Skip to main content

Zernike Moment-Based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors

  • Conference paper
  • First Online:
Computational Science and Its Applications -- ICCSA 2015 (ICCSA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9158))

Included in the following conference series:

Abstract

In the paper, the approach is focused on the Zernike Moment-based model of ROI image (Region of Interest) and its parameters for an efficient image processing in the forensic issue. By considering the factors affecting the identification of an duplicated image, the change of ROI’s size is determined through the proposed algorithm. The proposed technique has shown a good improvement in reducing significantly Geometrical Errors (G.E) and Numerical Errors (N.E) performed better than that of the Zernike-based traditional technique. The duplicated detection program has been written by C++ and supporting OpenCV and Boost libraries that help to verify the images authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Popescu, A.C., Farid, H.: Exposing Digital Forgeries in Color Filter Array Interpolated Images. IEEE Trans. Signal Processing 53(10), October 2005

    Google Scholar 

  2. Sheng, Y., Shen, L.: Orthogonal Fourier-Mellin moments for invariant pattern recognition. J. Opt. Soc. Am. A 11, 1748–1757 (1994)

    Article  Google Scholar 

  3. Farid, H.: Image Forgery Detection- A survey. IEEE Signal Processing Magazine 26(2), 16–25 (2009)

    Article  Google Scholar 

  4. Chong, C.-W.: A formulation of a new class of continuous orthogonal moment invariants, and the analysis of their computational aspects. Ph.D thesis, Faculty of Engineering, University of Malaya, 50603 Kuala Lumpur, Malaysia, May 2003

    Google Scholar 

  5. Liao, S.X., Pawlak, M.: On the accuracy of Zernike moments for image analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(12), 1358–1364 (1998)

    Article  Google Scholar 

  6. Chong, C.W., Raveendran, P., Mukundan, R.: A comparative analysis of algorithm for fast computation of Zernike moments. Pattern Recognition. 36(3), 731–742 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  7. Papakostas, G.A., Boutalisn, Y.S., Papaodysseus, C.N., Fragoulis, D.K.: Numerical error analysis in Zernike moments computation. Image and Vision Computing 24 (2006)

    Google Scholar 

  8. Teh, C.H., Chin, R.T.: On image analysis by the methods of moments. Pattern Analysis and Machine Intelligence 10(4), 496–513 (1988)

    Article  MATH  Google Scholar 

  9. http://www.lumetrics.com/documents/wavefront/Zernike_table.pdf

  10. Chong-Yaw, W., Paramesran, R.: On the computational aspects of Zernike moments. Image Vision Computing 25(6), 967–980 (2007)

    Article  Google Scholar 

  11. Arai, K., Barakbah, A.R.: Hierarchical K-means: an algorithm for centroids initialization for K-means. Reports of the Faculty of Science and Engineering, Saga University, pp. 840–8502 Saga Prefecture, Saga, Japan, 36, (1), (2007)

    Google Scholar 

  12. Liao, S.: Image analysis by moments. Ph.D thesis, University of Manitoba, Winnipeg, Manitoba, Canada (1993)

    Google Scholar 

  13. Kirschenhofer, P., Prodinger, H., Martınez, C.: Analysis of Hoare’s FIND Algorithm with Median-of-Three Partition. Journal Random Structures and Algorithm 10(1–2), 143–156 (1997)

    Article  MATH  Google Scholar 

  14. Thacker, N.A., Aherne, F.J., Rockett, P.I.: The Bhattacharyya Metric as an Absolute Similarity Measure for Frequency Coded Data. TIPR 1997, pp. 9–11, Prague, June, 1997

    Google Scholar 

  15. Amerini, I., Ballan, L., Caldelli, R., Bimbo, A.D., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Security 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  16. Christlein, V., Riess, C., et al.: An Evaluation of Popular Copy-Move Forgery Detection Approaches. IEEE Transactions on Information Forensics and Security 7(6), 1841–1854 (2012)

    Article  Google Scholar 

  17. http://www.italiadavay.ru/public/images/marche/marche_san_lorenzo.jpg

  18. http://www.nacht-der-wissenschaften.de/2011/ansicht.php?id=%20%20%20%20%20%20%20%20101

  19. http://www.sggp.org.vn/anninhtrattu/2014/2/340316/

  20. http://www.arxiv.org/pdf/1208.3665

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thuong Le-Tien .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Le-Tien, T., Huynh-Ngoc, T., Huynh-Kha, T., Marie, L. (2015). Zernike Moment-Based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2015. ICCSA 2015. Lecture Notes in Computer Science(), vol 9158. Springer, Cham. https://doi.org/10.1007/978-3-319-21410-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21410-8_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21409-2

  • Online ISBN: 978-3-319-21410-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics