LYU Yingda, SHEN Xuanjing, CHEN Haipeng, “Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 345-350, 2017, doi: 10.1049/cje.2017.01.028
Citation: LYU Yingda, SHEN Xuanjing, CHEN Haipeng, “Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 345-350, 2017, doi: 10.1049/cje.2017.01.028

Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector

doi: 10.1049/cje.2017.01.028
Funds:  This work is supported by the National Natural Science Foundation of China (No.61305046), and the Natural Science Foundation of the Jilin Province (No.20140101193JC, No.20130522117JH, No.20150101055JC).
More Information
  • Corresponding author: CHEN Haipeng (corresponding author) was born in 1978, is a associate professor of the college of computer science and technology, Jilin University. His research interests include image processing,pattern recognition, identification for image authenticity, pattern recognition, and computer network security. (Email:chenhp@jlu.edu.cn)
  • Received Date: 2014-11-04
  • Rev Recd Date: 2015-01-20
  • Publish Date: 2017-03-10
  • To detect copy-paste tampering, an improved SIFT (Scale invariant feature transform)-based algorithm was proposed. Maximum angle is defined and a maximum angle-based marked graph is constructed. The marked graph feature vector is provided to each SIFT key point via discrete polar coordinate transformation. Key points are matched to detect the copy-paste tampering regions. The experimental results show that the proposed algorithm can effectively identify and detect the rotated or scaled copy-paste regions, and in comparison with the methods reported previously, it is resistant to post-processing, such as blurring, Gaussian white noise and JPEG recompression. The proposed algorithm performs better than the existing algorithm to dealing with scaling transformation.
  • loading
  • B. Wang, X.W. Kong, B. Elisa et al., "Exposing Copy-Paste-Blur forgeries based on color coherence", Chinese Journal of Electronics, Vol.18, No.3, pp.487-490, 2009.
    A.J. Fridrich, B.D. Soukal and A.J. Luká, "Detection of copy-move forgery in digital images", Proc. of Digital Forensic Research Workshop, Cleveland, Ohio, USA, 2003.
    Y. Huang, W. Lu and W. Sun, "Improved DCT-based detection of copy-move forgery in images", Forensic Science International, Vol.206, No.1, pp.178-184, 2011.
    Y. Cao, T. Gao and L. Fan, "A robust detection algorithm for copy-move forgery in digital images", Forensic Science International, Vol.214, No.1, pp.33-43, 2012.
    A.C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions", Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.
    B. Mahdian and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants", Forensic Science International, Vol.171, No.2, pp.180-189, 2007.
    S.J. Ryu, M.J. Lee and H.K. Lee, "Detection of copy-rotate-move forgery using Zernike moments", Information Hiding, Springer Berlin Heidelberg, Calgary, Alberta, Candada, Vol.6387, pp.51-65, 2010.
    G. Liu, J. Wang and S. Lian, "A passive image authentication scheme for detecting region-duplication forgery with rotation", Journal of Network and Computer Applications, Vol.34, No.5, pp.1557-1565, 2011.
    R. Davarzani, K. Yaghmaie, S. Mozaffari, et al., "Copy-move forgery detection using multi resolution local binary patterns", Forensic Science International, Vol.231, No.1, pp.61-72, 2013.
    D.G. Lowe, "Distinctive image features from scale-invariant keypoints", International Journal of Computer Vision, Vol.60, No.2, pp.91-110, 2004.
    H. Huang, W. Guo and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm", Proc. of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China, pp.1241-1245, 2008.
    A. Irene, L. Ballan and C. Roberto, "A SIFT-based forensic method for copy-move attack detection and transformation recovery", IEEE Transactions on Information Forensics and Security, Vol.6, No.3, pp.1099-1110, 2011.
    V. Anand, M.F. Hashmi and A.G. Keskar, "A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods", Intelligent Information and Database Systems, Springer International Publishing, pp.530-542, 2014.
    B. Xu, J. Wang and G. Liu, "Image copy-move forgery detection based on SURF", Proc. of 2010 IEEE International on Multimedia Information Networking and Security, Nanjing, China, pp.889-892, 2010.
    E. Tola, V. Lepetit and P. Fua, "Daisy:An efficient dense descriptor applied to wide-baseline stereo", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.32, No.5, pp.815-830, 2010.
    J.M. Guo, Y.F. Liu and Z.J. Wu, "Duplication forgery detection using improved DAISY descriptor", Expert Systems with Applications, Vol.40, No.2, pp.707-714, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (398) PDF downloads(488) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return