: A robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705–1720

    Article  Google Scholar 

  6. Chen C C, Wang H, Lin C S (2017) An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. Multimed Tools Appl 76 (24):26503–26522

    Article  Google Scholar 

  7. Cozzolino D, Poggi G, Verdoliva L (2014) Copy-move forgery detection based on patchmatch. In: IEEE International Conference on Image Processing, pp 5312–5316

  8. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forens Secur 7(6):1841–1854

    Article  Google Scholar 

  9. Déniz O, Bueno G, Salido J, De la Torre F (2011) Face recognition using histograms of oriented gradients. Pattern Recogn Lett 32(12):1598–1603

    Article  Google Scholar 

  10. Davarzani R, Yaghmaie K, Mozaffari S, Tapak M (2013) Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int 231 (1–3):61–72

    Article  Google Scholar 

  11. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 20–25

  12. Dataset: CMFD_grip http://www.grip.unina.it/index.php?option=com_content&view=article&id=79&Itemid=489&jsmallfib=1&dir=JSROOT/CMFD

  13. Dataset: CMH https://doi.org/10.6084/m9.figshare.978736

  14. Dataset: Ardizzone http://www.diid.unipa.it/cvip?/page_id=48

  15. Dataset: IMD_multipaste https://www5.cs.fau.de/research/data/image-manipulation/

  16. Fridrich J, Soukal D, Lukas J (2003) Detection of copy-move forgery in digital images. In: Digital forensic research workshop, Cleveland, OH, USA

  17. Fadl S M, Semary N A (2017) Robust copy–move forgery revealing in digital images using polar coordinate system. Neurocomputing 265:57–65

    Article  Google Scholar 

  18. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184

    Article  Google Scholar 

  19. Huang D Y, Huang C N, Hu W C, Chou C H (2015) Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed Tools Appl 76(1):1509–1530

    Article  Google Scholar 

  20. Kang X B, Wei S M (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: IEEE international conference on computer science and software engineering, vol 3, pp 926–930

  21. Khan E S, Kulkarni E A (2010) An efficient method for detection of copy-move forgery using discrete wavelet transform. Int J Comput Sci Eng 2(5):1801–1806

    Google Scholar 

  22. Li S, Gong D, Yuan Y (2013) Face recognition using Weber local descriptors. Neurocomputing 122:272–283

    Article  Google Scholar 

  23. Lee J C, Chang C P, Chen W K (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inform Sci 321:250–262

    Article  Google Scholar 

  24. Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image. In: IEEE international conference on pattern recognition, vol 4, pp 744–749

  25. Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: IEEE international conference on multimedia and expo, pp. 1750–1753

  26. Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 35(5):1557–1565

    Article  Google Scholar 

  27. Lai Y, Huang T, Lin J, Lu H (2018) An improved block-based matching algorithm of copy-move forgery detection. Multimed Tools Appl 77(12):15093–15110

    Article  Google Scholar 

  28. Lin H J, Wang C W, Kao Y T (2009) Fast copy-move forgery detection. WSEAS Trans Signal Process 5(5):188–197

    Google Scholar 

  29. Mahdian B, Saic S (2007) Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int 171(2–3):180–189

    Article  Google Scholar 

  30. Myna A N, Venkateshmurthy M G, Patil C G (2008) Detection of region duplication forgery in digital images using wavelets and log-polarmapping. In: IEEE international conference on computational intelligence and multimedia applications, vol 3, pp 371–377

  31. Pan X, Lyu S (2010) Detecting image region duplication using sift features. In: IEEE international conference on acoustics, speech and signal processing, pp 1706–1709

  32. Popescu A C, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Dept Comp. Sci., Dartmouth College, Tech Rep. TR2004–515, pp 1–11

  33. Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. In: International workshop on information hiding, pp 51–65

  34. Soni B, Das PK, Thounaojam DM (2017) Blur invariant block based copy-move forgery detection technique using FWHT features. In: ACM international conference on watermarking and image processing, pp 22–26

  35. Soille P (2013) Morphological image analysis: Principles and applications. Springer Science and Business Media, Berlin

    MATH  Google Scholar 

  36. Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent 29:16–32

    Article  Google Scholar 

  37. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD-New database for copy-move forgery detection. In: IEEE International Symposium ELMAR, pp. 49–54

  38. Wang H, Wang H X, Sun X M, Qian Q (2017) A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multimed Tools Appl 76(10):12627–12644

    Article  Google Scholar 

  39. Zhong J, Gan Y, Young J, Huang L, Lin P (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimed Tools Appl 76(13):14887–14903

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anuja Dixit.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dixit, A., Bag, S. Utilization of edge operators for localization of copy-move image forgery using WLD-HOG features with connected component labeling. Multimed Tools Appl 79, 26061–26097 (2020). https://doi.org/10.1007/s11042-020-09230-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09230-9

Keywords

Navigation