ABSTRACT
In order to reduce the complexity of forgery detection algorithm and improve the accuracy, this paper proposes an image forgery detection algorithm based on DCT coupled random sample consensus optimization. First of all, the initial image is divided into sub-blocks of uniform size and DCT coefficients for each block is obtained through DCT to represent each blocks; then, circular feature screening mechanism is established to extract four features of the block, thereby reducing the feature dimension of each block. Finally, each eigenvector is ordered in a lexicographical manner and prior threshold is used to match the feature, reduce the image block false matching rate optimized by random sample consensus, thus completing the image authenticity for decision making. Experimental results show that, compared with the current image forgery detection algorithm, this algorithm has better robustness, efficiency and accuracy, and good detection effects on the fuzzy and noise forgery.
- Jiao Lixin, Du Zhenlong. Copy-paste image forgery blind detection based on mean shift {J}. Journal of Computer Applications, 2014, 34 (3):806--809.Google Scholar
- Devanshi Chauhan, Dipali Kasat, Sanjeev Jain. Survey on Keypoint Based Copy-move Forgery Detection Methods on Image {J}. Procedia Computer Science, 2016, 85(11): 206--212.Google ScholarCross Ref
- Du Zhenlong, Yang Fan, Li Xiaoli. Blind detection of copy and paste forgery images based on complex feature {J}. Computer engineering and design, 2012, 33 (11): 4264--4267.Google Scholar
- YAOH, QIAOT, TANGZJ. Detecting copy-move forgery using non-negative matrix factorization {J}. Proceedings of the 2011 third International Conference on Multimedia Information Networking and Security. Washington, DC: IEEE Computer Society, 2014: 591--594. Google ScholarDigital Library
- Wang Haoming, Yang Xiaoyuan. Detection Method for JPEG Image Based on the Difference of DCT Coefficient Histograms {J}. Journal of Sichuan University (Engineering Science Edition), 2014, 46(1):41--46.Google Scholar
- Viswanath Kapinaiah; Jayanta Mukherjee. Block DCT to wavelet transcoding in transform domain {J}. Signal, Image and Video Processing, 2012, 6(2):179--195.Google ScholarCross Ref
- Liu Yan, Li Honglong. Image and Video Processing Techniques in the DCT Domain {J}. Journal of Image and Graphics, 2013, 8(2):121--128.Google Scholar
- Zhou T C, Cheng X, Wu Z Y. Action recognition using hierarchically tree-structured dictionary encoding {J}. Journal of Image and Graphics? 2014, 19(7): 1054--1061.Google Scholar
- Chen T W, Wang Q. 3D line segment detection for unorganized point n cloud, from multi-view stereo {J} Proceedings of the Asia conference on Computer Vision Berlin, Uermany Springer-Verlag, 2011, 32:(16): 400--411. Google ScholarDigital Library
- Xie Shipeng, Hu Maolin. Sparse Texture Representation and Classification {J}. Application Research of Canpulers, 2011, 24(3):306--308.Google Scholar
- Besiris, D.; Zigouris, E.Dictionary-based color image retrieval using multiset theory {J}. Journal of Visual Communication and Image Representation, 2013, 24(7): 1155--1167. Google ScholarDigital Library
- M Hussain, G Muhammad, SQ Saleh. Image Forgery Detection Using Multi-Resolution Weber Local Descriptors {J}. International Conference on Signal Image Techno, 2012, 4(1): 395--40.Google Scholar
Index Terms
- Image Authenticity Decision Based on Random Sample Consensus and Circular Feature Selection
Recommendations
Detection and localization of forgery using statistics of DCT and Fourier components
AbstractIn this paper, we present a comprehensive approach for investigating JPEG compressed test images, suspected of being tampered either by splicing or copy-move forgery (cmf). In JPEG compression, the image plane is divided into non-...
Highlights- This paper presents an integrated technique for detection and localization of splicing as well as copy-move forgery in JPEG compressed images.
An efficient method for image forgery detection based on trigonometric transforms and deep learning
AbstractImage forgery detection is the basic key to solve many problems, especially social problems such as those in Facebook, and court cases. The common form of image forgery is the copy-move forgery, in which a section of the image is copied and pasted ...
Computationally Efficient Digital Image Forensic Method for Image Authentication
The issue of the authenticity and integrity of digital images is getting critical. Nowadays it became easy to create image forgeries. Digital image forensics plays a vital role in proving authenticity and integrity of digital images. There are various ...
Comments