A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection


KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 5, pp. 163-172, May. 2014
10.3745/KTCCS.2014.3.5.163,   PDF Download:

Abstract

The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such atransform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has beenmade one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable ofidentifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used tohide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-moveforgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker todelude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelitybetween the processed images and original ones under the semantic constraints. The effiiency of the proposed method is supported byseveral experiments on the test images with various parameter settings.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
M. Doyoddorj, "A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection," KIPS Transactions on Computer and Communication Systems, vol. 3, no. 5, pp. 163-172, 2014. DOI: 10.3745/KTCCS.2014.3.5.163.

[ACM Style]
Munkhbaatar Doyoddorj. 2014. A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection. KIPS Transactions on Computer and Communication Systems, 3, 5, (2014), 163-172. DOI: 10.3745/KTCCS.2014.3.5.163.