Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 380-384.

• Information Security • Previous Articles     Next Articles

Digital Image Forensics for Copy and Paste Tampering

XING Wen-bo1,2, DU Zhi-chun1   

  1. School of Criminal Justice,East China University of Political Science and Law,Shanghai 200042,China1;
    School of Criminal Science and Technology,Nanjing Forest Police College,Nanjing 210046,China2
  • Online:2019-06-14 Published:2019-07-02

Abstract: When a digital image is tampered with copy and paste,the copied part might be zoomed,rotated and then pasted in different parts of the image.The sift key points are detected in the image by SIFT algorithm,and the matched key points are found out by matching vector of the key points.The matched key points are classified by the affine transformation matrix which is calculated byRANdom SAmple Consensus,namely randomly extracting three matched point pairs in matched point pairs.The affine transformation of the image and its inverse affine transformation are carried out.Then the local correlation map of the tampered image and its affine transformation image is obtained,and the local correlation map of the tampered image and its inverse affine transformation image too.Each class of matched key points is divided into two groups according to affine transformation relations.A binary image is set from the key point of each group and dilated with structural elements.The dilated position of the binary image is continued to have when its value in the local correlation map is greater than the threshold and is get rid of when its value in the local correlation map is less than the threshold.The binary image is dilated iteratively until it’s no longer expands and its boundary is marked on the original image.Experiments show that this method can effectively locate the copy paste tampering areas in digital images.

Key words: Copy-pasted forgery, Digital image forensics, Local correlation map, RANSAC algorithm, Sift key points

CLC Number: 

  • TP391
[1]WARBHE A D,DHARASKAR R V,THAKARE V M.A Survey on Keypoint Based Copy-paste Forgery Detection Techniques[J].Procedia Computer Science,2016,78:61-67.
[2]LOWE D G.Distinctive Image Features from Scale-Invariant Keypoints [J].International Journal of Computer Vision,2004,60(2):91-110.
[3]BAY H,TUYTELAARS T,GOOL L V.SURF:Speeded Up Robust Features[J].Computer Vision & Image Understanding,2006,110(3):404-417.
[4]ALCANTARILLA P F,BARTOLI A,DAVISON A J.KAZE Features[M]∥European Conference on Computer Vision.Berlin:Springer,2012:214-227.
[5]HUANG H,GUO W,ZHANG Y.Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm[C]∥Pacific-Asia Workshop on Computational Intelligence and Industrial Application,2008(PACIIA’08).IEEE,2009:272-276.
[6]ARDIZZONE E,BRUNO A,MAZZOLA G.Detecting multiple copies in tampered images[C]∥IEEE International Conference on Image Processing.IEEE,2010:2117-2120.
[7]池静,张婷,杨振宇.基于SIFT和区域生长的图像复制粘贴盲检测算法 [J].科学技术与工程,2013,13(4):917-920.
[8]AMERINI I,BALLAN L,CALDELLI R,et al.Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].Signal Processing Image Communication,2013,28(6):659-669.
[9]李云,陈帆,和红杰.SIFT复制粘贴图像取证算法的安全性分析及改进[C]∥全国信息隐藏暨多媒体信息安全学术大会.2015.
[10]巩家昌.基于局部颜色不变性特征的图像复制粘贴篡改取证研究[D].天津:天津大学,2015.
[11]FISCHLER M A,BOLLES R C.Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography [J].Comm. of the ACM,1981,24:381-395.
[12]http://www.cs.ubc.ca/~lowe/keypoints/.
[13]http://blog.sina.com.cn/s/blog_49cd44fb010005qb.html.
[14]http://image.fengniao.com/360/3600114_all.html#3601563.
[15]TRALIC D,ZUPANCIC I,GRGIC S.CoMoFoD — New database for copy-move forgery detection[C]∥55th International Symposium ELMAR-2013.IEEE,2013:49-54.
[1] DAN Zhou-yang, LIU Fen-lin, GONG Dao-fu. Smoothing Filter Detection Algorithm Based on Middle and Tail Information of Differential Histogram [J]. Computer Science, 2021, 48(11): 234-241.
[2] SHAO Jin-da, YANG Shuai, CHENG Lin. UAV Image Matching Algorithm Based on Improved SIFT Algorithm and Two-stage Feature Matching [J]. Computer Science, 2019, 46(6): 316-321.
[3] HU Yan-hua ,TANG Peng ,JIN Wei-dong, HE Zheng-wei. Estimation of FOE for Railway Video Sequences [J]. Computer Science, 2018, 45(7): 226-229.
[4] ZHOU Sheng-pu, GENG Guo-hua, LI Kang, WANG Piao. Multi-view Geometric 3D Reconstruction Method Based on AKAZE Algorithm [J]. Computer Science, 2018, 45(11A): 180-184.
[5] KANG Xiao-bing,WEI Sheng-min. Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery [J]. Computer Science, 2011, 38(3): 295-299.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!