scispace - formally typeset
Open AccessJournal Article

Fast copy-move forgery detection

Reads0
Chats0
TLDR
Compared with other methods, employing the radix sort makes the detection much more efficient without degradation of detection quality.
Abstract
This paper proposes a method for detecting copy-move forgery over images tampered by copy-move. To detect such forgeries, the given image is divided into overlapping blocks of equal size, feature for each block is then extracted and represented as a vector, all the extracted feature vectors are then sorted using the radix sort. The difference (shift vector) of the positions of every pair of adjacent feature vectors in the sorting list is computed. The accumulated number of each of the shift vectors is evaluated. A large accumulated number is considered as possible presence of a duplicated region, and thus all the feature vectors corresponding to the shift vectors with large accumulated numbers are detected, whose corresponding blocks are then marked to form a tentative detected result. Finally, the medium filtering and connected component analysis are performed on the tentative detected result to obtain the final result. Compared with other methods, employing the radix sort makes the detection much more efficient without degradation of detection quality.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery

TL;DR: The problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward.
Journal ArticleDOI

An Evaluation of Popular Copy-Move Forgery Detection Approaches

TL;DR: This paper created a challenging real-world copy-move dataset, and a software framework for systematic image manipulation, and examined the 15 most prominent feature sets, finding the keypoint-based features Sift and Surf as well as the block-based DCT, DWT, KPCA, PCA, and Zernike features perform very well.
Journal ArticleDOI

An Evaluation of Popular Copy-Move Forgery Detection Approaches

TL;DR: Wang et al. as mentioned in this paper examined the 15 most prominent feature sets and analyzed the detection performance on a per-image basis and on per-pixel basis, and found that the keypoint-based features SIFT and SURF, as well as the block-based DCT, DWT, KPCA, PCA and Zernike features perform very well.
Journal ArticleDOI

Region Duplication Detection Using Image Feature Matching

TL;DR: The proposed method starts by estimating the transform between matched scale invariant feature transform (SIFT) keypoints, which are insensitive to geometrical and illumination distortions, and then finds all pixels within the duplicated regions after discounting the estimated transforms.
Journal ArticleDOI

Digital image forgery detection using passive techniques: A survey

TL;DR: An attempt is made to survey the recent developments in the field of digital image forgery detection and a complete bibliography is presented on blind methods for forgery Detection.
References
More filters
Journal ArticleDOI

Multimedia watermarking techniques

TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.

Detection of Copy-Move Forgery in Digital Images

TL;DR: This paper investigates the problem of detecting the copy-move forgery and describes an efficient and reliable detection method that may successfully detect the forged part even when the copied area is enhanced/retouched to merge it with the background and when the forged image is saved in a lossy format, such as JPEG.
Journal ArticleDOI

Exposing digital forgeries by detecting traces of resampling

TL;DR: This work describes how resampling introduces specific statistical correlations, and describes how these correlations can be automatically detected in any portion of an image, and expects this technique to be among the first of many tools that will be needed to expose digital forgeries.
Journal ArticleDOI

Exposing digital forgeries in color filter array interpolated images

TL;DR: This work quantifies the specific correlations introduced by CFA interpolation, and describes how these correlations can be automatically detected in any portion of an image and shows the efficacy of this approach in revealing traces of digital tampering in lossless and lossy compressed color images interpolated with several different CFA algorithms.
Related Papers (5)