Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation

نویسندگان

  • A. Ying-Da Lv
  • Xuan-Jing Shen
  • Hai-Peng Chen
  • Qiong Wu
چکیده

To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for each located couple of doubtful blocks, use logarithm polar coordinate transformation to translate the rotation and scaling in Cartesian coordinate system into translation in logarithm polar coordinate system; and use phase correlation method to obtain rotation angle, scaling size and position offset; and then, the tampered regions would be located roughly. Finally, use geometry method to accurately calculate the rotation angle, scaling size and position offset between the copypaste regions, and according to these values, the tampered region can be located accurately. Experimental results showed that our algorithm can detect the copy-paste tampering, even with rotation and scaling transformation, and it can resist some post-processing, such as blurring, adding noise, and so on.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Passive copy – paste Tampering Detection Technique for Digital Images

Digital images are powerful and widely used communication medium in many fields like medical imaging, digital forensics, surveillance, journalism, etc. The availability of sophisticated digital image technology has given rise to image forgery. The forgeries are very difficult for a human eye to detect. Passive tampering detection method aims to detect the tampering areas in the digital images w...

متن کامل

Exposing Image Forgery by Detecting Traces of Feather Operation

Powerful digital image editing tools make it very easy to produce a perfect image forgery. The feather operation is necessary when tampering an image by copy-paste operation because it can help the boundary of pasted object to blend smoothly and unobtrusively with its surroundings. We propose a blind technique capable of detecting traces of feather operation to expose image forgeries. We model ...

متن کامل

A Novel Semi-Fragile Watermarking Scheme with Iterative Restoration

In this paper, a novel semi-fragile watermarking scheme utilizing Iterative Restoration techniques is proposed. The scheme embeds a restricted set of restoration data in the transform domain of a cover image, which equates to a highly compressed copy of that image. If tampering occurs, the image is authenticated by comparing the extracted watermark data to encrypted data from a key file to dete...

متن کامل

A Scale Invariant Digital Image Copy-Paste Forgery Detection Approach Based on NCC

It is very important to authenticate the digital image for its authenticity. The issue of the authenticity and integrity of digital images is progressively critical. Day by day, it's getting easier to create image forgeries because of the sophisticated image editing software programs. There are various types of digital image manipulation or tampering possible; like image compositing, splic...

متن کامل

Image Tamper Detection Using Non Alignment of Jpeg Grids

Digital images have a very significant role in various fields like criminal and forensic investigations, medical imaging and journalism. But due to wide availability of powerful editing software, image forgery has become much easier. The aim of this paper is to detect the forgery on JPEG compressed images when splicing (copy-paste) will result in non alignment of JPEG grids. JPEG is widely used...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011