Abstract
Copy-move forgery detection poses a significant challenge because the brightness and contrast of forged and real regions are highly consistent, and the forensic clues are weakened by various affine transformations and post-processing operations. Existing deep learning models ignore the hierarchical dependencies of the features and pay less attention to information purification. To solve these problems, we propose a novel two-stage model to detect copy-move forgery, dubbed by CCAIR-Net. First, in the coarse localization stage, we propose a cross-scale condition aggregation module to integrate multi-level features from global to local. This aggregation structure can eliminate semantic disparities and capture multi-scale hierarchical dependencies of features. In particular, the condition aggregation block enables feature purification and filtering of interfering information. Second, in the refinement stage, the designed weighted fusion mechanism can guide the model to remove falsely detected regions and supplement the miss-detected regions by adaptively weighted fusion of coarse-grained and fine-grained features. Furthermore, the stage-wise training strategy takes advantage of different losses to train the network to detect tampered regions at various scales. Extensive experiments demonstrate that the proposed CCAIR-Net performs better than state-of-the-art methods. It can detect and segment forged and real areas more accurately, even for affine transformations and post-processing attack images.













Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Datasets used are publicly available.
References
Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive over-segmentation and feature point matching. IEEE Trans Inf Forensic Secur 10(8):1705–1716
Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: Detecting copy-move image forgery with source/target localization. In: European Conference on Computer Vision, pp 168–184
Warif N, Idris M, Wahab A et al (2022) A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review. Multimed Tools Appl 81:15171–15203
Elaskily M, Dessouky M, Faragallah O et al (2023) A survey on traditional and deep learning copy move forgery detection (CMFD) techniques. Multimed Tools Appl 82:34409–34435
Wang Y, Kang X, Chen Y (2020) Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. J Inf Secur Appl 54:102536
Su L, Li C, Lai Y, Yang J (2018) A fast forgery detection algorithm based on exponential-Fourier moments for video region duplication. IEEE Trans Multimed 20(4):825–840
Pun C, Chung J (2018) A two-stage localization for copy-move forgery detection. Inf Sci 463:33–55
Amerini I, Ballan L et al (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099–1110
Wang X, Jiao L, Wang X et al (2018) A new keypoint-based copy-move forgery detection for color image. Appl Intell 48(10):3630–3652
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10(3):507–518
Cui Z, Lu N (2023) Feature-comparison network for visual tracking. Appl Intell 53:18263–18276
Zhang X, Demiris Y (2023) Visible and Infrared Image Fusion Using Deep Learning. IEEE Trans Pattern Anal Mach Intell 45(8):10535–10554
Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE international workshop on information forensics and security (WIFS). IEEE, Abu Dhabi, pp 1–6
Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77:18269–18293
Wu Y, Abd-Almageed W, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network. In: IEEE Winter Conference on Applications of Computer Vision (WACV), pp 1907–1915
Chen B, Tan W, Coatrieux G et al (2021) A serial image copy-move forgery localization scheme with source/target distinguishment. IEEE Trans Multimed 23:3506–3517
Islam A, Long C, Basharat A, Hoogs A (2020) DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-Move Forgery Detection and Localization. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 4675–4684
Zhong J, Pun C (2020) An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection. IEEE Trans Inf Forensic Secur 15:2134–2146
Zhu Y, Chen C, Yan G et al (2020) AR-Net: Adaptive Attention and Residual Refinement Network for Copy-Move Forgery Detection. IEEE Trans Ind Inform 16(10):6714–6723
Armas Vega E, González Fernández E, Sandoval Orozco A et al (2021) Copy-move forgery detection technique based on discrete cosine transform blocks features. Neural Comput Appl 33:4713–4727
Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Invest 9(1):49–57
Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using zernike moments. In: 2010 International workshop on information hiding (IH), vol 6387. Springer, Heidelberg, pp 51–65
Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy– move forgery detection. IEEE Trans Inf Forensic Secur 10(11):2284–2297
Amiano L, Cozzolino D, Poggi G, Verdoliva L (2019) A PatchMatch-Based Dense-Field Algorithm for Video Copy-Move Detection and Localization. IEEE Trans Circuits Syst Video Technol 29(3):669–682
Sunitha K, Krishna A, Prasad B (2022) Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model. Appl Intell 52:15405–15416
Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensic Secur 10(10):2084–2094
Wei Y, Ma J, Wang Z et al (2022) Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces. Int J Intell Syst 37(11):8291–8308
Ren R, Niu S, Jin J et al (2023) Multi-scale attention context-aware network for detection and localization of image splicing. Appl Intell 53:18219–18238
Ding H, Chen L, Tao Q et al (2023) DCU-Net: a dual-channel U-shaped network for image splicing forgery detection. Neural Comput Appl 35(7):5015–5031
Zhuo L, Tan S, Li B, Huang J (2022) Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. IEEE Trans Inf Forensic Secur 17:819–834
Yin Q, Wang J, Lu W, Luo X (2022) Contrastive learning based multi-task network for image manipulation detection. Signal Process 201:108709
Lin X, Wang S, Deng J et al (2023) Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recogn 133:109026
Hu X, Zhang Z, Jiang Z et al (2020) SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization. In: European Conference on Computer Vision (ECCV), pp 312–328
Barni M, Phan Q, Tondi B (2021) Copy Move Source-Target Disambiguation Through Multi-Branch CNNs. IEEE Trans Inf Forensic Secur 16:1825–1840
Aria M, Hashemzadeh M, Farajzadeh N (2022) QDL-CMFD: A Quality-independent and deep Learning-based Copy-Move image forgery detection method. Neurocomputing 511:213–236
Chen L, Zhu Y, Papandreou G et al (2018) Encoder-decoder with atrous separable convolution for semantic image segmentation. In: European conference on computer vision (ECCV), pp 801–818
Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), pp 422–426
Wen B, Zhu Y, Subramanian R, Ng T, Shen X, Winkler S (2016) COVERAGE—A novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP), pp 161–165
Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD-New database for copy-move forgery detection. In: ELMAR, 2013 55th international symposium. IEEE, pp 49–54
Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detection. IEEE Trans Inf Forensic Secur 11(11):2499–2512
Mahdian B, Saic S (2008) Detection of resampling supplemented with noise inconsistencies analysis for image forensics. In: 2008 International Conference on Computational Sciences and Its Applications (ICCSA), pp 546–556
Ferrara P, Bianchi T, Rosa A, Piva A (2012) Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts. IEEE Trans Inf Forensic Secur 7(5):1566–1577
Krawetz N (2007) A picture’s worth: digital image analysis and forensics. Hacker factor solutions, pp 1–31. Available: http://www.hackerfactor.com/papers/bh-usa-07-krawetz-wp.pdf
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grant 61972321, and in part by the National Natural Science Foundation of China under Grant 61901388.
Funding
The National Natural Science Foundation of China with a grant no. of 61972321 funded by Jiangbin Zheng with a grant no. of 61901388.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interests regarding the publication of this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Xu, Y., Zheng, J., Fang, A. et al. Cross-scale condition aggregation and iterative refinement for copy-move forgery detection. Appl Intell 54, 851–870 (2024). https://doi.org/10.1007/s10489-023-05174-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-023-05174-3