access icon free Image copy-move forgery detection algorithm based on ORB and novel similarity metric

Image forgery poses a serious threat in electric power, medicine and other fields. Relevant departments need to pay a great price to identify the authenticity of the image. For traditional copy-move forgery image detection, the existing methods have at least two problems: low robustness and poor matching caused by a low number of feature points. Here, a novel similarity metric combining cosine and Jaccard is proposed to improve feature matching, which combines with oriented features from accelerated segment test and rotated binary robust independent elementary features (ORB) feature extraction to realise effective and fast image forgery detection. First, the image is divided into overlapping blocks, and ORB is used to extract the feature points of each image block to obtain the text information. Second, the novel similarity metric is used to calculate similarity and match the text. Finally, two image blocks with the highest similarity are located. The experimental results show that, on the one hand, ORB can greatly lessen detection time. On the other hand, the novel similarity metric can improve the poor matching caused by the small number of feature points. Combining the two methods can exhibit high robustness to translation, rotation, noise, illumination and JPEG compression.

Inspec keywords: image forensics; image segmentation; image matching; feature extraction

Other keywords: image authenticity; rotated binary robust independent elementary features feature extraction; novel similarity metric combining cosine; ORB feature extraction; JPEG compression; copy-move forgery image detection; accelerated segment testing; feature matching; Jaccard; image copy-move forgery detection algorithm

Subjects: Image recognition; Computer vision and image processing techniques

References

    1. 1)
      • 3. Huiying, C., Daxing, Z., Shanshan, Y., et al: ‘Multi-region copy-and-paste tamper detection based on SURF’, Comput. Eng. Des., 2018, v.39No.380, (8), pp. 201205.
    2. 2)
      • 24. Irshad, M., Muhammad, N., Sharif, M., et al: ‘Automatic segmentation of the left ventricle in a cardiac mr short axis image using blind morphological operation’, European Phys. J. Plus, 2018, 133, (4), p. 148.
    3. 3)
      • 29. Zhu, Y., Shen, X., Chen, H.: ‘Copy-move forgery detection based on scaled orb’, Multimedia Tools Appl., 2016, 75, (6), pp. 32213233.
    4. 4)
      • 30. Powers, D.M.: ‘Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation’, J. Mach. Learn. Technol., 2011, 2, (1), pp. 3763.
    5. 5)
      • 16. Rosten, E., Drummond, T.: ‘Machine learning for high-speed corner detection’. European Conference on Computer Vision, Graz, Austria, May 2006, pp. 430443.
    6. 6)
      • 5. Abbas, A., Ghuffar, S.: ‘Robust feature matching in terrestrial image sequences’, Int. Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences, 2018, 42, (3), pp. 37.
    7. 7)
      • 1. Walia, S., Kumar, K.: ‘Digital image forgery detection: a systematic scrutiny’, Aust. J. Forensic Sci., 2019, 51, (5), pp. 488526.
    8. 8)
      • 17. Calonder, M., Lepetit, V., Strecha, C., et al: ‘Brief: binary robust independent elementary features’. European Conference on Computer Vision, Hersonissos, Greece, September 2010, pp. 778792.
    9. 9)
      • 13. Rublee, E., Rabaud, V., Konolige, K., et al: ‘Orb: an efficient alternative to SIFT or SURF’. Int. Conference on Computer Vision, Barcelona, Spain, November 2011, pp. 25642571.
    10. 10)
      • 15. Bay, H., Tuytelaars, T., Van-Gool, L.: ‘SURF: speeded up robust features’. European Conference on Computer Vision, Graz, Austria, May 2006, pp. 404417.
    11. 11)
      • 10. Wenbo, X., Zhichun, D.: ‘Digital image copying and pasting tampering for evidence’, Comput. Sci., 2019, 46, (6A), pp. 380384.
    12. 12)
      • 11. Chen, C.C., Lu, W.Y., Chou, C.H.: ‘Rotational copy-move forgery detection using SIFT and region growing strategies’, Multimedia Tools Appl., 2019, 78, (13), pp. 1829318308.
    13. 13)
      • 8. Hosny, K.M., Hamza, H.M., Lashin, N.A.: ‘Copy-for-duplication forgery detection in colour images using QPCETMs and sub-image approach’, IET Image Process., 2019, 13, (9), pp. 14371446.
    14. 14)
      • 28. Kudke, S.H., Gawande, A.: ‘Copy-move attack forgery detection by using SIFT’, Int. J. Innov. Technol. Explor. Eng. (IJITEE), 2013, 2, (5), pp. 221224.
    15. 15)
      • 23. Xing, T., Jin, Z., Zuping, Z.: ‘Jaccard similarity algorithm based on word vector’, Comput. Sci., 2018, 45, (7), pp. 192195.
    16. 16)
      • 25. Wang, H., Oliensis, J.: ‘Generalizing edge detection to contour detection for image segmentation’, Comput. Vis. Image Underst., 2010, 114, (7), pp. 731744.
    17. 17)
      • 22. Binyu, W., Wenfen, L., Xuexian, H., et al: ‘Text clustering based on cosine distance selection of initial cluster center’, Comput. Eng. Applic., 2018, 54, (10), pp. 1118.
    18. 18)
      • 21. Likavec, S., Lombardi, I., Cena, F.: ‘Sigmoid similarity-a new feature-based similarity measure’, Inf. Sci., 2019, 481, pp. 203218.
    19. 19)
      • 18. Jian, C., Xiang, X., Zhang, M.: ‘Mobile terminal gesture recognition based on improved fast corner detection’, IET Image Process., 2019, 13, (6), pp. 991997.
    20. 20)
      • 14. Lowe, D.G.: ‘Distinctive image features from scale-invariant keypoints’, Int. J. Comput. Vis., 2004, 60, (2), pp. 91110.
    21. 21)
      • 4. Dou, J., Qin, Q., Tu, Z.: ‘Robust image matching based on the information of SIFT’, Optik, 2018, 171, pp. 850861.
    22. 22)
      • 9. Jiming, Z., Yuyan, C., Jinling, G., et al: ‘Image tamper detection method using DWT and ORB’, Comput. Eng. Applic., 2017, 53, (11), pp. 187191.
    23. 23)
      • 19. Kui, W., Baisong, L.: ‘A review of text classification research’, Data Commun., 2019, 40, (3), pp. 3747.
    24. 24)
      • 12. Ying, S.: ‘Research on image feature point extraction and description algorithm’, Inf. Secur. Technol., 2016, 7, (2), pp. 1821.
    25. 25)
      • 2. Yuqing, Y., Xiaohui, Q.: ‘Image copy-paste tampering detection based on SIFT and k-means’, Comput. Technol. Develop., 2018, v.28No.254, (6), pp. 127130.
    26. 26)
      • 20. Erjing, C., Enbo, J.: ‘A review of text similarity calculation methods’, Data Anal. Knowl. Discov., 2017, 1, (6), pp. 111.
    27. 27)
      • 31. Christlein, V., Riess, C., Jordan, J., et al: ‘An evaluation of popular copy-move forgery detection approaches’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (6), pp. 18411854.
    28. 28)
      • 7. Ying, Y., Zhen, F.: ‘Copy-paste tamper detection under repeated pattern scenes’, Electron. Meas. Technol., 2018, 41, (24), pp. 9499.
    29. 29)
      • 27. Amerini, I., Ballan, L., Caldelli, R., et al: ‘A SIFT-based forensic method for copy–move attack detection and transformation recovery’, IEEE Trans. Inf. Forensics Sec., 2011, 6, (3), pp. 10991110.
    30. 30)
      • 6. Ling, G., Kai, W.: ‘Replication and paste tamper detection algorithm based on HSV and HE’, J. Chongqing Univ. Posts Telecommun. (Natural Sci. Edn.), 2019, 31, (3), pp. 400406.
    31. 31)
      • 26. Everingham, M., Eslami, S.M.A., Gool, L.V., et al: ‘The pascal visual object classes challenge: a retrospective’, Int. J. Comput. Vis., 2015, 111, (1), pp. 98136.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2019.1145
Loading

Related content

content/journals/10.1049/iet-ipr.2019.1145
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading