Abstract
A copy-move forgery is a passive tampering wherein one or more regions have been copied and pasted within the same image. Often, geometric transformations, including scale, rotation, and rotation+scale are applied to the forged areas to conceal the counterfeits to the copy-move forgery detection methods. Recently, copy-move forgery detection using image blobs have been used to tackle the limitation of the existing detection methods. However, the main limitation of blobs-based copy-move forgery detection methods is the inability to perform the geometric transformation estimation. To tackle the above-mentioned limitation, this article presents a technique that detects copy-move forgery and estimates the geometric transformation parameters between the authentic region and its duplicate using image blobs and scale-rotation invariant keypoints. The proposed algorithm involves the following steps: image blobs are found in the image being analyzed; scale-rotation invariant features are extracted; the keypoints that are located within the same blob are identified; feature matching is performed between keypoints that are located within different blobs to find similar features; finally, the blobs with matched keypoints are post-processed and a 2D affine transformations is computed to estimate the geometric transformation parameters. Our technique is flexible and can easily take in various scale-rotation invariant keypoints including AKAZE, ORB, BRISK, SURF, and SIFT to enhance the effectiveness. The proposed algorithm is implemented and evaluated on images forged with copy-move regions combined with geometric transformation from standard datasets. The experimental results indicate that the new algorithm is effective for geometric transformation parameters estimation.
Similar content being viewed by others
References
Alcantarilla PF, Bartoli A, Davison AJ (2012) Kaze features. In: Computer vision - ECCV 2012. Springer, Berlin, pp 214–227
Alcantarilla PF, Solutions T (2011) Fast explicit diffusion for accelerated features in nonlinear scale spaces. IEEE Trans Patt Anal Mach Intell 34(7):1281–1298
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6:1099–1110. https://doi.org/10.1109/TIFS.2011.2129512
Aniket R, Rahul D, Ruchira N, Rajat SC (2018) Digital image forensics: theory and implementation, vol 755. https://doi.org/10.1007/978-981-10-7644-2
Bay H, Tuytelaars T, Van Gool L (2006) Surf: speeded up robust features. In: Computer vision- ECCV 2006. Springer, Berlin, pp 404–417
Bharati A, Singh R, Vatsa MW, Bowyer K (2016) Detecting facial retouching using supervised deep learning. IEEE Transactions on Information Forensics and Security 11:1903–1913. https://doi.org/10.1109/TIFS.2016.2561898
Blatner D (2000) Photoshop: it's not just a program anymore. Macworld. Archived from the original on March 15, 2005. https://www.hmoob.in/wiki/Photo_manipulation
Bradski G, Konolige K, Rabaud V, Rublee E (2011) Orb: an efficient alternative to sift or surf. In: 2011 IEEE international conference on computer vision (ICCV 2011), vol 00, pp 2564–2571. https://doi.org/10.1109/ICCV.2011.6126544.
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6):1841–1854
DG L (1999) Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision, vol 2, pp 1150–1157
Faten MAA, Ahmed S, Moawad ID, Ghada (2020) An efficient method for image forgery detection based on trigonometric transforms and deep learning. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-019-08162-3
Fischler MA, Bolles RC (1981) Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM 24(6):381–395. https://doi.org/10.1145/358669.358692
Hayat K, Qazi T (2017) Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Computers and Electrical Engineering 62:448–458. https://doi.org/10.1016/j.compeleceng.2017.03.013
** G, Wan X (2017) An improved method for sift-based copy-move forgery detection using non-maximum value suppression and optimized j-linkage. Signal Processing: Image Communication 57:113–125
Lee S, Lee G-G, Jang ES, Kim W-Y (2019) Fast affine transform for real-time machine vision applications. 1180–1190
Leutenegger S, Chli M, Siegwart RY (2011) Brisk: binary robust invariant scalable keypoints. In: Proceedings of the 2011 international conference on computer vision (Washington, DC, USA), ICCV 11. IEEE Computer Society, pp 2548–2555. https://doi.org/10.1109/ICCV.2011.6126542
Lin C, Lu W, Sun W, Zeng J, Xu T, Lai J-H (2018) Region duplication detection based on image segmentation and keypoint contexts. Multimed Tools Applic 77(11):14241–14258. https://doi.org/10.1007/s11042-017-5027-9
Lindeberg T (2008) Scale-space: a framework for handling image structures at multiple scales. Encyclopedia of Computer Science and Engineering 4:2495–2504. https://doi.org/10.1002/9780470050118.ecse609
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110. https://doi.org/10.1023/B:VISI.0000029664.99615.94
Mahdi M, Alsaad S (2020) Detection of Copy-Move Forgery in Digital Image Based on SIFT Features and Automatic Matching Thresholds. 01:17–31. https://doi.org/10.1007/978-3-030-38752-5_2
Niyishaka P, Bhagvati C (2018) Digital image forensics technique for copy-move forgery detection using DoG and ORB: international conference, ICCVG (2018) Warsaw, Poland. Proceedings 09(2018):472–483. https://doi.org/10.1007/978-3-030-00692-1_41
Niyishaka P, Bhagvati C (2020) Copy-move forgery detection using image blobs and BRSIK feature. Springer. https://doi.org/10.1007/s11042-020-09225-6
Niyishaka P, Bhagvati C (2020) Image splicing detection technique based on illumination-reflectance model and lbp. Multimed Tools Appl (2020):44–51. https://doi.org/10.1007/s11042-020-09707-7
Ojeniyi J, Adedayo OB, Idris I, Abdulhamid S (2018) Hybridized technique for copy-move forgery detection using discrete cosine transform and speeded-up robust feature techniques. Int J Image Graph Signal Process 10(04):22–30. https://doi.org/10.5815/ijigsp.2018.04.03
Ramya M, Sridevi MP (2016) Image forgery detection using improved slic. Int Res J Eng Technol 3:1350–1356
Redi JA, Taktak W, Dugelay J-L (2011) Digital image forensics: a booklet for beginners. Multimedia Tools and Applications 51(1):133–162. https://doi.org/10.1007/s11042-010-0620-1
Tareen SAK, Saleem Z (2018) A comparative analysis of sift, surf, kaze, akaze, orb, and brisk. https://doi.org/10.1109/ICOMET.2018.8346440
Wang XY, Jiao LX, Wang XB, Yang HY, Niu PP (2018) A new keypoint-based copy-move forgery detection for color image. Applied Intelligence 48(10):3630–3652. https://doi.org/10.1007/s10489-018-1168-4
Yu L, Han Q, Niu X (2016) Feature point-based copy-move forgery detection: covering the non-textured areas. Multimedia Tools and Applications 75(2):1159–1176
Zhong J, Gan Y, Young J, Huang L, Lin P (2017) A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools and Applications 76(13):14887–14903
Zhu Y, Xuan**g S, Chen H (2016) Copy-move forgery detection based on scaled orb. Multimedia Tools and Applications 75:3221–3233. https://doi.org/10.1007/s11042-014-2431-2
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Patrick, N., Bhagvati, C. Geometric transformations parameters estimation from copy-move forgery using image blobs and keypoints. Multimed Tools Appl 81, 1953–1969 (2022). https://doi.org/10.1007/s11042-021-11642-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11642-0