Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1877972.1877990acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
poster

Copy-move forgery detection via texture description

Published: 29 October 2010 Publication History

Abstract

Copy-move forgery is one of the most common type of tampering in digital images. Copy-moves are parts of the image that are copied and pasted onto another part of the same image. Detection methods in general use block-matching methods, which first divide the image into overlapping blocks and then extract features from each block, assuming similar blocks will yield similar features. In this paper we present a block-based approach which exploits texture as feature to be extracted from blocks. Our goal is to study if texture is well suited for the specific application, and to compare performance of several texture descriptors. Tests have been made on both uncompressed and JPEG compressed images.

References

[1]
Sencar, T., Memon N. 2008, Overview of State-of-the-art in Digital Image Forensics. World Scientific Press
[2]
Farid H. 2009, A Survey of Image Forgery Detection, IEEE Signal Processing Magazine, 26(2):16--25
[3]
Bayram, S., Sencar, T., and Memon N. 2008, A Survey of Copy-Move Forgery Detection Techniques, IEEE Western New York Image Processing Workshop, Sept. 2008, NY
[4]
Fridrich, J., Soukal, D., and Luk, J., 2003, Detection of Copymove Forgery in Digital Images, Proc. Digital Forensic Research Workshop, Cleveland, OH, August 2003.
[5]
Popescu, A.C. and Farid, H. 2004, Exposing Digital Forgeries by Detecting Duplicated Image Regions, Technical Report, TR2004--515, Dartmouth College, Computer Science.
[6]
Li, G., Wu, Q., Dan Tu and Sun S., 2007, A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD, Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, 1750--1753.
[7]
Luo, W., Huang, J., and Qiu, G. 2006. Robust Detection of Region-Duplication Forgery in Digital Image. In Proceedings of the 18th international Conference on Pattern Recognition - Volume 04, 746--749.
[8]
T. Sikora, 2001, The MPEG-7 visual standard for content description-an overview, IEEE Trans. Circuits Syst. Video Technol. 11 (6), pp. 696--702.
[9]
Feng Xu, Yu-Jin Zhang, 2006, Evaluation and comparison of texture descriptors proposed in MPEG-7, Journal of Visual Communication and Image Representation, Volume 17, Issue 4, August 2006, Pages 701--716
[10]
Howarth P. and Ruger S., 2004), Evaluation of Texture Features for Content-Based Image Retrieval, Proc. of CIVR 2004, LNCS 3315, pp. 326--334
[11]
Won, C.S., Park, D.K., 2002, Efficient Use of MPEG-7 Edge Histogram Descriptor. ETRI. Journal 24, 23--30.
[12]
H. Tamura, S. Mori, T. Yamawaki, Texture features corresponding to visual perception, IEEE Trans. Syst. Man Cybern. 8 (6) (1978) 460--473.
[13]
Jain A.K. and Farrokhia F. 1991, Unsupervised Texture Segmentation Using Gabor Filters, Pattern Recognition, Vol. 24, No. 12, pp. 1167--86.
[14]
Robert M. Haralick, 1979, Statistical and structural approaches to texture, Proc. IEEE, vol. 67, no. 5, pp. 786--804.

Cited By

View all
  • (2024)Region Duplication Tampering Detection and Localization in Digital Video Using Haar Wavelet TransformWireless Personal Communications10.1007/s11277-024-11028-z135:2(655-674)Online publication date: 8-May-2024
  • (2023)Robust and Optimized Algorithm for Detection of Copy-Rotate-Move TemperingIEEE Access10.1109/ACCESS.2023.329112811(66626-66640)Online publication date: 2023
  • (2022)JPEG Compression-aware Image Forgery LocalizationProceedings of the 30th ACM International Conference on Multimedia10.1145/3503161.3547749(5871-5879)Online publication date: 10-Oct-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MiFor '10: Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
October 2010
134 pages
ISBN:9781450301572
DOI:10.1145/1877972
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. copy-move forgery
  2. image forensics
  3. texture descriptors

Qualifiers

  • Poster

Conference

MM '10
Sponsor:
MM '10: ACM Multimedia Conference
October 29, 2010
Firenze, Italy

Upcoming Conference

MM '24
The 32nd ACM International Conference on Multimedia
October 28 - November 1, 2024
Melbourne , VIC , Australia

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Region Duplication Tampering Detection and Localization in Digital Video Using Haar Wavelet TransformWireless Personal Communications10.1007/s11277-024-11028-z135:2(655-674)Online publication date: 8-May-2024
  • (2023)Robust and Optimized Algorithm for Detection of Copy-Rotate-Move TemperingIEEE Access10.1109/ACCESS.2023.329112811(66626-66640)Online publication date: 2023
  • (2022)JPEG Compression-aware Image Forgery LocalizationProceedings of the 30th ACM International Conference on Multimedia10.1145/3503161.3547749(5871-5879)Online publication date: 10-Oct-2022
  • (2022)Similar Neighborhood Search and Key-Point Clustering in Forgery Detection2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC)10.1109/ICAAIC53929.2022.9792744(1375-1380)Online publication date: 9-May-2022
  • (2022)Expectation propagation learning of finite multivariate Beta mixture models and applicationsNeural Computing and Applications10.1007/s00521-021-06839-134:17(14275-14285)Online publication date: 8-Jan-2022
  • (2022)Background Study and AnalysisImage Copy-Move Forgery Detection10.1007/978-981-16-9041-9_2(11-31)Online publication date: 4-Feb-2022
  • (2020)Study of Copy-Move Forgery Detection Techniques in Images2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)10.1109/ICRITO48877.2020.9197801(630-635)Online publication date: Jun-2020
  • (2020)Copy-Move Forgery Detection Based on Keypoint Clustering and Similar Neighborhood Search AlgorithmIEEE Access10.1109/ACCESS.2020.29748048(36863-36875)Online publication date: 2020
  • (2020)Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly AlgorithmThe Computer Journal10.1093/comjnl/bxaa13765:4(983-996)Online publication date: 7-Dec-2020
  • (2020)Passive Authentication Image Forgery Detection Using Multilayer CNNMobile Radio Communications and 5G Networks10.1007/978-981-15-7130-5_18(237-249)Online publication date: 29-Sep-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media