Loading…
A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instrume...
Saved in:
Published in: | IEEE transactions on information forensics and security 2011-09, Vol.6 (3), p.1099-1110 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3 |
---|---|
cites | cdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3 |
container_end_page | 1110 |
container_issue | 3 |
container_start_page | 1099 |
container_title | IEEE transactions on information forensics and security |
container_volume | 6 |
creator | Amerini, I. Ballan, L. Caldelli, R. Del Bimbo, A. Serra, G. |
description | One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning. |
doi_str_mv | 10.1109/TIFS.2011.2129512 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_5734842</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5734842</ieee_id><sourcerecordid>1671227563</sourcerecordid><originalsourceid>FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</originalsourceid><addsrcrecordid>eNpdkEFLwzAUx4soOKcfQLwET14685ImbY5zWh1sCK7iMWTpK3ZuzUw6Yd_ezo0dPL0_j9__8fhF0TXQAQBV98U4nw0YBRgwYEoAO4l6IISMJWVweszAz6OLEBaUJgnIrBd9DMlsnBfxgwlYktx5bEJtyRTbT1eSynkycuttPHU_SIZta-wXecQWbVu7hpimJIU3Tei4lflbvaHtUL-9jM4qswx4dZj96D1_KkYv8eT1eTwaTmLLFbSxlZlQFSAYnmWZZYlRhrI5r4RFaZQSKVgmKqxKmqiESoqYAs_mgiecQjXn_ehuf3ft3fcGQ6tXdbC4XJoG3SZokCkwlgrJO_T2H7pwG99032kFUonOVNZBsIesdyF4rPTa1yvjtxqo3pnWO9N6Z1ofTHedm32nRsQjL1KeZAnjvwr5eAc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>916956028</pqid></control><display><type>article</type><title>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Amerini, I. ; Ballan, L. ; Caldelli, R. ; Del Bimbo, A. ; Serra, G.</creator><creatorcontrib>Amerini, I. ; Ballan, L. ; Caldelli, R. ; Del Bimbo, A. ; Serra, G.</creatorcontrib><description>One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2011.2129512</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authenticity verification ; Cloning ; copy-move attack ; digital image forensics ; Digital images ; Discrete cosine transforms ; Feature extraction ; Forensic engineering ; Forensics ; Forgery ; Forges ; Geometric transformation ; geometric transformation recovery ; Reproduction ; Studies ; Tasks ; Transformations</subject><ispartof>IEEE transactions on information forensics and security, 2011-09, Vol.6 (3), p.1099-1110</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Sep 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</citedby><cites>FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5734842$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Amerini, I.</creatorcontrib><creatorcontrib>Ballan, L.</creatorcontrib><creatorcontrib>Caldelli, R.</creatorcontrib><creatorcontrib>Del Bimbo, A.</creatorcontrib><creatorcontrib>Serra, G.</creatorcontrib><title>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.</description><subject>Authenticity verification</subject><subject>Cloning</subject><subject>copy-move attack</subject><subject>digital image forensics</subject><subject>Digital images</subject><subject>Discrete cosine transforms</subject><subject>Feature extraction</subject><subject>Forensic engineering</subject><subject>Forensics</subject><subject>Forgery</subject><subject>Forges</subject><subject>Geometric transformation</subject><subject>geometric transformation recovery</subject><subject>Reproduction</subject><subject>Studies</subject><subject>Tasks</subject><subject>Transformations</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkEFLwzAUx4soOKcfQLwET14685ImbY5zWh1sCK7iMWTpK3ZuzUw6Yd_ezo0dPL0_j9__8fhF0TXQAQBV98U4nw0YBRgwYEoAO4l6IISMJWVweszAz6OLEBaUJgnIrBd9DMlsnBfxgwlYktx5bEJtyRTbT1eSynkycuttPHU_SIZta-wXecQWbVu7hpimJIU3Tei4lflbvaHtUL-9jM4qswx4dZj96D1_KkYv8eT1eTwaTmLLFbSxlZlQFSAYnmWZZYlRhrI5r4RFaZQSKVgmKqxKmqiESoqYAs_mgiecQjXn_ehuf3ft3fcGQ6tXdbC4XJoG3SZokCkwlgrJO_T2H7pwG99032kFUonOVNZBsIesdyF4rPTa1yvjtxqo3pnWO9N6Z1ofTHedm32nRsQjL1KeZAnjvwr5eAc</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Amerini, I.</creator><creator>Ballan, L.</creator><creator>Caldelli, R.</creator><creator>Del Bimbo, A.</creator><creator>Serra, G.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201109</creationdate><title>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</title><author>Amerini, I. ; Ballan, L. ; Caldelli, R. ; Del Bimbo, A. ; Serra, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authenticity verification</topic><topic>Cloning</topic><topic>copy-move attack</topic><topic>digital image forensics</topic><topic>Digital images</topic><topic>Discrete cosine transforms</topic><topic>Feature extraction</topic><topic>Forensic engineering</topic><topic>Forensics</topic><topic>Forgery</topic><topic>Forges</topic><topic>Geometric transformation</topic><topic>geometric transformation recovery</topic><topic>Reproduction</topic><topic>Studies</topic><topic>Tasks</topic><topic>Transformations</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Amerini, I.</creatorcontrib><creatorcontrib>Ballan, L.</creatorcontrib><creatorcontrib>Caldelli, R.</creatorcontrib><creatorcontrib>Del Bimbo, A.</creatorcontrib><creatorcontrib>Serra, G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEL</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Amerini, I.</au><au>Ballan, L.</au><au>Caldelli, R.</au><au>Del Bimbo, A.</au><au>Serra, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2011-09</date><risdate>2011</risdate><volume>6</volume><issue>3</issue><spage>1099</spage><epage>1110</epage><pages>1099-1110</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper, the problem of detecting if an image has been forged is investigated; in particular, attention has been paid to the case in which an area of an image is copied and then pasted onto another zone to create a duplication or to cancel something that was awkward. Generally, to adapt the image patch to the new context a geometric transformation is needed. To detect such modifications, a novel methodology based on scale invariant features transform (SIFT) is proposed. Such a method allows us to both understand if a copy-move attack has occurred and, furthermore, to recover the geometric transformation used to perform cloning. Extensive experimental results are presented to confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2011.2129512</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2011-09, Vol.6 (3), p.1099-1110 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_ieee_primary_5734842 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Authenticity verification Cloning copy-move attack digital image forensics Digital images Discrete cosine transforms Feature extraction Forensic engineering Forensics Forgery Forges Geometric transformation geometric transformation recovery Reproduction Studies Tasks Transformations |
title | A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T01%3A37%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20SIFT-Based%20Forensic%20Method%20for%20Copy-Move%20Attack%20Detection%20and%20Transformation%20Recovery&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Amerini,%20I.&rft.date=2011-09&rft.volume=6&rft.issue=3&rft.spage=1099&rft.epage=1110&rft.pages=1099-1110&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2011.2129512&rft_dat=%3Cproquest_ieee_%3E1671227563%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c391t-c6859f1e1a3888c24a9a02b3f5ce6a99571c25fefd0494060ee7138b534301fb3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=916956028&rft_id=info:pmid/&rft_ieee_id=5734842&rfr_iscdi=true |