Skip to main content

Comparison of Matching Methods for Copy-Move Image Forgery Detection

  • Conference paper
  • First Online:
9th International Conference on Robotic, Vision, Signal Processing and Power Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 398))

Abstract

Copy-Move is one of the most common image forgery types, where a region of an image is copied and pasted into another location of the same image. Such a forgery is simple to achieve but hard to be detected as the pasted region shares the same characteristics with the image. Although plenty of algorithms have been proposed to tackle the copy-move detection problem, those algorithms differ in two things; matching method and type of features. In this paper, we focus on analyzing and comparing four matching methods in terms of accuracy and robustness against different image processing operations. Such analysis and comparison provide indispensable information for the design of new accurate and reliable copy-move detection techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mahdian B, Saic S (2010) A bibliography on blind methods for identifying image forgery. Signal Process: Image Commun 25:389–399

    Google Scholar 

  2. Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multim Tools Appl 51:133–162

    Article  Google Scholar 

  3. Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231:284–295

    Article  Google Scholar 

  4. Kim HS, Lee HK (2003) Invariant image watermark using zernike moments. IEEE Trans Circuits Syst Video Technol 13:766–775

    Article  Google Scholar 

  5. Teh CH, Chin RT (1988) On image analysis by the methods of moments. IEEE Trans Pattern Anal Mach Intell 10:496–513

    Article  MATH  Google Scholar 

  6. Bravo-Solorio S, Nandi AK (2011) Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Process 91:1759–1770

    Article  MATH  Google Scholar 

  7. Al-Qershi OM, Khoo BE (2014) Enhanced matching method for copy-move forgery detection by means of zernike moments. In: Digital-forensics and watermarking. Springer, pp 485–497

    Google Scholar 

  8. Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265

    Article  Google Scholar 

  9. Bentley JL (1975) Multidimensional binary search trees used for associative searching. Commun ACM 18:509–517

    Article  MATH  Google Scholar 

  10. Shivakumar B, Baboo LDSS (2011) Detection of region duplication forgery in digital images using surf. IJCSI Int J Comput Sci Issues 8

    Google Scholar 

  11. Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: The 3rd Canadian conference on computer and robot vision, 2006. IEEE, pp 64–64

    Google Scholar 

  12. Indyk P, Motwani R (1998) Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, ACM, pp 604–613

    Google Scholar 

  13. Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on zernike moments. IEEE Trans Inf Forensics Secur 8:1355–1370

    Article  Google Scholar 

  14. Li Y (2013) Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci Int 224:59–67

    Article  Google Scholar 

  15. Ryu SJ, Lee MJ, Lee HK (2010) Detection of copy-rotate-move forgery using zernike moments. In: Information hiding. Springer, pp 51–65

    Google Scholar 

Download references

Acknowledgments

The authors would like to acknowledge the financial assistance provided by Ministry of Education Malaysia through FRGS grant number 203/PELECT/6071305.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Osamah M. Al-Qershi or Bee Ee Khoo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Al-Qershi, O.M., Khoo, B.E. (2017). Comparison of Matching Methods for Copy-Move Image Forgery Detection. In: Ibrahim, H., Iqbal, S., Teoh, S., Mustaffa, M. (eds) 9th International Conference on Robotic, Vision, Signal Processing and Power Applications. Lecture Notes in Electrical Engineering, vol 398. Springer, Singapore. https://doi.org/10.1007/978-981-10-1721-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1721-6_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1719-3

  • Online ISBN: 978-981-10-1721-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics