SMDAF: A novel keypoint based method for copy-move forgery detection

被引:4
|
作者
Yue, Guangyu [1 ,3 ]
Duan, Qing [1 ,2 ]
Liu, Renyang [3 ,4 ]
Peng, Wenyu [1 ,3 ]
Liao, Yun [1 ,2 ]
Liu, Junhui [1 ,2 ]
机构
[1] Yunnan Univ, Natl Pilot Sch Software, Kunming 650000, Yunnan, Peoples R China
[2] Yunnan Univ, Key Lab Software Engn Yunnan Prov, Kunming, Yunnan, Peoples R China
[3] Yunnan Univ, Engn Res Ctr Cyberspace, Kunming, Yunnan, Peoples R China
[4] Yunnan Univ, Sch Informat Sci & Engn, Kunming, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
46;
D O I
10.1049/ipr2.12578
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Copy-move forgery poses a significant threat to social life and has aroused much attention in recent years. Although many copy-move forgery detection (CMFD) methods have been proposed, the most existing CMFD methods are short of adaptability in detecting images, which leads to the limitation on detection effects. To solve this problem, the paper proposes a novel keypoint-based CMFD method: second-keypoint matching and double adaptive filtering (SMDAF). Motivated by image matching based on keypoint, the second-keypoint matching method is designed to match keypoints extracted from copy-move forgery images, which can be used for both the single-CMFD and the multiple-CMFD. Then, a double adaptive filter (DAF) based on the AdaLAM algorithm and the KANN-DBSCAN clustering algorithm to filter wrong keypoint matches adaptively are proposed, according to the distinct distribution of keypoints in each image. Finally, the forgery regions are presented by finding their convex hulls and padding them. Compared with existing methods, extensive experiments show that the SMDAF method significantly provides more efficiency in detecting images under simulated real-world conditions, has better robustness when facing images with different post-treatment attacks, and is more effective in distinguishing images that look copy-move forged but are real.
引用
收藏
页码:3589 / 3602
页数:14
相关论文
共 50 条
  • [31] Copy-move forgery detection using adaptive keypoint filtering and iterative region merging
    Jun-Liu Zhong
    Chi-Man Pun
    Multimedia Tools and Applications, 2019, 78 : 26313 - 26339
  • [32] Copy-move forgery detection based on scaled ORB
    Zhu, Ye
    Shen, Xuanjing
    Chen, Haipeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (06) : 3221 - 3233
  • [33] Copy-move forgery detection based on hybrid features
    Yang, Fan
    Li, Jingwei
    Lu, Wei
    Weng, Jian
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 59 : 73 - 83
  • [34] Nonoverlapping Blocks Based Copy-Move Forgery Detection
    Sun, Yu
    Ni, Rongrong
    Zhao, Yao
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [35] Copy-Move Forgery Detection Based on Deep Learning
    Ouyang, Junlin
    Liu, Yizhi
    Liao, Miao
    2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,
  • [36] Image Copy-Move Forgery Detection Based on NSST
    Wan, Jing
    Li, Chaoyue
    Li, Zhi
    2019 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2019), VOL 1, 2019, : 217 - 220
  • [37] Copy move forgery detection based on keypoint and patch match
    Ke Liu
    Wei Lu
    Cong Lin
    Xinchao Huang
    Xianjin Liu
    Yuileong Yeung
    Yingjie Xue
    Multimedia Tools and Applications, 2019, 78 : 31387 - 31413
  • [38] Detection of copy-move forgery based on Gabor filter
    Yohannan, Raichel Philip
    Manuel, Manju
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 629 - 634
  • [39] CNN-Keypoint Based Two-Stage Hybrid Approach for Copy-Move Forgery Detection
    Diwan, Anjali
    Roy, Anil K.
    IEEE ACCESS, 2024, 12 : 43809 - 43826
  • [40] Copy-move forgery detection using adaptive keypoint filtering and iterative region merging
    Zhong, Jun-Liu
    Pun, Chi-Man
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) : 26313 - 26339