{"title":"用于数字照片复制-移动伪造检测的二进制描述符","authors":"S. Velmurugan, T. Subashini","doi":"10.1109/ICCMC53470.2022.9753970","DOIUrl":null,"url":null,"abstract":"Today, image forensic is an emerging area which aims at authenticating the credibility of an image. Sophisticating image editing tools make it easy to forge images in different ways and one amongst them is copy-move (CM) forgery which is considered in this paper. CM forgery modifies the content of an image by copying a portion of an image and pasting it in a distinct location in the similar image. Fraudsters, in order to conceal the fraud and to deceive the human eyes, sometimes do some post-processing operations such as rotation, scaling, multiple CM, etc. The widely used block-based methods for CM forgery detection are not robust enough to affine transformation and are not invariant to scaling, rotation, and noise. So, in this work, key-point-based CM forgery detection methods based on BRISK and ORB descriptors are proposed for detecting CM forgeries in digital images. The presented methods are dependent upon blobs, detecting using DoG operator, from which BRISK and ORB features are extracted. The extracted features are matched using Hamming distance metrics to find similar key points to identify the CM regions. The work was implemented in Python and synthesized images were used in this to analyze and compare the efficacy of the presented techniques. The experimental outcomes demonstrates that the presented technique was effectual for multi-CM attacks and geometric transformations namely rotation and scaling. Though both the methods were able to detect the CM forgeries efficiently, ORB executed faster compared to BRISK.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"430 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Binary descriptors for Copy-Move Forgery Detection in Digital Photographs\",\"authors\":\"S. Velmurugan, T. Subashini\",\"doi\":\"10.1109/ICCMC53470.2022.9753970\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, image forensic is an emerging area which aims at authenticating the credibility of an image. Sophisticating image editing tools make it easy to forge images in different ways and one amongst them is copy-move (CM) forgery which is considered in this paper. CM forgery modifies the content of an image by copying a portion of an image and pasting it in a distinct location in the similar image. Fraudsters, in order to conceal the fraud and to deceive the human eyes, sometimes do some post-processing operations such as rotation, scaling, multiple CM, etc. The widely used block-based methods for CM forgery detection are not robust enough to affine transformation and are not invariant to scaling, rotation, and noise. So, in this work, key-point-based CM forgery detection methods based on BRISK and ORB descriptors are proposed for detecting CM forgeries in digital images. The presented methods are dependent upon blobs, detecting using DoG operator, from which BRISK and ORB features are extracted. The extracted features are matched using Hamming distance metrics to find similar key points to identify the CM regions. The work was implemented in Python and synthesized images were used in this to analyze and compare the efficacy of the presented techniques. The experimental outcomes demonstrates that the presented technique was effectual for multi-CM attacks and geometric transformations namely rotation and scaling. Though both the methods were able to detect the CM forgeries efficiently, ORB executed faster compared to BRISK.\",\"PeriodicalId\":345346,\"journal\":{\"name\":\"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"430 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC53470.2022.9753970\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC53470.2022.9753970","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Binary descriptors for Copy-Move Forgery Detection in Digital Photographs
Today, image forensic is an emerging area which aims at authenticating the credibility of an image. Sophisticating image editing tools make it easy to forge images in different ways and one amongst them is copy-move (CM) forgery which is considered in this paper. CM forgery modifies the content of an image by copying a portion of an image and pasting it in a distinct location in the similar image. Fraudsters, in order to conceal the fraud and to deceive the human eyes, sometimes do some post-processing operations such as rotation, scaling, multiple CM, etc. The widely used block-based methods for CM forgery detection are not robust enough to affine transformation and are not invariant to scaling, rotation, and noise. So, in this work, key-point-based CM forgery detection methods based on BRISK and ORB descriptors are proposed for detecting CM forgeries in digital images. The presented methods are dependent upon blobs, detecting using DoG operator, from which BRISK and ORB features are extracted. The extracted features are matched using Hamming distance metrics to find similar key points to identify the CM regions. The work was implemented in Python and synthesized images were used in this to analyze and compare the efficacy of the presented techniques. The experimental outcomes demonstrates that the presented technique was effectual for multi-CM attacks and geometric transformations namely rotation and scaling. Though both the methods were able to detect the CM forgeries efficiently, ORB executed faster compared to BRISK.