吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (01): 171-176.doi: 10.13229/j.cnki.jdxbgxb201401029

• paper • Previous Articles     Next Articles

Coloured image copy-move forgery detection based on SIFT and HIS

SHEN Xuan-jing1,2, ZHU Ye1,2, LYU Ying-da1,2, CHEN Hai-peng1,2   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China;
    2. Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012, China
  • Received:2012-11-30 Online:2014-01-01 Published:2014-01-01

Abstract:

In order to solve the problem of the false matching in detecting copy-move forgeries, an improved method based on Scale Invariant Feature Transform (SIFT) and HSI was proposed in this study. First, the SIFT key points and SIFT feature vector are extracted. Secondly, for each SIFT point the HSI feature is extract. Finally, the SIFT feature vector and the HSI feature vector between every two different key points are matched to determine the copy-move regions. The experimental results show that the proposed algorithm based on SIFT and HSI can reduce false matching rate in comparison with the SIFT algorithm, the SURF algorithm and the improved SIFT algorithm. The proposed algorithm has higher robustness even when an image is distorted by Gaussian blur, white noise and JPEG recompression.

Key words: computer application, blind identification, copy-move forgery, SIFT feature vector, HSI color space

CLC Number: 

  • TP391

[1] 陈海鹏. 数字图像真伪鉴别技术研究[D]. 长春: 吉林大学计算机科学与技术学院, 2011. Chen Hai-peng. Research on identification technology for authenticity of digital images[D]. Changchun: Jilin University, College of Computer Science and Technology, 2011.

[2] 吴琼, 李国辉, 涂丹, 等. 面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报, 2008, 34(12): 1458-1466. Wu Qiong, Li Guo-hui, Tu Dan, et al. A survey of blind digital image forensics technology for authenticity detection[J]. Acta Automatica Sinica, 2008, 34(12): 1458-1466.

[3] 吕颖达, 申铉京, 苗健, 等. 基于光源方向不一致性的局部光源图像盲鉴别方法[J]. 吉林大学学报: 工学版, 2010, 40(6): 1673-1677. Lyu Ying-da, Shen Xuan-jing, Miao Jian, et al. Blind identification for light source images based on inconsistency in light source direction[J]. Journal of Jilin University(Engineering and Technology Edition), 2010, 40(6): 1673-1677.

[4] 骆伟祺, 黄继武, 丘国平. 鲁棒的区域复制图像篡改检测技术[J].计算机学报, 2007, 30(11): 1198-2007. Luo Wei-qi, Huang Ji-wu, Qiu Guo-ping. Robust detection of region-duplication forgery in digital image[J]. Chinese Journal of Computers, 2007, 30(11): 1198-2007.

[5] Huang Yan-ping, Lu Wei, Sun Wei, et al. Improved DCT-based detection of copy-move forgery in images[J]. Forensic Science International, 2011, 206(1-3): 178-184.

[6] Ghulam M, Muhammad H, George B. Passive copy move image forgery detection using undecimated dyadic wavelet transform[J]. Digital Investigation, 2012, 9(1): 49-57.

[7] Huang Hai-ling, Guo Wei-qiang, Zhang Yu. Detection of copy-move forgery in digital images using SIFT algorithm[C]//IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China, 2008: 1241-1245.

[8] Xu Bo, Wang Jun-wen, Liu Guang-jie, et al. Image copy-move forgery detection based on SURF[C]//IEEE International on Multimedia Information Networking and Security, Nanjing, China, 2010: 889-892.

[9] Irene A, Lamberto B, Roberto C, et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1099-1110.

[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LIU Song-shan, WANG Qing-nian, WANG Wei-hua, LIN Xin. Influence of inertial mass on damping and amplitude-frequency characteristic of regenerative suspension[J]. 吉林大学学报(工学版), 2013, 43(03): 557 -563 .
[2] WANG Tong-jian, CHEN Jin-shi, ZHAO Feng, ZHAO Qing-bo, LIU Xin-hui, YUAN Hua-shan. Mechanical-hydraulic co-simulation and experiment of full hydraulic steering systems[J]. 吉林大学学报(工学版), 2013, 43(03): 607 -612 .
[3] ZHANG Chun-qin, JIANG Gui-yan, WU Zheng-yan. Factors influencing motor vehicle travel departure time choice behavior[J]. 吉林大学学报(工学版), 2013, 43(03): 626 -632 .
[4] XIAO Rui, DENG Zong-cai, LAN Ming-zhang, SHEN Chen-liang. Experiment research on proportions of reactive powder concrete without silica fume[J]. 吉林大学学报(工学版), 2013, 43(03): 671 -676 .
[5] CHEN Si-guo, JIANG Xu, WANG Jian, LIU Yan-heng, DENG Wei-wen, DENG Jun-yi. Mashup of vehicular ad-hoc network and universal mobile telecommunications system[J]. 吉林大学学报(工学版), 2013, 43(03): 706 -710 .
[6] MENG Chao, SUN Zhi-xin, LIU San-min. Multiple execution paths for virus based on cloud computing[J]. 吉林大学学报(工学版), 2013, 43(03): 718 -726 .
[7] XIAN Shu, ZHENG Jin, LU Xing, ZHANG Shi-peng. Identification approach of P2P flow based on the content redistribution model[J]. 吉林大学学报(工学版), 2013, 43(03): 727 -733 .
[8] LYU Yuan-zhi, WANG Shi-gang, YU Jue-qiong, WANG Xiao-yu, LI Xue-song. Display characteristics of one-dimensional integral imaging in virtual mode based on lenticular lens array[J]. 吉林大学学报(工学版), 2013, 43(03): 753 -757 .
[9] WANG Dan, LI Yang, NIAN Gui-jun, WANG Ke. An inhomogeneity mask for spatial watermarking[J]. 吉林大学学报(工学版), 2013, 43(03): 771 -775 .
[10] FENG Lin-han, QIAN Zhi-hong, SHANG Ke-cheng, ZHU Shuang. Improved hidden node collision avoidance strategy based on IEEE802.15.4[J]. 吉林大学学报(工学版), 2013, 43(03): 776 -780 .