Abstract

Image forensic analysis becomes a major role in the field of digital image security due to tampering and forgery. The image forgery violates the authenticity and ownership of digital images. Copy-move forgery considers a significant kind of image forensic analysis algorithm. In this kind, the forger copies a part of an original image and then pastes it into the selected position from the same image. The purpose of forgery is to hide or highlight a specific region of the original image. To detect copy-move forgery, there are two traditional techniques: block-based and keypoint-based. The main drawback of the keypoint-based technique is the insufficient features for the small and flat regions, which causes undetected forgery. In contrast, the block-based technique has intensive processing. Therefore, this paper proposes a robust scheme that overcomes the drawbacks of the above techniques and maintains their advantages. This scheme adopts three connected stages, the first detects the initial duplicated regions using the SURF-HOG detector and descriptor. Subsequently, the second stage localizes the primary matched regions by SLIC segmentation and then selects the suspicious neighbor regions to be combined with primary regions to obtain the active regions. In the third stage, the block-based technique adopts overlapping Zernike moments to extract sufficient key points from the produced active regions. In the final stage, the duplicated regions are classified into authentic or forged regions. The proposed scheme provides not only forgery detection but also localization and recognition for the duplicated regions. The experimental results show that the proposed scheme is fast and has high accuracy for forgery detection and localization, at least 93.75, and 7.25 in terms of True Positive and False Positive Rates. Moreover, the scheme has high robustness under various conditions and attacks such as geometric transformation attacks and compound photometric attacks. The proposed scheme can be used in sensitive applications such as cybercrime detection and adopted as evidence in the courts.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call