Digital Image Forgery Detection Using SIFT Feature: Rajeev Rajkumar Manglem Singh
Digital Image Forgery Detection Using SIFT Feature: Rajeev Rajkumar Manglem Singh
I. INTRODUCTION
(3)
Then the local extrema over scale and space are searched on
the image. For example one pixel value is compared to its 8
neighbours as well as 9 pixels in next scale and 9 pixels in If , then retain the key-point,
previous scales and so on.. For every pixel with spatial otherwise discard it. where Cedge is the ratio between the largest
location and in image , the pixel with spatial and non-zero smallest eigen-values in the block of the image. From
location Harris corner it is known that for edges, one value is larger than the
other. The keypoint is rejected if this ratio is higher than a threshold.
Usually it uses 10 as a threshold. This step eliminates the low
contrast keypoint and edge keypoint and the only accurate keypoint is
obtained.
in the current image and consecutive scale images and
C. Orientation Assignment
are the neighbouring pixels along with positions in Based on local image gradient directions one or more orientations are
and . If any one of the pixel value is the greatest of all assigned to each keypoint location. All the image operation that has
the 26 neighbours, then the pixel is considered as the maxima been transformed are performed relative to the assigned orientation,
scale, and location for each feature which provide invariance to these
point, and if any of the pixel value is the least of all the transformations. In order to achieve invariance to image rotation an
neighbours, the pixel is minima point. All these maxima and orientation is assigned to each keypoint. Depending on the scale, a
minima points are considered as candidate keys. Potential neighbourhood point is chosen around the keypoint location. Then for
keypoint is identified if it is a local extrema which basically that region the gradient magnitude and direction is calculated. After
means that keypoint is best represented in that scale which is that it is the creation of orientation histogram with 36 bins covering
shown in figure 4: 360 degrees. It is usually weighted by gradient magnitude and
gaussian-weighted circular window with (J equal to 1.5 times the
scale of keypoint. Then in the histogram the highest peak is chosen
and any peak above 80% of it is also taken for calculating the
orientation which creates a keypoint with same location and scale.
They also contribute to the stability of matching.
D. Keypoint Descriptor
E. Keypoint Matching
(b)
Fig 6: Forged image of (a) Lena and (b) man
[3] e. Zhang, L.L. Cheng, Q. Zhengding and L.M. Cheng, "Multipurpose
watermarking based on multiscale curvelet transform",IEEE Trans. Inf
Forensics Security,vol. 3,no. 4,pp. 611-619,2008.
[4] J. Fridrich, "Method for tamper detection in digital images", Proc.
ACM Workshop on Multimedia and Security,pp. 19-23,1999.
[5] 1. T. Hsieh and Y.K. Wu, "Geometric invariant semi fragile image
watermarking using real symmetric matrix", WSEAS Trans. of Signal
Processing,vol. 2,no. 5,pp. 612-618,2006.
[6] H. Farid,"image forgery detection - a survey",IEEE Signal Processing
Magazine,vol. 5,pp. 16-25,2009.
[7] G. Muhammad, M.H. AI-Hammadi,M. Hussain, and G. Bebis, "Image
forgery detection using steerable pyramid transform and local binary
pattern ", Machine Vision and Applications, DO[ 10. 1007/s00138-013-
0547-4,2013.
[8] J. Fridrich,D. Soukal and 1. Lukas,"Detection of copy-move forgery in
digital images", Proc. IEEE Digital Forensic Research Workshop, pp.
55-61,2003.
[9] Ae. Popescu and H. Farid, "Exposing digital forgeries by detecting
traces of resampling," IEEE Trans. on Signal Processing,vol. 53(2), pp.
(a) (b) 758-767,2005.
Fig 7: SIFT Keypoint of (a) Lena and (b) man [10] W. Luo, 1. Huang and G. Qiu, "Robust detection of region-duplication
forgery",Proc. IEEE ICPR,pp. 746-749,2006.
[II] A Langille and M. Gong, "An efficient match-based duplication
detection algorithm",IEEE CRV,p. 64,2006.
[12] I.K. Jung and S. Lacroix, "A Robust Interest Point Matching
Algorithm",Proc. [nternational Conference on Computer Vision. 2001.
[13] G. Li, Q. Wu, D. Tu, and S. Sun, "A Sorted Neighborhood Approach
for Detecting Duplicated Regions in Image Forgeries based on DWT
and SVD," Proc. IEEE ICME,2-5,pp. 1750- 1753,2007.
[14] AN. Myna, M.G. Venkateshmurthy and e.G. Patil, "Detection of
region duplication forgery in digital images using wavelets and log
polar Mapping",Proc. IEEE ICCTMA, pp. 371-377,2007.
[15] 1. Zhang, Z. Feng, and Y. Su, "A new approach for detecting copy
(a) (b) move forgery in digital images",Proc. IEEE ICCS,pp. 362 -366,2008.
Fig 8: Result showing the copied region of (a) lena (b) man [16] B. Mahdian and S. Saic, "Detection of copy-move forgery using a
method based on blur moment invariants", Forensic Science
International, 171 (2-3),pp. 180-189,2007.
ACKNOWLEDGMENT [17] J. Flusser, T. Suk and S. Saic,"Image features invariant with respect to
We would like to acknowledge the staffs of Department of blur",Pattern Recogn. 28 ,pp. 1723-1732,1995.
Information Technology, Assam University for their support [18] B. Dybala, B. Jennings and D. Letscher, "Detecting filtered cloning in
and for their guidance and constant encouragement towards digital images", Proc ACM MM&Sec Workshop,pp. 43-50, 2007.
[19] J.F. He, Z.C. Lin, L.F. Wang, and X.O. Tang, "Detecting doctored
the work.
JPEG images via DCT coefficient analysis", Lecture Notes in
CONCLUSION Computer Science,Springer Berlin,vol. 3953,pp.423-435,2006.
[20] Ae. Bovik,and S. Liu,"DCT-domain Blind Measurement of Blocking
A SIFT based forgery detection in digital image is used in this Artifacts in DCT-coded [mages", Proc. IEEE [CASSP, pp. 1725-1728,
paper. This SIFT based technique which are dependent on 2001.
[21] D.G. Lowe, . "Distinctive Image Features from Scale-Invariant Key
feature extraction using keypoint and feature descriptor which points". International Journal of Computer Vision, vol. 60, no. 2, pp.
are invariant to scaling, noise, illumination and rotation. It is 91-110,2004.
then performed matching and clustering to every keypoints [22] S. Bayram, H. Taha Sencar and N. Memon, " An efficient and robust
and matching points for detecting tampered region. This method for detecting copy-move forgery", Proc IEEE ICASSP, pp.
method is commonly used for detecting SUSpICIOUS 1053-1056,2009.
[23] J.F. He, Z.C. Lin, L.F. Wang, and X.O. Tang, "Detecting doctored
manipulation with digital images (digital forgeries).
JPEG images via DCT coefficient analysis", Lecture Notes in
Computer Science,Springer Berlin,vol. 3953,pp.423-435,2006.
REFERENCES [24] S.B. Solorio and AK. Nandi, " Passive forensic method for detecting
duplicated regions affected by reflection, rotation and scaling" , Proc.
[I] M.M. Yeung, "Digital watermarking", ACM Commun., vol. 41, no. 7, European Signal Proc. Conf. 2009,pp. 824-828.
pp. 30-33, 1998. [25] H. J. Lin, C.-W. Wang, Y.-T. Kao, Fast copy-move forgery detection,
[2] e. Rey and J.L. Dugelay, "A survey of watermarking algorithms for WSEAS Transactions on Signal Processing,5 (5),pp. 188-197,2009.
image authentication",EURAS[P Journal on applied Signal Processing, [26] J.Wang, G. Liu, H. Li, Y. Dai and Z. Wang, "Detection of [mage
vol. 2002 N6,pp. 613-62[,2002. Region Duplication Forgery Using Model with Circle Block",
International Conference on Multimedia Information Networking and
Security,vol. I, pp.25-29,2009