1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.

Slides:



Advertisements
Similar presentations
3D Model Matching with Viewpoint-Invariant Patches(VIP) Reporter :鄒嘉恆 Date : 10/06/2009.
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
Multimedia Security And Forensics Authentication of Digital Images Sarah Summers Sarah Wahl CS525 Semester Project Spring 2006.
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
Detect Digital Image Forgeries Ting-Wei Hsu. History of photo manipulation 1860 the portrait of Lincoln is a composite of Lincoln ’ s head and John Calhoun.
Digital Image Forensics
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
Efficient Bit Allocation and CTU level Rate Control for HEVC Picture Coding Symposium, 2013, IEEE Junjun Si, Siwei Ma, Wen Gao Insitute of Digital Media,
CMPT-884 Jan 18, 2010 Video Copy Detection using Hadoop Presented by: Cameron Harvey Naghmeh Khodabakhshi CMPT 820 December 2, 2010.
Modeling Pixel Process with Scale Invariant Local Patterns for Background Subtraction in Complex Scenes (CVPR’10) Shengcai Liao, Guoying Zhao, Vili Kellokumpu,
A Study of Approaches for Object Recognition
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
A robust detection algorithm for copy-move forgery in digital images
Takuya Matsuo, Norishige Fukushima and Yutaka Ishibashi
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
AdvisorStudent Dr. Jia Li Shaojun Liu Dept. of Computer Science and Engineering, Oakland University Automatic 3D Image Segmentation of Internal Lung Structures.
International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.8, No.7 (2015), pp.27-40
Color Histogram Based Image Forgery Detection for Copy-Move Attack Bo Liu and Chi-Man Pun Faculty of Science and Technology, University of Macau, Av. Padre.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
Principal Component Analysis (PCA).
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Shape Descriptors for Maximally Stable Extremal Regions Per-Erik Forss´en and David G. Lowe Department of Computer Science University of British Columbia.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Flame and smoke detection method for early real-time detection of a tunnel fire Adviser: Yu-Chiang Li Speaker: Wei-Cheng Wu Date: 2009/09/23 Fire Safety.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Robust Image Hashing Based on Color Vector Angle and Canny Operator
Der-Chyuan Lou and Jiang-Lung Liu,
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images  Toqeer Mahmood, Aun.
Face recognition using improved local texture pattern
Hybrid Features based Gender Classification
Lossy Compression of DNA Microarray Images
Cheng-Ming Huang, Wen-Hung Liao Department of Computer Science
IMAGE FORGERY DETECTION
Local Binary Patterns (LBP)
Principal Component Analysis (PCA)
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: Pattern Recognition Vol. 38, May, 2005, pp
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Speaker: YI-JIA HUANG Date: 2011/12/08 Authors: C. N
Sourse: Multimedia Tools and Applications, 2018, pp 1–17
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
A new chaotic algorithm for image encryption
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
On SVD-based watermarking algorithm
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Detecting Digital Forgeries using Blind Noise Estimation
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012 Authors: Yanjun Cao, Tiegang Gao, Li Fan, Qunting Yang Presenter: Li-Ting Liao Date: 2012/06/14

OUTLINE 2 Introduction Proposed Scheme Experimental Results Conclusions

Introduction 3 Original imageTamper image Copy-move forgery detect

Proposed Scheme 4 Flowchart of the proposed scheme

THE PROPOSED SCHEME – Block Dividing (1/2) 5 N B B N B B Generate (N-B+1)(N-B+1) Blocks

THE PROPOSED SCHEME –Block Dividing (2/2) Original image … Block size : 4 × 4

THE PROPOSED SCHEME – DCT transform DCT Transform Original block DCT coefficient block

THE PROPOSED SCHEME – Feature extraction (1/2) DCT coefficient block C2C1 C3C4 Generate matching feature :

THE PROPOSED SCHEME – Feature extraction (2/2) DCT coefficient block C2C1 C3C4 Generate matching feature : ≒ ≒ ≒ ≒

THE PROPOSED SCHEME – Matching (1/3) 10 d 1 2X2 2 (x 1, y 1 ) (x 2, y 2 ) Similar condition :

THE PROPOSED SCHEME – Matching (2/3) 11 Not Similar

THE PROPOSED SCHEME – Matching (3/3) 12 ≒ Similar Detected image

EXPERIMENTAL RESULTS(1/6) 13 The detection results (from left to right is the original image, tampered image, detection results).

EXPERIMENTAL RESULTS(2/6) 14 The detection results for non-regular copy-move forgery

EXPERIMENTAL RESULTS(3/6) 15 The test results for multiple copy-move forgery under a mixed operation

EXPERIMENTAL RESULTS(4/6) 16 The top row are tampered images with duplicated region size of 32 pixels × 32 pixels. Shown below are the detection results using our algorithm

EXPERIMENTAL RESULTS(5/6) 17 DAR curves for DCT, DCT-improved, PCA, FMT, and Proposed methods when the duplicated region is 64 pixels 64 pixels. (a) Gaussian noise, and (b) Gaussian blurring (a) (b)

EXPERIMENTAL RESULTS(6/6) 18 [2] A. Fridrich, et al., Detection of Copy-move Forgery in Digital Images, [3] Y. Huang, et al., Improved DCT-based detection of copy-move forgery in images, Forensic Science International 206 (1–3) (2011) 178–184. [4] A. Popescu and H. Farid, Exposing digital forgeries by detecting duplicated image regions, Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR , 2004.

CONCLUSIONS This paper presented an automatic and efficient detection algorithm for copy-move forgery The proposed algorithm could not only endure the multiple copy-move forgery, but also the blurring or nosing adding 19