Username   Password       Forgot your password?  Forgot your username? 

 

A Duplicated Forgery Detection Fusion Algorithm using SIFT and Radial-Harmonic Fourier Moments

Volume 14, Number 1, January 2018, pp. 111-120
DOI: 10.23940/ijpe.18.01.p12.111120

Yanfen Gana, Jimlee Chungb, Janson Youngc, Zixin Hub, Jinhong Zhaob

aSchool of Computer Science and Technology, Guangdong University of Foreign Studies South China Business College, Guangzhou, 510545, China
bSchool of information engineering, Guangdong Mechanical & Electrical College, Guangzhou, 510550, China
cSchool of Computers, Guangdong University of Technology, Guangzhou, 510006, China

(Submitted on October 17, 2017; Revised on November 23, 2017; Accepted on December 29, 2017)

Abstract:

This paper proposed an algorithm that fused block-based algorithm (Radial Harmonic Fourier Moments, RHFMs) and SIFT algorithm (Scale Invariant Feature Transform, SIFT) for the duplicated forgery detection, also called copy-move forgery detection. It can effectively detect forgery image. Firstly, the SIFT algorithm is proposed to extract feature points from the pre-processing image. Subsequently, the nearest-neighbor (2NN) test, adaptive Euclidean distance and Random sample consensus (RANSAC) are applied to remove most of the mismatched feature points and get the candidate inlier matches. The affine matrixes based on the RANSAC are obtained by the candidate inlier matches. Then, Radial Harmonic Fourier Moments is proposed to extract invariances of the candidate inlier matches in circle blocks. The propagated criterion is calculated by affine matrix and circular feature of the inlier matches. The Simple Linear Iterative Clustering (SLIC) is presented to segment the host image into texture patches. Like pixel propagating, the circular block is slid in the corresponding texture blocks that the texture blocks contain the corresponding inlier matches to get more corresponding matches. Finally, some geometric image operations, such as dilation, are employed to eliminate the small holes or isolated pixels. A series of experiments showed that the proposed fusion algorithm can achieve superior performances than those of the moment invariant algorithms under various geometric transformations.

 

References: 23

1. R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Süsstrunk, "SLIC Superpixels Compared to State-of-The-Art Superpixel Methods," IEEE transactions on pattern analysis and machine intelligence, vol. 34, no. 11, pp. 2274-2282, 2012.
2. I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, "A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no.3, pp. 1099-1110, 2011.
3. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, "Copy-Move Forgery Detection and Localization By Means Of Robust Clustering With J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.
4. E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-Move Forgery Detection by Matching Triangles of Keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084-2094, 2015.
5. V. Christlein, C. Riess, and E. Angelopoulou, "A Study On Features for The Detection Of Copy-Move Forgeries," in Sicherheit, vol. 2010, pp. 105-116, 2010.
6. V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An Evaluation of Popular Copy-Move Forgery Detection Approaches," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.
7. M. Emam, Q. Han, and X. M. Niu, "PCET Based Copy-Move Forgery Detection in Images Under Geometric Transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, 2016.
8. A. J. Fridrich, B. D. Soukal, and A. J. Lukáš, "Detection of Copy-Move Forgery In Digital Images," in Proceedings of Digital Forensic Research Workshop, 2003.
9. H. Huang, W. Guo, and Y. Zhang, "Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm," in Proceedings of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272-276, 2008.
10. T. Huynh-Kha, T. Le-Tien, S. Ha-Viet-Uyen, and K. Huynh-Van, "The Efficiency of Applying DWT And Feature Extraction Into Copy-Move Images Detection," in Proceedings of 2015 International Conference on Advanced Technologies for Communications (ATC), pp. 44-49, 2015.
11. X. Kang and S. Wei, "Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics," in Proceedings of 2008 International Conference on Computer Science and Software Engineering, vol. 3, pp. 926-930, 2008.
12. W. Luo, J. Huang, and G. Qiu, "Robust Detection of Region-Duplication Forgery In Digital Image," in Proceedings of 18th International Conference on Pattern Recognition, vol. 4, pp. 746-749, 2006.
13. A. C. Popescu and H. Farid, "Exposing Digital Forgeries by Detecting Traces Of Resampling," IEEE Transactions on signal processing, vol. 53, no. 2, pp. 758-767, 2005.
14. C. M. Pun, X. C. Yuan, and X. L. Bi, "Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, 2015.
15. J. Qin, F. Li, L. Xiang, and C. Yin, "Detection of Image Region Copy-Move Forgery Using Radial Harmonic Fourier Moments," Journal of Image & Graphics, vol. 18, pp. 919-923, 2013.
16. B. Shivakumar and L. D. S. S. Baboo, "Detection of Region Duplication Forgery In Digital Images Using SURF," International Journal of Computer Science Issues, vol. 8, no. 4, pp. 199-205, 2011.
17. P. WANG, N. CAO, X.-c. CAO, and J.-f. OUYANG, "Fast Random Sample Consensus Based on Cross Ratio Invariance," Journal of Tianjin University, vol. 2, p. 017, 2011.
18. Y. Wo, K. Yang, G. Han, H. Chen, and W. Wu, "Copy–Move Forgery Detection Based On Multi-Radius PCET," IET Image Processing,vol. 11, no.2, pp. 99-108, 2016.
19. M. Zandi, A. Mahmoudi-Aznaveh, and A. Talebpour, "Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector," IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2499-2512, Nov 2016.
20. F. Zhao, R. Zhang, H. Guo, and Y. Zhang, "Effective Digital Image Copy-Move Location Algorithm Robust To Geometric Transformations," in Proceedings of 2015 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, 2015.
21. J. Zheng, Y. Liu, J. Ren, T. Zhu, Y. Yan, and H. Yang, "Fusion of Block And Keypoints Based Approaches For Effective Copy-Move Image Forgery Detection," Multidimensional Systems and Signal Processing, vol. 27, no. 4, pp. 989-1005, 2016.
22. J. Zhong, Y. Gan, and S. Xie, "Radon Odd Radial Harmonic Fourier Moments In Detecting Cloned Forgery Image," Chaos, Solitons & Fractals, vol. 89, pp. 115-129, 2016.
23. J. Zhong, Y. Gan, J. Young, and P. Lin, "Copy Move Forgery Image Detection via Discrete Radon and Polar Complex Exponential Transform-Based Moment Invariant Features," International Journal of Pattern Recognition and Artificial Intelligence,vol. 31, no. 2, p. 1754005, 2017.

 

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

 

 

Attachments:
Download this file (IJPE-2018-01-12.pdf)IJPE-2018-01-12.pdf[A Duplicated Forgery Detection Fusion Algorithm using SIFT and Radial-Harmonic Fourier Moments]795 Kb
 
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com