Laser & Optoelectronics Progress, Volume. 57, Issue 10, 101102(2020)

Image Tampering Detection Method Based on Approximate Nearest Neighbor Search

Jing Wang, Yuchen Zhang, Zhanqiang Huo*, and Liqin Jia
Author Affiliations
  • College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan 454003, China
  • show less
    Figures & Tables(12)
    Feature matching steps. (a) Initialization; (b) propagation; (c) random search
    Detection results of the algorithm on rotation transform operation. (a) Original image; (b) tampering image (rotation 90°); (c) matching result; (d) detection result
    Detection results of the algorithm on scaling transformation operation. (a) Original image; (b) tampering image (reduced by 80%); (c) matching result; (d) detection result
    Detection results of the algorithm on mirror transformation operation. (a) Original image; (b) mirror image (horizontal); (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region I transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region II transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region mirroring I transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region mirroring II transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    • Table 1. Experimental parameters

      View table

      Table 1. Experimental parameters

      ParameterValueExplanation
      Td50Minimum distance of tampered area
      τ360Minimum threshold of minimumsquare linear model
      Tm1000Minimum radius of tampered area
      ρm5Radius of median filter
      ρe8Regional radius of minimumsquare linear model
    • Table 2. F-measure of algorithm detection under different tampering operations%

      View table

      Table 2. F-measure of algorithm detection under different tampering operations%

      AlgorithmRotate90°Zoom80%Multi-regionⅠMulti-region Ⅱ
      Ref. [4]81.3450.1454.1562.12
      Ref. [2]79.1784.2379.3184.13
      Ref. [6]85.5483.5491.2392.15
      This algorithm94.7690.4593.7593.12
    • Table 3. Comparison of average running time of different algorithmss

      View table

      Table 3. Comparison of average running time of different algorithmss

      AlgorithmRotateZoomMulti-regionⅠMulti-regionⅡ
      Ref. [4]39.8777.49507.45511.94
      Ref. [2]53.9156.84110.67146.78
      Ref. [6]34.0243.62303.87297.59
      This algorithm27.2833.1972.9481.85
    • Table 4. Comparison of tampering detection performance of different algorithms under mirror operation

      View table

      Table 4. Comparison of tampering detection performance of different algorithms under mirror operation

      AlgorithmF-measureTime /s
      Mirrorimage /%Multi mirrorimage /%
      Ref. [11]90.6253.46140.43
      Ref. [12]84.4372.90165.72
      Ref. [13]91.1275.12179.32
      This algorithm94.4993.5280.97
    Tools

    Get Citation

    Copy Citation Text

    Jing Wang, Yuchen Zhang, Zhanqiang Huo, Liqin Jia. Image Tampering Detection Method Based on Approximate Nearest Neighbor Search[J]. Laser & Optoelectronics Progress, 2020, 57(10): 101102

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Imaging Systems

    Received: Aug. 13, 2019

    Accepted: Oct. 11, 2019

    Published Online: May. 8, 2020

    The Author Email: Zhanqiang Huo (hzq@hpu.edu.cn)

    DOI:10.3788/LOP57.101102

    Topics