SMDAF: A novel keypoint based method for copy-move forgery detection

被引:4
|
作者
Yue, Guangyu [1 ,3 ]
Duan, Qing [1 ,2 ]
Liu, Renyang [3 ,4 ]
Peng, Wenyu [1 ,3 ]
Liao, Yun [1 ,2 ]
Liu, Junhui [1 ,2 ]
机构
[1] Yunnan Univ, Natl Pilot Sch Software, Kunming 650000, Yunnan, Peoples R China
[2] Yunnan Univ, Key Lab Software Engn Yunnan Prov, Kunming, Yunnan, Peoples R China
[3] Yunnan Univ, Engn Res Ctr Cyberspace, Kunming, Yunnan, Peoples R China
[4] Yunnan Univ, Sch Informat Sci & Engn, Kunming, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
46;
D O I
10.1049/ipr2.12578
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Copy-move forgery poses a significant threat to social life and has aroused much attention in recent years. Although many copy-move forgery detection (CMFD) methods have been proposed, the most existing CMFD methods are short of adaptability in detecting images, which leads to the limitation on detection effects. To solve this problem, the paper proposes a novel keypoint-based CMFD method: second-keypoint matching and double adaptive filtering (SMDAF). Motivated by image matching based on keypoint, the second-keypoint matching method is designed to match keypoints extracted from copy-move forgery images, which can be used for both the single-CMFD and the multiple-CMFD. Then, a double adaptive filter (DAF) based on the AdaLAM algorithm and the KANN-DBSCAN clustering algorithm to filter wrong keypoint matches adaptively are proposed, according to the distinct distribution of keypoints in each image. Finally, the forgery regions are presented by finding their convex hulls and padding them. Compared with existing methods, extensive experiments show that the SMDAF method significantly provides more efficiency in detecting images under simulated real-world conditions, has better robustness when facing images with different post-treatment attacks, and is more effective in distinguishing images that look copy-move forged but are real.
引用
收藏
页码:3589 / 3602
页数:14
相关论文
共 50 条
  • [21] Image copy-move forgery detection using sparse recovery and keypoint matching
    Hajialilu, Somayeh Fatan
    Azghani, Masoumeh
    Kazemi, Neda
    IET IMAGE PROCESSING, 2020, 14 (12) : 2799 - 2807
  • [22] COVERAGE A NOVEL DATABASE FOR COPY-MOVE FORGERY DETECTION
    Wen, Bihan
    Zhu, Ye
    Subramanian, Ramanathan
    Ng, Tian-Tsong
    Shen, Xuanjing
    Winkler, Stefan
    2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, : 161 - 165
  • [23] A Novel Fusion Algorithm for Copy-Move Forgery Detection
    Gan, Yanfen
    Chung, Jimlee
    Young, Janson
    2017 INTERNATIONAL CONFERENCE ON VIRTUAL REALITY AND VISUALIZATION (ICVRV 2017), 2017, : 203 - 204
  • [24] A copy-move forgery detection technique using DBSCAN-based keypoint similarity matching
    Mukherjee, Soumya
    Pal, Arup Kumar
    Maji, Soham
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024, 15 (12) : 5607 - 5634
  • [25] A Novel Segmentation Based Copy-Move Forgery Detection in Digital Images
    Resmi, M. R.
    Vishnukumar, S.
    2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 346 - 350
  • [26] A copy-move forgery detection method based on CMFD-SIFT
    Bin Yang
    Xingming Sun
    Honglei Guo
    Zhihua Xia
    Xianyi Chen
    Multimedia Tools and Applications, 2018, 77 : 837 - 855
  • [27] Detection of Copy-Move Forgery Based on One Improved LLE method
    Zhao Junhong
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 547 - 550
  • [28] A copy-move forgery detection method based on CMFD-SIFT
    Yang, Bin
    Sun, Xingming
    Guo, Honglei
    Xia, Zhihua
    Chen, Xianyi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 837 - 855
  • [29] An Image Copy-Move Forgery Detection Method Based on SURF and PCET
    Wang, Chengyou
    Zhang, Zhi
    Li, Qianwen
    Zhou, Xiao
    IEEE ACCESS, 2019, 7 : 170032 - 170047
  • [30] Copy-move forgery detection based on scaled ORB
    Ye Zhu
    Xuanjing Shen
    Haipeng Chen
    Multimedia Tools and Applications, 2016, 75 : 3221 - 3233