A SIFT-based forensic method for copy-move detection

In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opinion. Image forensics tools provide answers to similar questions. We are working on a novel method that focuses in particular on the problem of detecting if a feigned image has been created by cloning an area of the image onto another zone to make a duplication or to cancel something awkward.

 

The proposed approach is based on SIFT features and allows both to understand if a copy-move attack has occurred and which are the image points involved, and, furthermore, to recover which has been the geometric transformation happened to perform cloning, by computing the transformation parameters. In fact when a copy-move attack takes place, usually an affine transformation is applied to the image patch selected to fit in a specified position according to that context. Our experimental results confirm that the technique is able to precisely individuate the altered area and, in addition, to estimate the geometric transformation parameters with high reliability. The method also deals with multiple cloning.

Demo video:

 

Related publications:

 

Code

We release the MATLAB implementation of the copy-move detection approach presented in Amerini et al., TIFS 2011. We provide some scripts to replicate the detection experiments reported in our paper, and also some functions for copy-move detection in a single image. Please note that our code use several public functions and libraries developed by other authors; regarding these files, for any problem or license information, please refer to the respective authors.

MICC-CMFD-1.0.zip – released May 8, 2012   (tested on Linux Ubuntu 10.04) If you use our software or these datasets, please cite the paper: I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, G. Serra. “A SIFT-based forensic method for copy-move attack detection and transformation recovery”, IEEE Transactions on Information Forensics and Security, vol. 6, iss. 3, pp. 1099-1110, 2011.

Datasets

  • MICC-F220: this dataset is composed by 220 images; 110 are tampered and 110 originals.
  • MICC-F2000: this dataset is composed by 2000 images; 700 are tampered and 1300 originals.
  • MICC-F8multi: 8 tampered images with realistic multiple cloning.
  • MICC-F600: this dataset is composed by 600 high resolution images containing realistic and challenging copy-move attacks; 160 are tampered images and 440 are originals. This file is password protected so send me an e-mail requesting the password if you are interested.