Abstract:Most of the existing region duplication detection algorithms are not robust to the post processing and have high time complexity. Therefore, an efficient and robust algorithm is proposed for detecting and localizing malicious tampering. The dimension of image is firstly reduced by DWT, and the geometric moment is applied to the fixed sized overlapping blocks of low-frequency in wavelet sub-band. Then, the eigenvectors are lexicographically sorted. Finally, the experimental threshold value and mathematical morphology operations are performed to locate the tampered part. The experimental results show that the proposed algorithm successfully detects the tampered image with various post region duplication image processing, including noise contamination and JPEG compression. Furthermore, the proposed algorithm reduces the total number of blocks to decrease time complexity.
王俊文,刘光杰,戴跃伟,王执铨. 一种检测图像Copy-Move篡改鲁棒算法*[J]. 模式识别与人工智能, 2009, 22(4): 630-634.
WANG Jun-Wen, LIU Guang-Jie, DAI Yue-Wei, WANG Zhi-Quan. A Robust Algorithm for Detecting Image Copy-Move Forgery. , 2009, 22(4): 630-634.
[1] Luo Weiqi, Qu Zhenhua, Pan Feng, et al. A Survey of Passive Technology for Digital Image Forensics. Frontiers of Computer Science in China, 2007, 1(2): 166-179 [2] Swaminathan A, Mao Yinian, Wu Min. Robust and Secure Image Hashing. IEEE Trans on Information Forensics and Security, 2006, 1(2): 215-230 [3] Popescu A C, Farid H. Exposing Digital Forgeries by Detecting Duplicated Image Regions. Technical Report, TR2004-515, Hanover, USA: Dartmouth College. Department of Computer Science, 2004 [4] Fridrich J, Soukal D, Lukas J. Detection of Copy-Move Forgery in Digital Images [EB/OL]. [2003-08-06]. http://www.ws.binghamton.edu/fridrich/Research/copymove.pdf [5] Luo Weiqi, Huang Jiwu, Qiu Guoping. Robust Detection of Region-Duplication Forgery in Digital Image. Chinese Journal of Computers, 2007, 30(11): 1998-2007 (in Chinese) (骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术.计算机学报, 2007, 30(11): 1998-2007) [6] Hu M K. Visual Pattern Recognition by Moment Invariants. IRE Trans on Information Theory, 1962, 8(2): 179-187