Loading…

A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery

One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instrume...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information forensics and security 2011-09, Vol.6 (3), p.1099-1110
Main Authors: Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3
cites cdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3
container_end_page 1110
container_issue 3
container_start_page 1099
container_title IEEE transactions on information forensics and security
container_volume 6
creator Amerini, I.
Ballan, L.
Caldelli, R.
Del Bimbo, A.
Serra, G.
description One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.
doi_str_mv 10.1109/TIFS.2011.2129512
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_5734842</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5734842</ieee_id><sourcerecordid>1671227563</sourcerecordid><originalsourceid>FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</originalsourceid><addsrcrecordid>eNpdkEFLwzAUx4soOKcfQLwET14685ImbY5zWh1sCK7iMWTpK3ZuzUw6Yd_ezo0dPL0_j9__8fhF0TXQAQBV98U4nw0YBRgwYEoAO4l6IISMJWVweszAz6OLEBaUJgnIrBd9DMlsnBfxgwlYktx5bEJtyRTbT1eSynkycuttPHU_SIZta-wXecQWbVu7hpimJIU3Tei4lflbvaHtUL-9jM4qswx4dZj96D1_KkYv8eT1eTwaTmLLFbSxlZlQFSAYnmWZZYlRhrI5r4RFaZQSKVgmKqxKmqiESoqYAs_mgiecQjXn_ehuf3ft3fcGQ6tXdbC4XJoG3SZokCkwlgrJO_T2H7pwG99032kFUonOVNZBsIesdyF4rPTa1yvjtxqo3pnWO9N6Z1ofTHedm32nRsQjL1KeZAnjvwr5eAc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>916956028</pqid></control><display><type>article</type><title>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Amerini, I. ; Ballan, L. ; Caldelli, R. ; Del Bimbo, A. ; Serra, G.</creator><creatorcontrib>Amerini, I. ; Ballan, L. ; Caldelli, R. ; Del Bimbo, A. ; Serra, G.</creatorcontrib><description>One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2011.2129512</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authenticity verification ; Cloning ; copy-move attack ; digital image forensics ; Digital images ; Discrete cosine transforms ; Feature extraction ; Forensic engineering ; Forensics ; Forgery ; Forges ; Geometric transformation ; geometric transformation recovery ; Reproduction ; Studies ; Tasks ; Transformations</subject><ispartof>IEEE transactions on information forensics and security, 2011-09, Vol.6 (3), p.1099-1110</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</citedby><cites>FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5734842$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Amerini, I.</creatorcontrib><creatorcontrib>Ballan, L.</creatorcontrib><creatorcontrib>Caldelli, R.</creatorcontrib><creatorcontrib>Del Bimbo, A.</creatorcontrib><creatorcontrib>Serra, G.</creatorcontrib><title>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.</description><subject>Authenticity verification</subject><subject>Cloning</subject><subject>copy-move attack</subject><subject>digital image forensics</subject><subject>Digital images</subject><subject>Discrete cosine transforms</subject><subject>Feature extraction</subject><subject>Forensic engineering</subject><subject>Forensics</subject><subject>Forgery</subject><subject>Forges</subject><subject>Geometric transformation</subject><subject>geometric transformation recovery</subject><subject>Reproduction</subject><subject>Studies</subject><subject>Tasks</subject><subject>Transformations</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkEFLwzAUx4soOKcfQLwET14685ImbY5zWh1sCK7iMWTpK3ZuzUw6Yd_ezo0dPL0_j9__8fhF0TXQAQBV98U4nw0YBRgwYEoAO4l6IISMJWVweszAz6OLEBaUJgnIrBd9DMlsnBfxgwlYktx5bEJtyRTbT1eSynkycuttPHU_SIZta-wXecQWbVu7hpimJIU3Tei4lflbvaHtUL-9jM4qswx4dZj96D1_KkYv8eT1eTwaTmLLFbSxlZlQFSAYnmWZZYlRhrI5r4RFaZQSKVgmKqxKmqiESoqYAs_mgiecQjXn_ehuf3ft3fcGQ6tXdbC4XJoG3SZokCkwlgrJO_T2H7pwG99032kFUonOVNZBsIesdyF4rPTa1yvjtxqo3pnWO9N6Z1ofTHedm32nRsQjL1KeZAnjvwr5eAc</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Amerini, I.</creator><creator>Ballan, L.</creator><creator>Caldelli, R.</creator><creator>Del Bimbo, A.</creator><creator>Serra, G.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201109</creationdate><title>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</title><author>Amerini, I. ; Ballan, L. ; Caldelli, R. ; Del Bimbo, A. ; Serra, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authenticity verification</topic><topic>Cloning</topic><topic>copy-move attack</topic><topic>digital image forensics</topic><topic>Digital images</topic><topic>Discrete cosine transforms</topic><topic>Feature extraction</topic><topic>Forensic engineering</topic><topic>Forensics</topic><topic>Forgery</topic><topic>Forges</topic><topic>Geometric transformation</topic><topic>geometric transformation recovery</topic><topic>Reproduction</topic><topic>Studies</topic><topic>Tasks</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Amerini, I.</creatorcontrib><creatorcontrib>Ballan, L.</creatorcontrib><creatorcontrib>Caldelli, R.</creatorcontrib><creatorcontrib>Del Bimbo, A.</creatorcontrib><creatorcontrib>Serra, G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEL</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Amerini, I.</au><au>Ballan, L.</au><au>Caldelli, R.</au><au>Del Bimbo, A.</au><au>Serra, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2011-09</date><risdate>2011</risdate><volume>6</volume><issue>3</issue><spage>1099</spage><epage>1110</epage><pages>1099-1110</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2011.2129512</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2011-09, Vol.6 (3), p.1099-1110
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_5734842
source IEEE Electronic Library (IEL) Journals
subjects Authenticity verification
Cloning
copy-move attack
digital image forensics
Digital images
Discrete cosine transforms
Feature extraction
Forensic engineering
Forensics
Forgery
Forges
Geometric transformation
geometric transformation recovery
Reproduction
Studies
Tasks
Transformations
title A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T01%3A37%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20SIFT-Based%20Forensic%20Method%20for%20Copy-Move%20Attack%20Detection%20and%20Transformation%20Recovery&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Amerini,%20I.&rft.date=2011-09&rft.volume=6&rft.issue=3&rft.spage=1099&rft.epage=1110&rft.pages=1099-1110&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2011.2129512&rft_dat=%3Cproquest_ieee_%3E1671227563%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=916956028&rft_id=info:pmid/&rft_ieee_id=5734842&rfr_iscdi=true