Journal on Communications ›› 2016, Vol. 37 ›› Issue (Z1): 132-139.doi: 10.11959/j.issn.1000-436x.2016259

• Contents Papers • Previous Articles     Next Articles

Detection of image copy-move forgery using local intensity order pattern

Jing LIN1,Tian-qiang HUANG2,3(),Ling-peng LIN2,3,Xiao-chen1 LI1   

  1. 1 School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350007,China
    2 Faculty of Software,Fujian Normal University,Fuzhou 350007,China
    3 Fujian Provincial University Engineering Research Center of Big Data Analysis and Application,Fujian Normal University,Fuzhou 350007,China
  • Online:2016-10-25 Published:2017-01-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;Industry-University Coopera-tion Major Projects in Fujian Province;Science and Technology Program of Fujian;Program for New Century Excellent Talents in University in Fujian Province;The Science and Technology Department of Fujian Province K-Class Foundation Project;The Education Department of Fujian Province A-Class Foundation Project;The Graduate Education Reform Project of Fujian Normal University

Abstract:

Copy-move forgery was one of the most simple and common way of image manipulations.To improve the ro-bustness of most existing copy-move forgery detections,a new method based on local intensity order pattern was pro-posed.First,the LIOP feature descriptors were exacted from the inspected image.Then the angular cosine of feature de-scriptors were used to measure the similarity,and the stable matching points were found according to the distance ratio threshold of the nearest neighbor point to the second nearest neighbor.Finally,the space distance of the matching points were calculated to remove the false matching points.Extensive experimental results were presented to confirm that the proposed method is not only able to effectively identify and locate the altered area,but also have high accuracy and ro-bust to scaling,rotation,brightness change and some post-processing,such as Gaussian blur,additive white Gaussian noise and JPEG compression.

Key words: image tampering detection, copy-move forgery, feature description, local intensity order pattern

No Suggested Reading articles found!