Beruflich Dokumente
Kultur Dokumente
8, AUGUST 2015
1705
I. I NTRODUCTION
1556-6013 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
1706
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, AUGUST 2015
Fig. 1.
PUN et al.: IMAGE FORGERY DETECTION USING ADAPTIVE OVERSEGMENTATION AND FEATURE POINT MATCHING
Fig. 2.
Different blocking/segmentation methods (a) Overlapping
and rectangular blocking; (b) Overlapping and circular blocking; and
(c) Non-overlapping and irregular blocking.
1707
i = 1, 2, ..., 4
(2)
1708
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, AUGUST 2015
Fig. 3.
(3)
(4)
PUN et al.: IMAGE FORGERY DETECTION USING ADAPTIVE OVERSEGMENTATION AND FEATURE POINT MATCHING
1709
Fig. 4. Superpixels of different initial sizes and the corresponding forgery detection results of (A) Ship, (B) Sailing, and (C) Kore. (A1), (B1), and (C1). The
copy-move host images, I1, I2 and I3; (a1), (b1), (c1). The corresponding forgery regions of I1, I2 and I3, respectively. (A2), (B2), (C2). The host images
are blocked into superpixels with initial size S = 150; (a2), (b2), (c2). The corresponding detected forgery regions when S = 150. (A3), (B3), (C3). The host
images are blocked into superpixels with initial size S = 250; (a3), (b3), (c3). The corresponding detected forgery regions when S = 250. (A4), (B4), (C4).
The host images are blocked into superpixels with the proposed Adaptive Over-segmentation method, by which the initial superpixel sizes are calculated as
S = 199, S = 159, and S = 224, respectively; (a4), (b4), (c4). The corresponding detected forgery regions with the proposed Adaptive Over-segmentation
method.
1710
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, AUGUST 2015
Fig. 5.
(5)
(7)
(8)
PUN et al.: IMAGE FORGERY DETECTION USING ADAPTIVE OVERSEGMENTATION AND FEATURE POINT MATCHING
1711
Fig. 6.
1712
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, AUGUST 2015
Fig. 7. The copy-move forgery detection results of the proposed scheme (a1) (e1). The five host images from the dataset; (a2) (e2). The ground-truth
forgery regions of the corresponding host images; (a3) (e3). The detected forgery regions of the corresponding images, using the proposed forgery detection
scheme.
pr eci si on =
||
r ecall =
(12)
(13)
(14)
PUN et al.: IMAGE FORGERY DETECTION USING ADAPTIVE OVERSEGMENTATION AND FEATURE POINT MATCHING
1713
TABLE I
F ORGERY D ETECTION R ESULTS W ITH /W ITHOUT THE P ROPOSED
A DAPTIVE OVER -S EGMENTATION A LGORITHM
TABLE II
D ETECTION R ESULTS U NDER P LAIN C OPY-M OVE AT I MAGE L EVEL
1714
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, AUGUST 2015
TABLE III
D ETECTION R ESULTS U NDER P LAIN C OPY-M OVE AT THE P IXEL L EVEL
Fig. 8. Precision results at the pixel level (a) Down-sampling; (b) Scaling;
(c) Rotation; and (d) JPEG Compression.
Fig. 9.
Recall results at the pixel level (a) Down-sampling; (b) Scale;
(c) Rotation; and (d) JPEG Compression.
PUN et al.: IMAGE FORGERY DETECTION USING ADAPTIVE OVERSEGMENTATION AND FEATURE POINT MATCHING
1715
Fig. 10.
F1 scores at the pixel level (a) Down-sampling; (b) Scale;
(c) Rotation; and (d) JPEG Compression.
1716
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, AUGUST 2015
R EFERENCES
[1] J. Fridrich, D. Soukal, and J. Luk, Detection of copymove forgery
in digital images, in Proc. Digit. Forensic Res. Workshop, Cleveland,
OH, Aug. 2003.
[2] A. C. Popescu and H. Farid, Exposing digital forgeries by detecting
duplicated image regions, Dept. Comput. Sci., Dartmouth College,
Hanover, NH, USA, Tech. Rep. TR2004-515, 2004.
[3] W. Luo, J. Huang, and G. Qiu, Robust detection of region-duplication
forgery in digital image, in Proc. 18th Int. Conf. Pattern
Recognit. (ICPR), Aug. 2006, pp. 746749.
[4] G. Li, Q. Wu, D. Tu, and S. Sun, A sorted neighborhood approach
for detecting duplicated regions in image forgeries based on DWT
and SVD, in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2007,
pp. 17501753.
[5] B. Mahdian and S. Saic, Detection of copymove forgery using
a method based on blur moment invariants, Forensic Sci. Int., vol. 171,
nos. 23, pp. 180189, 2007.
[6] X. B. Kang and S. M. Wei, Identifying tampered regions using singular
value decomposition in digital image forensics, in Proc. Int. Conf.
Comput. Sci. Softw. Eng., Dec. 2008, pp. 926930.
[7] S. Bayram, H. T. Sencar, and N. Memon, An efficient and robust
method for detecting copymove forgery, in Proc. IEEE Int. Conf.
Acoust., Speech, Signal Process. (ICASSP), Apr. 2009, pp. 10531056.
[8] J. Wang, G. Liu, H. Li, Y. Dai, and Z. Wang, Detection of image region
duplication forgery using model with circle block, in Proc. Int. Conf.
Multimedia Inf. Netw. Secur. (MINES), Nov. 2009, pp. 2529.
[9] J. W. Wang, G. J. Liu, Z. Zhang, Y. W. Dai, and Z. Q. Wang, Fast and
robust forensics for image region-duplication forgery, Acta Automat.
Sinica, vol. 35, no. 12, pp. 14881495, 2009.
[10] H. J. Lin, C. W. Wang, and Y. T. Kao, Fast copymove forgery
detection, WSEAS Trans. Signal Process., vol. 5, no. 5, pp. 188197,
2009.
[11] S. J. Ryu, M. J. Lee, and H. K. Lee, Detection of copy-rotate-move
forgery using Zernike moments, in Information Hiding. Berlin,
Germany: Springer-Verlag, 2010, pp. 5165.
[12] S. J. Ryu, M. Kirchner, M. J. Lee, and H. K. Lee, Rotation invariant
localization of duplicated image regions based on Zernike moments,
IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 13551370,
Aug. 2013.
[13] S. Bravo-Solorio and A. K. Nandi, Exposing duplicated regions affected
by reflection, rotation and scaling, in Proc. IEEE Int. Conf. Acoust.,
Speech, Signal Process. (ICASSP), May 2011, pp. 18801883.
[14] H. Huang, W. Guo, and Y. Zhang, Detection of copymove forgery in
digital images using SIFT algorithm, in Proc. Pacific-Asia Workshop
Comput. Intell. Ind. Appl. (PACIIA), Dec. 2008, pp. 272276.
[15] X. Pan and S. Lyu, Region duplication detection using image
feature matching, IEEE Trans. Inf. Forensics Security, vol. 5, no. 4,
pp. 857867, Dec. 2010.
[16] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra,
A SIFT-based forensic method for copymove attack detection and
transformation recovery, IEEE Trans. Inf. Forensics Security, vol. 6,
no. 3, pp. 10991110, Sep. 2011.
[17] X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, Image copymove
forgery detection based on SURF, in Proc. Int. Conf. Multimedia Inf.
Netw. Secur. (MINES), Nov. 2010, pp. 889892.
[18] P. Kakar and N. Sudha, Exposing postprocessed copypaste forgeries
through transform-invariant features, IEEE Trans. Inf. Forensics
Security, vol. 7, no. 3, pp. 10181028, Jun. 2012.
[19] B. L. Shivakumar and S. S. Baboo, Detection of region duplication
forgery in digital images using SURF, IJCSI Int. J. Comput. Sci. Issues,
vol. 8, issue 4. no. 1, pp. 199205, 2011.
[20] D. G. Lowe, Object recognition from local scale-invariant features, in
Proc. 7th IEEE Int. Conf. Comput. Vis., Sep. 1999, pp. 11501157.
[21] H. Bay, T. Tuytelaars, and L. Van Gool, SURF: Speeded up robust
features, in Computer Vision. Berlin, Germany: Springer-Verlag, 2006,
pp. 404417.