Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics

Sajjad Dadkhah, Mario Köppen, Hamid A. Jalab, Somayeh Sadeghi, Azizah Abdul Manaf, Diaa Uliyan

Abstract

Copy-move forgery is a special type of forgery that involves duplicating one region of an image by covering it with a copy of another region from the same image. This study develops a simple and powerful descriptor called Electromagnetismlike mechanism descriptor (EMag), for locating tampered areas in copy-move forgery on the basis of Fourier transform within a reasonable amount of time. EMag is based on the collective attraction-repulsion mechanism, which considers each images pixel as an electrical charge. The main component of EMag is the degree of the attraction-repulsion force between the current pixel and its neighbours. In the proposed algorithm, the image is divided into similar non-overlapping blocks, and then the final force for each block is evaluated and used to construct the tampered image features vector. The experimental results demonstrate the efficiency of the proposed algorithm in terms of detection time and detection accuracy. The detection rate of the proposed algorithm is improved by reduction of false positive rate (FPR) and increment of true positive rate (TPR).

References

  1. Ardizzone, E., Bruno, A., and Mazzola, G. (2015). Copymove forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensics and Security, 10(10):2084-2094.
  2. Ardizzone, E. and Mazzola, G. (2009). Detection of duplicated regions in tampered digital images by bit-plane analysis. In Image Analysis and Processing-ICIAP 2009, pages 893-901. Springer.
  3. Bashar, M., Noda, K., Ohnishi, N., and Mori, K. (2010). Exploring duplicated regions in natural images.
  4. Bentley, J. L. (1975). Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9):509-517.
  5. Chen, W., Shi, Y. Q., and Su, W. (2007). Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In Society of photooptical instrumentation engineers (SPIE) conference series, volume 6505, page 26. Citeseer.
  6. Cuevas, E., Oliva, D., Zaldivar, D., Pérez-Cisneros, M., and Sossa, H. (2012). Circle detection using electro-magnetism optimization. Information Sciences, 182(1):40-55.
  7. Dadkhah, S., Manaf, A. A., and Sadeghi, S. (2014). An effective svd-based image tampering detection and selfrecovery using active watermarking. Signal Processing: Image Communication.
  8. Farid, H. and Lyu, S. (2003). Higher-order wavelet statistics and their application to digital forensics. In IEEE workshop on statistical analysis in computer vision, volume 8, page 94. Citeseer.
  9. Fridrich, A. J., Soukal, B. D., and Lukás?, A. J. (2003). Detection of copy-move forgery in digital images. In in Proceedings of Digital Forensic Research Workshop. Citeseer.
  10. Fridrich, J. (1999). Methods for tamper detection in digital images. In Multimedia and Security, Workshop at ACM Multimedia, volume 99, pages 29-34.
  11. Hou, D. M., Bai, Z. Y., and Liu, S. C. (2012). A new algorithm for image copy-move forgery detection. In Advanced Materials Research, volume 433, pages 5930- 5934. Trans Tech Publ.
  12. Hu, J., Zhang, H., Gao, Q., and Huang, H. (2011). An improved lexicographical sort algorithm of copymove forgery detection. In Networking and Distributed Computing (ICNDC), 2011 Second International Conference on, pages 23-27. IEEE.
  13. Jalab, H. A. and Abdullah, N. A. (2013). Content-based image retrieval based on electromagnetism-like mechanism. Mathematical Problems in Engineering, 2013.
  14. Jalab, H. A. and Shaker, K. (2014). Training the neural networks by electromagnetism-like mechanism based algorithm. In INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2014): Proceedings of the 3rd International Conference on Quantitative Sciences and Its Applications, volume 1635, pages 582-586. AIP Publishing.
  15. Jing, L. and Shao, C. (2012). Image copy-move forgery detecting based on local invariant feature. Journal of Multimedia, 7(1).
  16. Kang, X. B. and Wei, S. M. (2008). Identifying tampered regions using singular value decomposition in digital image forensics. In Computer Science and Software Engineering, 2008 International Conference on, volume 3, pages 926-930. IEEE.
  17. Kirchner, M., Schöttle, P., and Riess, C. (2015). Thinking beyond the block: block matching for copy-move forgery detection revisited. In SPIE/IS&T Electronic Imaging, pages 940903-940903. International Society for Optics and Photonics.
  18. Li, W. and Yu, N. (2010). Rotation robust detection of copymove forgery. In Image Processing (ICIP), 2010 17th IEEE International Conference on, pages 2113-2116. IEEE.
  19. Li, Y. and Wang, H. (2012). An efficient and robust method for detecting region duplication forgery based on non-parametric local transforms. In Image and Signal Processing (CISP), 2012 5th International Congress on, pages 567-571. IEEE.
  20. Lin, Z., He, J., Tang, X., and Tang, C.-K. (2009). Fast, automatic and fine-grained tampered jpeg image detection via dct coefficient analysis. Pattern Recognition, 42(11):2492-2501.
  21. Liu, G., Wang, J., Lian, S., and Wang, Z. (2011). A passive image authentication scheme for detecting regionduplication forgery with rotation. Journal of Network and Computer Applications, 34(5):1557-1565.
  22. Mishra, P., Mishra, N., Sharma, S., and Patel, R. (2013). Region duplication forgery detection technique based on surf and hac. The Scientific World Journal , 2013.
  23. Ng, T.-T., Chang, S.-F., Hsu, J., and Pepeljugoski, M. (2005). Columbia photographic images and photorealistic computer graphics dataset. Columbia Univ., New York, ADVENT Tech. Rep, pages 205-2004.
  24. Piva, A. (2013). An overview on image forensics. ISRN Signal Processing, 2013.
  25. Popescu, A. C. and Farid, H. (2004). Exposing digital forgeries by detecting duplicated image regions. Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004- 515.
  26. Rosenfeld, A. and Kak, A. C. (2014). Digital picture processing, volume 1. Elsevier.
  27. Ryu, S.-J., Lee, M.-J., and Lee, H.-K. (2010). Detection of copy-rotate-move forgery using zernike moments. In International Workshop on Information Hiding, pages 51-65. Springer.
  28. Silva, E., Carvalho, T., Ferreira, A., and Rocha, A. (2015). Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. Journal of Visual Communication and Image Representation, 29:16-32.
  29. Turabieh, H. and Abdullah, S. (2011). An integrated hybrid approach to the examination timetabling problem. Omega, 39(6):598-607.
  30. Wu, H.-C. and Chang, C.-C. (2002). Detection and restoration of tampered jpeg compressed images. Journal of Systems and Software, 64(2):151-161.
Download


Paper Citation


in Harvard Style

Dadkhah S., Köppen M., A. Jalab H., Sadeghi S., Abdul Manaf A. and Uliyan D. (2017). Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics . In Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods - Volume 1: ICPRAM, ISBN 978-989-758-222-6, pages 612-619. DOI: 10.5220/0006232206120619


in Bibtex Style

@conference{icpram17,
author={Sajjad Dadkhah and Mario Köppen and Hamid A. Jalab and Somayeh Sadeghi and Azizah Abdul Manaf and Diaa Uliyan},
title={Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics},
booktitle={Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods - Volume 1: ICPRAM,},
year={2017},
pages={612-619},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006232206120619},
isbn={978-989-758-222-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods - Volume 1: ICPRAM,
TI - Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics
SN - 978-989-758-222-6
AU - Dadkhah S.
AU - Köppen M.
AU - A. Jalab H.
AU - Sadeghi S.
AU - Abdul Manaf A.
AU - Uliyan D.
PY - 2017
SP - 612
EP - 619
DO - 10.5220/0006232206120619