Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A....

80
Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery in Digital Images (J.Fridrich, D. Soukal, and J. Lukas) Samah Ghazawi

description

Copy-Paste Forgery The copy-paste attack in which a part of the image is copied and pasted somewhere else in the same image with the intent to cover an important image feature.

Transcript of Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A....

Page 1: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection 

• Exposing Digital Forgeries by Detecting Duplicated Image Regions

(A. Popescu and H. Farid)• Detection of Copy-Move Forgery in Digital

Images (J.Fridrich, D. Soukal, and J. Lukas)

Samah Ghazawi

Page 2: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Overview• Copy-Paste Forgery.• Copy-Paste Forgery Detection.• Possible Approaches.• Exhaustive approach.• Autocorrelation.• Exact block matching.• PCA - Principal component analysis.• Copy-Paste Forgery Detection Using PCA• DCT - discrete cosine transform.• Copy-Paste Forgery Detection Using DCT

Page 3: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery

• The copy-paste attack in which a part of the image is copied and pasted somewhere else in the same image with the intent to cover an important image feature.

Page 4: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection

• Given an image with MN pixels (image of size M×N) our task is to determine if it contains duplicated regions of unknown location and shape.

Page 5: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Possible Approaches

• Exhaustive approach (1).• Exhaustive approach (2).• Autocorrelation approach.• Exact block matching.

Page 6: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exhaustive approach (1)

• examine every possible pair of regions would have an exponential complexity in the number of image pixels.

Such an approach is obviously computationally prohibitive.

Page 7: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exhaustive approach (2)

• In this method, the image and its circularly shifted version are overlaid looking for closely matching image segments.

Page 8: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exhaustive approach (2)

• Let us assume that is the pixel value of a grayscale image of size M×N at the position i, j.

• The following differences are examined:

where,

Page 9: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exhaustive approach (2)

• Comparing with its cyclical shift [k,l] is the same as comparing with its cyclical shift [k’,l’], where k’=M–k and l’=N–l.

• For each shift [k,l], the differences are calculated and thresholded with a small threshold t.

• The total computational requirements are proportional to .

Page 10: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Page 11: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Autocorrelation

• Autocorrelation function computes the energy of original image with shifted image for different shifts.

• The original and copied segments will introduce peaks in the autocorrelation for the shifts that correspond to the copied-moved segments.

• Autocorrelation witch computed directly for the image itself, would have very large peaks at the image corners and their neighborhoods.

Page 12: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Autocorrelation

• Natural images contain most of their power in low-frequencies.

• Computing the autocorrelation not from the image directly, but from its high-pass filtered version.

Page 13: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Autocorrelation

Page 14: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Autocorrelation

• Assuming the minimal size of a copied-moved segment is K.

• autocorrelation copy-move detection method consists of the following steps:

1. Apply the Marr high-pass filter to the tested image.2. Compute the autocorrelation r of the filtered image.3. Remove half of the autocorrelation. Autocorrelation is symmetric.

Page 15: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Autocorrelation

4. Set r = 0 in the neighborhood of two remaining corners of the entire autocorrelation.5. Find the maximum of r, identify the shift vector, and examine the shift using the exhaustive method this is now computationally efficient because we

do not have to perform the exhaustive search for many different shift vectors.

6. If the detected area is larger than K, finish, else repeat Step 5 with the next maximum of r.

Page 16: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Autocorrelation

• This method is simple and does not have a large computational complexity, it often fails to detect the forgery unless the size of the forged area is at least ¼ of linear image dimensions.

Page 17: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Page 18: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exact Block Matching

• Given an image of size M×N:• Divide the image into overlapping square

blocks of size B×B pixels, marked as .• Copy pixel values from each block to a

vector of size , marked as .

Page 19: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exact Block Matching

Image

block

block vector

Page 20: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exact Block Matching

• Build an array A of size (M–B+1)(N–B+1) that each row is some .

• Lexicographically order the rows of matrix A.

Page 21: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exact Block Matching

block vectors array ordered array

Page 22: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Exact Block Matching

• Go through all rows of the ordered matrix and look for two consecutive rows that are identical.

• Complexity: .

Page 23: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

Page 24: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

• Exact match analysis did not show any exactly matching blocks.

Page 25: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

• If the forged image had been saved as JPEG, vast majority of identical blocks would have disappeared because the match would become only approximate and not exact.

Page 26: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

And differently…

• Ordered array of what ?!

Page 27: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Component Analysis – PCA

Discrete Cosine Transform - DCT

• PCA of a data set X.• DCT of a data set X.

Page 28: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Component Analysis - PCA

• Mainstay of modern data analysis.• Used abundantly in all forms of analysis - from

neuroscience to computer graphics.• Simple, non-parametric method of extracting

relevant information from confusing data sets.• Reduces a complex data set to a lower

dimension to reveal the sometimes hidden.• Computes the most meaningful basis to re-

express a noisy, garbled data set.

Page 29: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Components

• Orthogonal directions of greatest variance in data. 

Page 30: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Components

• First principal component is the direction of greatest variability (covariance) in the data.

• Second is the next orthogonal (uncorrelated) direction of greatest variability. So first remove all the variability along

the first component, and then find the next direction of greatest variability.

• And so on …

Page 31: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Components

Page 32: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Components

• Principal components with larger associated variances represent interesting dynamics, while those with lower variances represent noise.

• The principal components are orthogonal.

Page 33: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Components

Dimensionality Reduction Can ignore the components of lesser significance• You do lose some information, but if the eigenvalues

are small, you don’t lose much.• n dimensions in original data.• calculate n eigenvectors and eigenvalues.• choose only the first p eigenvectors, based on their

eigenvalues.• final data set has only p dimensions.

Page 34: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA

• The number of measurement types is the dimension of the data set.

• Each data sample is a vector in m dimensional space.

• Naïve Basis: B is the identity matrix I, X = IX.

Page 35: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA

• PCA asks:Is there another basis, which is a linear combination of the original basis, that best re-expresses our data set?

(1) restricting the set of potential bases.(2) formalizing the implicit assumption of continuity in a data set.

Page 36: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Page 37: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Let The Math Begin

Page 38: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA

• Let X and Y be m×n matrices related by a linear transformation P. X is the original data set. Y is a re-representation of that data

set. are the rows of P are the columns of X are the columns of Y

Page 39: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA

PX = Y PX = Y =

• The row vectors {, . . . , } in this transformation will become the principal components of X.

Page 40: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA

• covariance matrix:

The diagonal terms of are the variance of particular measurement types.

The off-diagonal terms of are the covariance between measurement types.

Page 41: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA

• Find some orthonormal matrix P where Y = PX such that is diagonalized.

Page 42: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA

• A is symmetric.• A is diagonalized by an orthogonal

matrix of its eigenvectors.

D is a diagonal matrix. E is a matrix of eigenvectors of A arranged

as columns.

Page 43: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
Page 44: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

PCA - Now comes the trick

• Select the matrix P to be a matrix where each row is an eigenvector of .

• Therefore P = and P• Therefore

The principal components of X are the eigenvectors of (or the rows of P).

The i-th diagonal value of is the variance of X along .

Page 45: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• Using PCA, compute the new -dimensional representation, of each b pixel image block.

, • The value of is chosen to satisfy:

Page 46: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

Where: : eigenvalues as computed by the PCA. b: number of pixels per block. Ɛ: fraction of the ignored variance along the

principal axes.

Page 47: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• For color images:(1) analyze each color channel

separately.or

(2) build a single color block of size 3b pixels.

Page 48: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• Build a ×b matrix whose rows are given by the component-wise quantized coordinates:

Where, Q: number of quantization bins.

Page 49: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• Sort the rows of the above matrix in lexicographic order to yield a matrix S. denote the rows of S. () denote the position of the block's image

coordinates (top-left corner) that corresponds to .

Page 50: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• For every pair of rows and from S such that

, place the pair of coordinates () and () onto a list.Where,

: number of neighboring rows to search in the lexicographically sorted matrix.

Page 51: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• For all elements in this list, compute their offsets, defined as:

Page 52: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• Discard all pairs of coordinates with an offset frequency less than .

• Discard all pairs whose offset magnitude, , is less than .

Where, : minimum frequency threshold. : minimum offset threshold.

Page 53: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using PCA

• From the remaining pairs of blocks build a duplication map by constructing a zero image of the same size as the original, and coloring all pixels in a duplicated region with a unique grayscale intensity value.

Page 54: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

Page 55: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

Page 56: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

Page 57: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

Page 58: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

Page 59: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Principal Component Analysis – PCA

Discrete Cosine Transform - DCT

• PCA of a data set X.• DCT of a data set X.

Page 60: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Discrete Cosine Transform - DCT

• Important to numerous applications in science and engineering, from lossy compression of audio and images, to spectral methods for the numerical solution of partial differential equations.

• There are eight standard DCT variants, of which four are common.

• Fourier-related transform similar to the discrete Fourier transform (DFT), but using only real numbers.

Page 61: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT

• Transforms an image from the spatial domain to the frequency domain.

• Helps separate the image into parts of differing importance.

• Expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies.

Page 62: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT

f

𝐷𝐶𝑇

𝐹 (𝑢 ,𝑣)

Page 63: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Let The Math Begin – Again !

Page 64: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT

• Given an image N by M, the basic operation of the DCT is as follows: f(i,j) is the intensity of the pixel in row i and

column j. F(u,v) is the DCT coefficient in row and column

of the DCT matrix. For JPEG image the DCT input is usually an 8 by

8 (or 16 by 16) array of integers. This array contains each image window’s

respective color band pixel levels.

Page 65: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT

• For a 2D N by M image 2D DCT is defined:

where,

Page 66: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT basis functions

• Computationally easier to implement and more efficient to regard the DCT as a set of basis functions.

Page 67: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT

• Image is partitioned into 8 x 8 regions — The DCT input is an 8 x 8 array of integers.

• Why 8 x 8?! The output array of DCT coefficients

contains integers. these can range from -1024 to 1023.

Page 68: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT

Page 69: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using DCT

• Scan the image from the upper left corner to the lower right corner while sliding a B×B blocks.

• Calculate the DCT transform for each block.• Quantize the DCT coefficients and store as one

row in a matrix A. The quantization steps are calculated from a

user- specified parameter Q. Lower values of the Q-factor produce more

matching blocks, possibly some false matches.

Page 70: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using DCT

• Lexicographically sort the rows of A.• If two consecutive rows of the sorted

matrix A are found, store the positions of the matching blocks in a separate list.the coordinates of the upper left pixel of

a block can be taken as its position.

Page 71: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using DCT

• Let (i1, i2) and (j1, j2) be the positions of the two matching blocks.

• The shift vector s between the two matching blocks is calculated as s = (s1, s2) = (i1 – j1, i2 – j2)

• the shift vectors –s and s correspond to the same shift, the shift vectors s are normalized, if necessary, by multiplying by –1 so that s ≥ 0.

Page 72: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using DCT

• For each matching pair of blocks, increment the normalized shift vector counter C by one.

C(s1, s2) = C(s1 , s2) + 1The shift vector C is initialized to zero.The counter C indicates the frequencies

with which different normalized shift vectors occur.

Page 73: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using DCT

• find all normalized shift vectors s(1), s(2), …, s(K), whose occurrence exceeds a user-specified threshold T: C(s(r)) > T for all r = 1, …, K. Larger values of T may cause the algorithm

to miss some not-so-closely matching blocks, while too small a value of T may introduce too many false matches.

Page 74: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Copy-Paste Forgery Detection Using DCT

• look at the mutual positions of each matching block pair and output a specific block pair only if there are many other matching pairs in the same mutual position.

• For all normalized shift vectors, the matching blocks that contributed to that specific shift vector are colored with the same color and thus identified as segments that might have been copied and moved.

Page 75: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

• the elliptic area on the orange hat has been copied to two other locations, three different shift vectors have been correctly found.

Page 76: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

ResultsFalse

matches

Page 77: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

Results

Page 78: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

DCT VS. Exact Block Matching

Page 79: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

References

• Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid)

• Detection of Copy-Move Forgery in Digital Images (J.Fridrich, D. Soukal, and J. Lukas)

• Wikipedia: https://en.wikipedia.org/wiki/Discrete_cosine_transform

• http://www.cs.cf.ac.uk/Dave/Multimedia/node231.html• A Tutorial On Principal Component Analysis - Derivation,

Discussion and Singular Value Decomposition (Jon Shlens)• http://

mipav.cit.nih.gov/pubwiki/index.php/Autocorrelation_Coefficients

• http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.157.4543&rep=rep1&type=pdf

Page 80: Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.

THANKS