373
Views
12
CrossRef citations to date
0
Altmetric
Research Article

Salient keypoint-based copy–move image forgery detection

ORCID Icon & ORCID Icon
Pages 331-354 | Received 04 Aug 2021, Accepted 30 Nov 2021, Published online: 12 Jan 2022

References

  • Abd Warif NB, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, Choo -K-KR. Copy-move forgery detection: survey, challenges and future directions. J Network Comput Appl. 2016;75:259–278.
  • Meenpal T. DWT-based blind and robust watermarking using spiht algorithm with applications in tele-medicine. S¯adhan¯a. 2018;43(1):4.
  • Subhedar MS, Mankar VH. Current status and key issues in image steganography: a survey. Comput Sci Rev. 2014;13:95–113. doi:10.1016/j.cosrev.2014.09.001
  • Asghar K, Habib Z, Hussain M. Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci. 2017;49(3):281–307. doi:10.1080/00450618.2016.1153711
  • Uijlings JR, Van De Sande KE, Gevers T, Smeulders AW. Selective search for object recognition. Int J Comput Vis. 2013;104(2):154–171. doi:10.1007/s11263-013-0620-5
  • Zheng L, Zhang Y, Thing VL. A survey on image tampering and its detection in real-world photos. J Visual Commun Image Represent. 2019;58:380–399. doi:10.1016/j.jvcir.2018.12.022
  • Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur. 2012a;7(6):1841–1854.
  • Fridrich AJ, Soukal BD, Lukáš AJ. Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop; 2003.
  • Cao Y, Gao T, Fan L, Yang Q. A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int. 2012;214(1–3):33–43. doi:10.1016/j.forsciint.2011.07.015
  • Zhao J, Guo J. Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int. 2013;233(1–3):158–166. doi:10.1016/j.forsciint.2013.09.013
  • Shao H, Yu T, Xu M, Cui W. Image region duplication detection based on circular window expansion and phase correlation. Forensic Sci Int. 2012;222(1–3):71–82. doi:10.1016/j.forsciint.2012.05.002
  • Zhang J, Feng Z, Su Y. A new approach for detecting copy-move forgery in digital images. 2008 11th IEEE Singapore International Conference on Communication Systems; 2008. p. 362–366.
  • Bin Y, Xingming S, Xianyi C, Zhang J, Xu L. An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radioengineering. 2013;22(4).
  • Muhammad G, Hussain M, Bebis G. Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Invest. 2012;9(1):49–57. doi:10.1016/j.diin.2012.04.004
  • Peng F, Nie Y-Y, Long M. A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Sci Int. 2011;212(1–3):e21–e25. doi:10.1016/j.forsciint.2011.06.011
  • Lee J-C, Chang C-P, Chen W-K. Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci. 2015;321:250–262. doi:10.1016/j.ins.2015.03.009
  • Ryu S-J, Kirchner M, Lee M-J, Lee H-K. Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur. 2013;8(8):1355–1370. doi:10.1109/TIFS.2013.2272377
  • Cozzolino D, Poggi G, Verdoliva L. Efficient dense-field copy–move forgery detection. IEEE Trans Inf Forensics Secur. 2015;10(11):2284–2297. doi:10.1109/TIFS.2015.2455334
  • Hayat K, Qazi T. Forgery detection in digital images via discrete wavelet and discrete cosine transforms. Comput Electr Eng. 2017;62:448–458. doi:10.1016/j.compeleceng.2017.03.013
  • Mahmood T, Mehmood Z, Shah M, Saba T. A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. J Visual Commun Image Represent. 2018;53:202–214. doi:10.1016/j.jvcir.2018.03.015
  • Soni B, Das PK, Thounaojam DM. Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features. J Inf Secur Appl. 2019;45:44–51. doi:10.1016/j.jisa.2019.01.007
  • Meena KB, Tyagi V. A copy-move image forgery detection technique based on tetrolet transform. J Inf Secur Appl. 2020;52:102481. doi:10.1016/j.jisa.2020.102481
  • Cozzolino D, Poggi G, Verdoliva L. Copy-move forgery detection based on patchmatch. 2014 IEEE International Conference on Image Processing (ICIP); 2014. p. 5312–5316.
  • Wang X-Y, Jiao L-X, Wang X-B, Yang H-Y, Niu P-P. Copy-move forgery detection based on compact color content descriptor and delaunay triangle matching. Multimedia Tools Appl. 2019;78(2):2311–2344.
  • Pan X, Lyu S. Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur. 2010;5(4):857–867. doi:10.1109/TIFS.2010.2078506
  • Ardizzone E, Bruno A, Mazzola G. Copy–move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur. 2015;10(10):2084–2094. doi:10.1109/TIFS.2015.2445742
  • Isaac MM, Wilscy M. Copy-move forgery detection based on Harris corner points and brisk. Proceedings of the Third International Symposium on Women in Computing and Informatics; 2015. p. 394–399.
  • Niyishaka P, Bhagvati C. Copy-move forgery detection using image blobs and brisk feature. Multimedia Tools Appl. 2020;79(35):26045–26059. doi:10.1007/s11042-020-09225-6
  • Zhu Y, Shen X, Chen H. Copy-move forgery detection based on scaled ORB. Multimedia Tools Appl. 2016;75(6):3221–3233. doi:10.1007/s11042-014-2431-2
  • Yang F, Li J, Lu W, Weng J. Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell. 2017;59:73–83. doi:10.1016/j.engappai.2016.12.022
  • Dhivya S, Sangeetha J, Sudhakar B. 2020. Copy-move forgery detection using surf feature extraction and svm supervised learning technique. Soft Comput:1–12.
  • Meena KB, Tyagi V. A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms. Multimedia Tools Appl. 2020b;79(11):8197–8212. doi:10.1007/s11042-019-08343-0
  • Uma S, Sathya PD. 2020. Copy-move forgery detection of digital images using football game optimization. Aust J Forensic Sci:1–22.
  • Bi X, Pun C-M. Fast copy-move forgery detection using local bidirectional coherency error refinement. Pattern Recognit. 2018;81:161–175. doi:10.1016/j.patcog.2018.03.028
  • Yang J, Liang Z, Gan Y, Zhong J. A novel copy-move forgery detection algorithm via two-stage filtering. Digital Signal Process. 2021;113:103032. doi:10.1016/j.dsp.2021.103032
  • Buoncompagni S, Maio D, Maltoni D, Papi S. Saliency-based keypoint selection for fast object detection and matching. Pattern Recognit Lett. 2015;62:32–40. doi:10.1016/j.patrec.2015.04.019
  • Lowe DG. Object recognition from local scale-invariant features. Proceedings of the Seventh IEEE International Conference on Computer Vision; 1999. Vol. 2, p. 1150–1157.
  • Alcantarilla PF, Bartoli A, Davison AJ. KAZE features. In: Fitzgibbon A, Lazebnik S, Perona P, Sato Y, Schmid C, editors. Computer vision – eccv 2012. Berlin (Heidelberg): Springer; 2012. p. 214–227.
  • Mukherjee P, Lall B. Saliency and KAZE features assisted object segmentation. Image Vis Comput. 2017;61:82–97. Available from: https://www.sciencedirect.com/science/article/pii/S0262885617300537
  • Verma A, Meenpal T, Acharya B. Object proposals based on variance measure. In: Das AK, Nayak J, Naik B, Pati SK, Pelusi D, editors. Computational intel licence in pattern recognition. Singapore: Springer Singapore; 2020. p. 307–320.
  • Tralic D, Zupancic I, Grgic S, Grgic M. Comofod—new database for copy-move forgery detection. Proceedings ELMAR-2013; 2013. p. 49–54.
  • Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G. A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur. 2011;6(3):1099–1110. doi:10.1109/TIFS.2011.2129512
  • Hashmi MF, Anand V, Keskar AG. Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. Aasri Procedia. 2014;9:84–91.
  • Liu Y, Guan Q, Zhao X. Copy-move forgery detection based on convolutional kernel network. Multimedia Tools Appl. 2018;77(14):18269–18293. doi:10.1007/s11042-017-5374-6
  • Niyishaka P, Bhagvati C. Digital image forensics technique for copy-move forgery detection using DOG and ORB. International conference on computer vision and graphics; 2018. p. 472–483.
  • Ojeniyi JA, Adedayo BO, Ismaila I, Shafi’i AM. Hybridized technique for copy-move forgery detection using discrete cosine transform and speeded-up robust feature techniques. Int J Image Graphics Signal Process. 2018;11(4):22. doi:10.5815/ijigsp.2018.04.03
  • Soni B, Das PK, Thounaojam DM. Keypoints based enhanced multiple copy- move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm. IET Image Process. 2018;12(11):2092–2099. doi:10.1049/iet-ipr.2018.5576
  • El Biach FZ, Iala I, Laanaya H, Minaoui K. 2021. Encoder-decoder based convolutional neural networks for image forgery detection. Multimedia Tools Appl:1–18.
  • Mahmood T, Mehmood Z, Shah M, Khan Z. An efficient forensic technique for exposing region duplication forgery in digital images. Appl Intell. 2018;48(7):1791–1801. doi:10.1007/s10489-017-1038-5
  • Malviya AV, Ladhake SA. Pixel based image forensic technique for copy-move forgery detection using auto color correlogram. Procedia Comput Sci. 2016;79:383–390. doi:10.1016/j.procs.2016.03.050
  • Soni B, Das PK, Thounaojam DM. Copy-move tampering detection based on local binary pattern histogram Fourier feature. Proceedings of the 7th International Conference on Computer and Communication Technology; 2017. p. 78–83.
  • Zandi M, Mahmoudi-Aznaveh A, Talebpour A. Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur. 2016;11(11):2499–2512. doi:10.1109/TIFS.2016.2585118

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.