z-logo
open-access-imgOpen Access
Composite attacks‐based copy‐move image forgery detection using AKAZE and FAST with automatic contrast thresholding
Author(s) -
Dixit Anuja,
Bag Soumen
Publication year - 2020
Publication title -
iet image processing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.401
H-Index - 45
eISSN - 1751-9667
pISSN - 1751-9659
DOI - 10.1049/iet-ipr.2020.1118
Subject(s) - artificial intelligence , thresholding , ransac , pattern recognition (psychology) , computer vision , computer science , scale invariant feature transform , contrast (vision) , image (mathematics) , similarity (geometry) , outlier , pixel , mathematics
Copy‐move image forgery is one of the most popular image tampering technique which can be performed for vicious purposes. In this forgery technique, selected region is copied and pasted at different locations on the same image to produce a manipulated image. Such forgery is denigratory as it can alter the image content by hiding or appending visual information. In this study, the authors propose a novel keypoint‐based technique to detect forged images sustaining composite attacks consisting of various combinations of geometrical and post‐processing operations. In the authors' method, AKAZE and FAST techniques are used to extract keypoints from the image. Non‐maximal value suppression with automatic contrast thresholding is performed during FAST keypoint extraction. SIFT and DAISY descriptors are computed corresponding to extracted keypoints. PCA is applied over SIFT and DAISY descriptors to discard lower components which are sensitive to distortions occurred in images. They apply a correlation‐based nearest neighbour search technique to detect similarity among keypoint descriptors. HDBSCAN algorithm is applied to obtain matched keypoint clusters. Further, RANSAC algorithm is utilised for removal of keypoint outliers. In comparison to state‐of‐the‐art techniques, their approach achieve high F‐measure (%) and low FPR (%) for image‐level as well as pixel‐level copy‐move forgery detection.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here