Title :
A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
Author :
Amerini, Irene ; Ballan, Lamberto ; Caldelli, Roberto ; Del Bimbo, Alberto ; Serra, Giuseppe
Author_Institution :
Media Integration & Commun. Center, Univ. of Florence, Florence, Italy
Abstract :
One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.
Keywords :
computer forensics; feature extraction; image processing; transforms; SIFT-based forensic method; copy-move attack detection; forensic analysis; forged image detection; geometric transformation; image authenticity; image cloning; image forensics; image patch; scale invariant features transform; transformation recovery; Cloning; Digital images; Discrete cosine transforms; Feature extraction; Forensics; Forgery; Authenticity verification; copy–move attack; digital image forensics; geometric transformation recovery;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2011.2129512