Copy-Move Image Forgery Detection in Virtual Electrostatic Field
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Copy-Move Image Forgery Detection in Virtual Electrostatic Field

Authors: Michael Zimba, Darlison Nyirenda

Abstract:

A novel copy-move image forgery, CMIF, detection method is proposed. The proposed method presents a new approach which relies on electrostatic field theory, EFT. Solely for the purpose of reducing the dimension of a suspicious image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of the suspicious image and extracts only the approximation subband. The extracted subband is then bijectively mapped onto a virtual electrostatic field where concepts of EFT are utilized to extract robust features. The extracted features are invariant to additive noise, JPEG compression, and affine transformation. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. SATS is a better option than the common shift vector method because SATS is insensitive to affine transformation. Consequently, the proposed CMIF algorithm is not only fast but also more robust to attacks compared to the existing related CMIF algorithms. The experimental results show high detection rates, as high as 100% in some cases.

Keywords: Affine transformation, Radix sort, SATS, Virtual electrostatic field.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1336012

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1770

References:


[1] H. Farid, "A Survey of Image Forgery Detection,” in Signal Proc. Magazine, vol. 26, no. 2, 2009, pp.16-25.
[2] A.C. Popescu and H. Farid, "Exposing Digital Forgeries by Detecting Traces of Resampling”, IEEE Trans. Signal Processing, vol. 53, pp. 758-767, 2005.
[3] H. Sencar and N. Memon, "Overview of State- of- the- art in Digital Image Forensics,” Algorithms, Architectures and Information Systems Security, pp. 325-344, 2008.
[4] T. Ng, S. Chang, C. Lin, and Q. Sun, " Passive-Blind Image Forensics,” Multimedia Security Technologies for Digital Rights Management, Academic Press, pp. 383-412, 2006.
[5] J. Fridrich, D. Soukal and J. Lukas, "Detection of Copy-Move Forgery in Digital Images,” in 2003 Proc. Digital Forensic Research Workshop.
[6] S. Bayram, T. Sencar and N. Memon, "An Efficient and Robust Method for Detecting Copy-move Forgery,” ICASSP, pp. 1053-1056, 2009.
[7] G. Li, Q. Wu, D. Tu, and S. Sun, "A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries based on DWT and SVD,” in Proc. IEEE International Conf. Multimedia and Expo, Beijing China, 2007, pp. 1750-1753.
[8] G.H. Abdel-Hamid and Y.H. Yang, "Electrostatic Field-based Detection of Corners of Planar Curves,” in Proc. 1993 Canadian Conf. Electrical and Computer Engineering. Vancouver, 1993.
[9] D. Halliday and R. Resnick, Physics Part III. Willey International Edition, Wiley, New York, 1962.
[10] P. Silvester, Modern Electromagnetic Fields, Prentice-Hall, 1967.
[11] I.S. Grant and W.R. Phillips, Electromagnetism, Wiley, New York, 1990
[12] M. Zimba and S. Xingming, "Fast and Robust Image Cloning Detection Using Block Characteristics of DWT Coefficients,” JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 5, No. 7, 2011, pp.359-367.
[13] C. Solomon and T. Breckon, Fundamentals of Digital Image Processing, Wiley-Blackwell, 2011.
[14] R.I. Hartley and A. Zisserman, Multiple View Geometry in Computer Vision, Cambridge University Press, 2nd edition, 2004.
[15] I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo and G. Serra, "Geometric Tampering Estimation by Means of a Sift-Based Forensic Analysis,” International Conf. Acoustic Speech and Signal Processing, Dallas TX, USA, March 14-19, 2010.
[16] A.V. Christlein, C. Riess and E. Angelopoulou, "On Rotation Invariance in Copy-Move Forgery Detection,” in Proc. IEEE Workshop, Information Forensics and Security, Seattle USA, 2010.
[17] C. Riess and E. Angelopoulou, "Scene Illumination as an Indicator of Image Manipulation,” 12th International Workshop on Information Hiding, Springer, Vol. 6387, 2010, pp. 66-80.