Signal and Information Processing

Copy-Move Forgery Detection Based on Super Pixel Segmentation

Expand
  • 1. School of Data and Computer Science, Sun Yat-sen University, Guangzhou 510006, China;
    2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Received date: 2018-05-08

  Revised date: 2018-09-03

  Online published: 2019-05-31

Abstract

A clustering method to detect the copy-move area based on the results of superpixel segmentation is proposed. Different from the traditional K-means clustering method, the proposed clustering method is to place random seeds in the image and segment the region by using super-pixel segmentation method, and then obtain the regions containing pre-matched feature points. In this algorithm, the number of matched feature points in each region is used as a criterion to determine whether the matched feature points in the region are effective feature points. When the number of matching points reaches a certain threshold, the points in the sub-regions are clustered into one group, so that the clustering results are closer to the image content and in accordance with the actual situation. Experiments show that the proposed method based on super-pixel segmentation is more effective than the traditional SIFT method.

Cite this article

LIU Jiarui, LU Wei, LIU Ke, HUANG Xinchao, LIN Cong, LIU Xianjin . Copy-Move Forgery Detection Based on Super Pixel Segmentation[J]. Journal of Applied Sciences, 2019 , 37(3) : 419 -426 . DOI: 10.3969/j.issn.0255-8297.2019.03.012

References

[1] Farid H. Chapter 1 photo fakery and forensics[J]. Advances in Computers, 2009, 77:1-55.
[2] Fridrich J J. Detection of copy-move forgery in digital images[C]//Digital Forensic Research Workshop, 2004.
[3] Huang Y, Lu W, Sun W, Long D. Improved DCT-based detection of copy-move forgery in images[J]. Forensic Science International, 2011, 206(1-3):178-184.
[4] Khan S, Kulkarni A. Reduced time complexity for detection of copy-move forgery using discrete wavelet transform[J]. International Journal of Computer Applications, 2011, 6(7):31-36.
[5] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[J]. Computer Science, 2004:1-11.
[6] Ryu S J, Kirchner M, Lee M J, Lee H K. Rotation invariant localization of duplicated image regions based on zernike moments[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(8):1355-1370.
[7] Ryu S J, Lee M J, Lee H K. Detection of copy-rotate-move forgery using Zernike moments[C]//International Conference on Information Hiding. Springer-Verlag, 2010:51-65.
[8] Fischler M A, Bolles R C. Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography[J]. Readings in Computer Vision, 1987, 24:726-740.
[9] Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2):91-110.
[10] Bay H, Ess A, Tuytelaars T. Gool LV SURF:speeded up robust features[C]//Computer Vision and Image Understanding, 2008, 110(3):346-359.
[11] Pan X, Lü S. Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(4):857-867.
[12] Amerini I, Ballan L, Caldelli R, Bimbo A D, Serra G. A sift-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):1099-1110.
[13] Amerini I, Ballan L, Caldelli R, Bimbo A D, Tongo L D, Serra G. Copy-move forgery detection and localization by means of robust clustering with J-Linkage[J]. Signal Processing Image Communication, 2013, 28(6):659-669.
[14] Pun C M, Yuan X C, Bi X L. Image forgery detection using adaptive over segmentation and feature point matching[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(8):1705-1716.
[15] Levinshtein A, Stere A, Kutulakos K N, Fleet D J, Dickinson S J, Siddiqi K. Turbo pixels:fast super pixels using geometric flows[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2009, 31(12):2290-2297.
[16] Li J, Li X, Yang B, Sun X. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(3):507-518.
[17] Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(6):1841-1854.
Outlines

/