Skip to main content
Log in

Detection of copy–move forgery using discrete analytical Fourier–Mellin transform

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In recent years, digital image processing has become commonplace with growing powerful and available image editing software. People without any professional technique can also manipulate and forge digital images easily. One of the most popular manners of digital image forgeries is the copy–move image forgery. Extensive researches in detecting copy–move forgery have made a deal of achievements, but most presented methods based on these researches have been only focus on some simple composite forgeries and not able to detect different types of post-processed forgeries. In this paper, we aim to deal with the post-processed forgery operations and scenarios, mainly geometric distortion. We introduce analytical Fourier–Mellin transform (AFMT) and focus on its discretization. We propose discrete analytical Fourier–Mellin transform (DAFMT). We also pay attention to high performance of DAFMT in detecting the copy–move image forgeries. Due to the AFMT described in polar coordinate, so we need to convert coordinate system from polar to Cartesian coordinates. To be computed conveniently, we define an auxiliary disk template to accomplish this conversion. We devote to the use of our proposed DAFMT in detection of image forgeries. A great deal of researches and experiments show that the proposed DAFMT can effectively resist translation, rotation, scaling, and added Gaussian noise operations. Compared with other relevant up-to-date methods, experiments also prove that DAFMT has made a progress in detecting and identifying the forgery images which are suffered from geometric distortion operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  2. Kakar, P., Sudha, N.: Detecting copy-paste forgeries using transform-invariant features. In: Proceedings of the International Symposium on Consumer Electronics, pp: 58–61

  3. Fridrich, J., Soukal, D., Lukás, J.: Authentication of copy-move forgery in digital images. In: Proceedings of the Digital Forensic Research Workshop, pp. 55–61 (2003)

  4. Popescu, A.C.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Signal Process. 53(2), 758–767 (2005)

    Article  MathSciNet  Google Scholar 

  5. He, K.X., Wang, Q., Xiao, Y.C., He, F., Wang, X.B.: A denoising algorithm based on nonsubsampled contourlet transform and two-dimensional principle component analysis. In: Proceedings of the 3rd International Conference on Computer Technology and Development (ICCTD), pp. 261–267 (2011)

  6. Kashyap, A., Joshi, S.D.: Detection of copy-move forgery using wavelet decomposition. In: Proceedings of the International Conference on Signal Processing and Communication (ICSC), pp. 396–400 (2013)

  7. Ghorbani, M., Firouzmand, M., Faraahi, A.: DWT-DCT (QCD) based copy-move image forgery detection. In: 18th International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 1–4 (2011)

  8. Hu, M.K.: Visual pattern recognition by moment invariants. IEEE Trans. Info. Theory 8(2), 179–187 (1962)

    Article  MATH  Google Scholar 

  9. Liao, S., Pawlak, M.: On the accuracy of Zernike moments for image analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(12), 1358–1364 (1998)

    Article  Google Scholar 

  10. Yap, P.T., Jiang, X.D., Kot, A.C.: Two-dimensional polar harmonic transforms for invariant image representation. IEEE Trans. Pattern Anal. Mach. Intell. 32(7), 1260–1270 (2010)

    Google Scholar 

  11. Amerini, I., Ballan, L., Caldelli, R., Bimbo, A.D.: A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Info. Forensics Secur. 6(9), 1099–1110 (2011)

    Article  Google Scholar 

  12. Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1053–1056 (2009)

  13. Jothimani, S., Betty, P.: Image authentication using global and local features. In: International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), pp. 1–5 (2014)

  14. Zhao, Y.J., Belkasim, S.: Improving stability and invariance of Cartesian Zernike moments. In: Proceedings of the Southwest Symposium on Image Analysis and Interpretation (SSIAI), pp. 61–64 (2012)

  15. Ryu, S.J., Kirchner, M., Lee, M.J., Lee, H.K.: Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans. Info. Forensics Secur. 8(8), 1355–1370 (2013)

    Article  Google Scholar 

  16. Li, L.D., Li, S.S., Wang, J.: Copy-move forgery detection based on PHT. In: Proceedings of the World Congress on Information and Communication Technologies (WICT), pp. 1061–1065 (2012)

  17. Li, Y.N.: Quaternion polar harmonic transforms for color images. IEEE Signal Process. Lett. 20(8), 803–807 (2013)

    Article  Google Scholar 

  18. Urooj, S., Singh, S.P.: Rotation invariant detection of benign and malignant masses using pht. In: Proceedings of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1627-1632 (2015)

  19. Zhou L.N., Guo Y.B., You X.G.: Blind copy-paste detection using improved SIFT ring descriptor. In: Proceeding of 10th International Workshop, Digital Forensics and Watermarking (IWDW), pp. 257–267 (2011)

  20. Sellami, M., Ghorbe, F.: An invariant similarity registration algorithm based on the analytical Fourier–Mellin transform. In: Proceedings of the 20th European Signal Processing Conference (EUSIPCO), pp. 390–394 (2012)

  21. Luo, W.Q., Huang, J.W., Qiu, G.P.: Robust detection of region duplication forgery in digital image. Chin. J. Comput. 30(11), 1998–2007 (2007)

    Google Scholar 

  22. Kakar, P., Sudha, N.: Exposing post processed copy-paste forgeries through transform-invariant features. IEEE Trans. Info. Forensics Secur. 7(3), 1018–1028 (2012)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the 2014 Guangdong Province Young Innovative Talent (Natural Science) Class Project Fund (No. 2014KQNCX256), Guangdong Province College Students’ Science and Technology Innovation Cultivation Project Fund (No. pdjh2015b0642), and Guangdong Mechanical & Electrical College 2015 Technology Plan Projects (Natural Science) Class Project Fund (No. YJKJ2015-1). The authors are grateful for this support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanfen Gan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhong, J., Gan, Y. Detection of copy–move forgery using discrete analytical Fourier–Mellin transform. Nonlinear Dyn 84, 189–202 (2016). https://doi.org/10.1007/s11071-015-2374-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-015-2374-9

Keywords

Navigation