Log in

Geometric transformations parameters estimation from copy-move forgery using image blobs and keypoints

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A copy-move forgery is a passive tampering wherein one or more regions have been copied and pasted within the same image. Often, geometric transformations, including scale, rotation, and rotation+scale are applied to the forged areas to conceal the counterfeits to the copy-move forgery detection methods. Recently, copy-move forgery detection using image blobs have been used to tackle the limitation of the existing detection methods. However, the main limitation of blobs-based copy-move forgery detection methods is the inability to perform the geometric transformation estimation. To tackle the above-mentioned limitation, this article presents a technique that detects copy-move forgery and estimates the geometric transformation parameters between the authentic region and its duplicate using image blobs and scale-rotation invariant keypoints. The proposed algorithm involves the following steps: image blobs are found in the image being analyzed; scale-rotation invariant features are extracted; the keypoints that are located within the same blob are identified; feature matching is performed between keypoints that are located within different blobs to find similar features; finally, the blobs with matched keypoints are post-processed and a 2D affine transformations is computed to estimate the geometric transformation parameters. Our technique is flexible and can easily take in various scale-rotation invariant keypoints including AKAZE, ORB, BRISK, SURF, and SIFT to enhance the effectiveness. The proposed algorithm is implemented and evaluated on images forged with copy-move regions combined with geometric transformation from standard datasets. The experimental results indicate that the new algorithm is effective for geometric transformation parameters estimation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alcantarilla PF, Bartoli A, Davison AJ (2012) Kaze features. In: Computer vision - ECCV 2012. Springer, Berlin, pp 214–227

  2. Alcantarilla PF, Solutions T (2011) Fast explicit diffusion for accelerated features in nonlinear scale spaces. IEEE Trans Patt Anal Mach Intell 34(7):1281–1298

    Google Scholar 

  3. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6:1099–1110. https://doi.org/10.1109/TIFS.2011.2129512

    Article  Google Scholar 

  4. Aniket R, Rahul D, Ruchira N, Rajat SC (2018) Digital image forensics: theory and implementation, vol 755. https://doi.org/10.1007/978-981-10-7644-2

  5. Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: Computer vision- ECCV 2006. Springer, Berlin, pp 404–417

  6. Bharati A, Singh R, Vatsa MW, Bowyer K (2016) Detecting facial retouching using supervised deep learning. IEEE Transactions on Information Forensics and Security 11:1903–1913. https://doi.org/10.1109/TIFS.2016.2561898

    Article  Google Scholar 

  7. Blatner D (2000) Photoshop: it's not just a program anymore. Macworld. Archived from the original on March 15, 2005. https://www.hmoob.in/wiki/Photo_manipulation

  8. Bradski G, Konolige K, Rabaud V, Rublee E (2011) Orb: an efficient alternative to sift or surf. In: 2011 IEEE international conference on computer vision (ICCV 2011), vol 00, pp 2564–2571. https://doi.org/10.1109/ICCV.2011.6126544.

  9. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6):1841–1854

    Article  Google Scholar 

  10. DG L (1999) Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision, vol 2, pp 1150–1157

  11. Faten MAA, Ahmed S, Moawad ID, Ghada (2020) An efficient method for image forgery detection based on trigonometric transforms and deep learning. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-019-08162-3

  12. Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395. https://doi.org/10.1145/358669.358692

  13. Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Computers and Electrical Engineering 62:448–458. https://doi.org/10.1016/j.compeleceng.2017.03.013

  14. ** G, Wan X (2017) An improved method for sift-based copy-move forgery detection using non-maximum value suppression and optimized j-linkage. Signal Processing: Image Communication 57:113–125

    Google Scholar 

  15. Lee S, Lee G-G, Jang ES, Kim W-Y (2019) Fast affine transform for real-time machine vision applications. 1180–1190

  16. Leutenegger S, Chli M, Siegwart RY (2011) Brisk: binary robust invariant scalable keypoints. In: Proceedings of the 2011 international conference on computer vision (Washington, DC, USA), ICCV 11. IEEE Computer Society, pp 2548–2555. https://doi.org/10.1109/ICCV.2011.6126542

  17. Lin C, Lu W, Sun W, Zeng J, Xu T, Lai J-H (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tools Applic 77(11):14241–14258. https://doi.org/10.1007/s11042-017-5027-9

    Article  Google Scholar 

  18. Lindeberg T (2008) Scale-space: a framework for handling image structures at multiple scales. Encyclopedia of Computer Science and Engineering 4:2495–2504. https://doi.org/10.1002/9780470050118.ecse609

    Article  Google Scholar 

  19. Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110. https://doi.org/10.1023/B:VISI.0000029664.99615.94

    Article  Google Scholar 

  20. Mahdi M, Alsaad S (2020) Detection of Copy-Move Forgery in Digital Image Based on SIFT Features and Automatic Matching Thresholds. 01:17–31. https://doi.org/10.1007/978-3-030-38752-5_2

  21. Niyishaka P, Bhagvati C (2018) Digital image forensics technique for copy-move forgery detection using DoG and ORB: international conference, ICCVG (2018) Warsaw, Poland. Proceedings 09(2018):472–483. https://doi.org/10.1007/978-3-030-00692-1_41

  22. Niyishaka P, Bhagvati C (2020) Copy-move forgery detection using image blobs and BRSIK feature. Springer. https://doi.org/10.1007/s11042-020-09225-6

  23. Niyishaka P, Bhagvati C (2020) Image splicing detection technique based on illumination-reflectance model and lbp. Multimed Tools Appl (2020):44–51. https://doi.org/10.1007/s11042-020-09707-7

  24. Ojeniyi J, Adedayo OB, Idris I, Abdulhamid S (2018) Hybridized technique for copy-move forgery detection using discrete cosine transform and speeded-up robust feature techniques. Int J Image Graph Signal Process 10(04):22–30. https://doi.org/10.5815/ijigsp.2018.04.03

    Article  Google Scholar 

  25. Ramya M, Sridevi MP (2016) Image forgery detection using improved slic. Int Res J Eng Technol 3:1350–1356

    Google Scholar 

  26. Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133–162. https://doi.org/10.1007/s11042-010-0620-1

    Article  Google Scholar 

  27. Tareen SAK, Saleem Z (2018) A comparative analysis of sift, surf, kaze, akaze, orb, and brisk. https://doi.org/10.1109/ICOMET.2018.8346440

  28. Wang XY, Jiao LX, Wang XB, Yang HY, Niu PP (2018) A new keypoint-based copy-move forgery detection for color image. Applied Intelligence 48(10):3630–3652. https://doi.org/10.1007/s10489-018-1168-4

    Article  Google Scholar 

  29. Yu L, Han Q, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications 75(2):1159–1176

    Article  Google Scholar 

  30. Zhong J, Gan Y, Young J, Huang L, Lin P (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools and Applications 76(13):14887–14903

    Article  Google Scholar 

  31. Zhu Y, Xuan**g S, Chen H (2016) Copy-move forgery detection based on scaled orb. Multimedia Tools and Applications 75:3221–3233. https://doi.org/10.1007/s11042-014-2431-2

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patrick, N., Bhagvati, C. Geometric transformations parameters estimation from copy-move forgery using image blobs and keypoints. Multimed Tools Appl 81, 1953–1969 (2022). https://doi.org/10.1007/s11042-021-11642-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11642-0

Keywords

Navigation