当前位置: X-MOL 学术Appl. Soft Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Adaptive clustering-based approach for forgery detection in images containing similar appearing but authentic objects
Applied Soft Computing ( IF 7.2 ) Pub Date : 2021-09-15 , DOI: 10.1016/j.asoc.2021.107893
Anuja Dixit 1 , Soumen Bag 1
Affiliation  

Copy-move forgery is one of the well-known image forgery technique which exploits regions of the same image to create forged image by replicating or hiding authentic content of the original image. Original images can also contain similar looking but authentic objects. In such cases, identification of authentic and tampered images is a complicated task. To tackle this problem, we propose a method in which Stationary Wavelet Transform (SWT) and spatial-constrained edge preserving watershed segmentation are applied over input image in preprocessing step. Keypoint extraction and descriptor computation are performed using Cascaded Features from Accelerated Segment Test (Cascaded FAST) and Binary Robust Invariant Scalable Keypoint (BRISK) descriptor, respectively. Approximate nearest neighbor search is performed using Random Binary Search Tree (RBST) method. For keypoint clustering, Adaptive Density Peak Clustering (ADPC) technique is employed. Outlier removal is performed using Random Sample Consensus (RANSAC) technique. Further, forged regions are localized using correlation map generation. Experimental results display that the proposed approach can effectively distinguish between forged and original images containing similar appearing but authentic objects. It is also able to detect forged images sustaining different post-processing attacks. For COVERAGE dataset, proposed technique achieves high F-Measure = 86.901% and low False Positive Rate (FPR) = 15.241% in comparison to state-of-the-art techniques.



中文翻译:

基于自适应聚类的图像伪造检测方法

复制移动伪造是众所周知的图像伪造技术之一,它利用相同图像的区域通过复制或隐藏原始图像的真实内容来创建伪造图像。原始图像还可以包含外观相似但真实的对象。在这种情况下,识别真实和篡改的图像是一项复杂的任务。为了解决这个问题,我们提出了一种方法,其中在预处理步骤中对输入图像应用平稳小波变换 (SWT) 和空间约束边缘保留分水岭分割。关键点提取和描述符计算分别使用来自加速分段测试 (Cascaded FAST) 的级联特征和二进制稳健不变可扩展关键点 (BRISK) 描述符来执行。使用随机二叉搜索树 (RBST) 方法执行近似最近邻搜索。对于关键点聚类,采用自适应密度峰值聚类 (ADPC) 技术。使用随机样本共识 (RANSAC) 技术执行异常值去除。此外,使用相关图生成来定位伪造区域。实验结果表明,所提出的方法可以有效区分包含相似外观但真实物体的伪造图像和原始图像。它还能够检测支持不同后处理攻击的伪造图像。对于 COVERAGE 数据集,与最先进的技术相比,所提出的技术实现了高 F-Measure = 86.901% 和低误报率 (FPR) = 15.241%。使用随机样本共识 (RANSAC) 技术执行异常值去除。此外,使用相关图生成来定位伪造区域。实验结果表明,所提出的方法可以有效区分包含相似外观但真实物体的伪造图像和原始图像。它还能够检测支持不同后处理攻击的伪造图像。对于 COVERAGE 数据集,与最先进的技术相比,所提出的技术实现了高 F-Measure = 86.901% 和低误报率 (FPR) = 15.241%。使用随机样本共识 (RANSAC) 技术执行异常值去除。此外,使用相关图生成来定位伪造区域。实验结果表明,所提出的方法可以有效区分包含相似外观但真实物体的伪造图像和原始图像。它还能够检测支持不同后处理攻击的伪造图像。对于 COVERAGE 数据集,与最先进的技术相比,所提出的技术实现了高 F-Measure = 86.901% 和低误报率 (FPR) = 15.241%。实验结果表明,所提出的方法可以有效区分包含相似外观但真实物体的伪造图像和原始图像。它还能够检测支持不同后处理攻击的伪造图像。对于 COVERAGE 数据集,与最先进的技术相比,所提出的技术实现了高 F-Measure = 86.901% 和低误报率 (FPR) = 15.241%。实验结果表明,所提出的方法可以有效区分包含相似外观但真实物体的伪造图像和原始图像。它还能够检测支持不同后处理攻击的伪造图像。对于 COVERAGE 数据集,与最先进的技术相比,所提出的技术实现了高 F-Measure = 86.901% 和低误报率 (FPR) = 15.241%。

更新日期:2021-09-23
down
wechat
bug