基于主密度峰聚类的图像复制–粘贴篡改检测方法
Copy-Move Forgery Detection Based on Main Density Peak Clustering
DOI: 10.12677/aam.2026.153106, PDF,    科研立项经费支持
作者: 龙大强*, 钟域可:广东财经大学统计与数据科学学院,广东 广州;蔺 聪:广东财经大学统计与数据科学学院,广东 广州;信息技术教育部重点实验室(中山大学),广东 广州
关键词: 复制–粘贴篡改检测SIFT描述子分层匹配主密度峰聚类Copy-Move Forgery Detection SIFT Descriptors Hierarchical Feature Matching Main Density Peak Clustering
摘要: 随着图像篡改技术的不断发展,复制–粘贴篡改形式日益多样化,给篡改检测与定位带来了新的挑战。针对这一问题,本文提出了一种基于主密度峰聚类的图像复制–粘贴篡改检测方法。该方法以SIFT关键点为基础,通过降低对比度阈值与图像尺度标准化提升关键点提取数量,并采用分层特征匹配策略获取可靠的关键点匹配关系。在此基础上,引入主密度峰聚类算法对匹配关键点进行自适应分组,有效刻画关键点之间的空间结构关系。随后,结合仿射矩阵估计与几何一致性验证,实现对复制–粘贴篡改区域的准确定位。在FAU和MICC-F600数据集上的实验结果表明,本文方法在Precision、Recall和指标上均取得了较为稳定且均衡的检测性能。定量的评价指标与可视化结果验证了该方法在不同分辨率和不同篡改场景下的有效性。
Abstract: With the continuous development of image manipulation techniques, copy-move forgery has become increasingly diverse, posing new challenges to forgery detection and localization. To address this issue, this paper proposes a copy-move image forgery detection method based on main density peak clustering. The proposed method is built upon SIFT keypoints. By reducing the contrast threshold and applying image scale normalization, the number of extracted keypoints is increased, and a hierarchical feature matching strategy is adopted to obtain reliable keypoint correspondences. On this basis, a main density peak clustering algorithm is introduced to adaptively group the matched keypoints, effectively capturing the spatial structural relationships among them. Subsequently, affine transformation estimation combined with geometric consistency verification is employed to accurately localize copy-copy forged regions. Experimental results on the FAU and MICC-F600 datasets demonstrate that the proposed method achieves stable and well-balanced performance in terms of Precision, Recall, and F1. Both quantitative evaluations and visual comparisons verify the effectiveness of the proposed method under different image resolutions and forgery scenarios.
文章引用:龙大强, 蔺聪, 钟域可. 基于主密度峰聚类的图像复制–粘贴篡改检测方法[J]. 应用数学进展, 2026, 15(3): 294-305. https://doi.org/10.12677/aam.2026.153106

参考文献

[1] Guan, J., Li, S., He, X. and Chen, J. (2023) Clustering by Fast Detection of Main Density Peaks within a Peak Digraph. Information Sciences, 628, 504-521. [Google Scholar] [CrossRef
[2] Fridrich, J., Soukal, D. and Lukas, J. (2003) Detection of Copy-Move Forgery in Digital Images. Proceedings of Digital Forensic Research Workshop, 3, 652-663.
[3] Muhammad, G., Hussain, M. and Bebis, G. (2012) Passive Copy Move Image Forgery Detection Using Undecimated Dyadic Wavelet Transform. Digital Investigation, 9, 49-57. [Google Scholar] [CrossRef
[4] Emam, M., Han, Q. and Niu, X. (2016) PCET Based Copy-Move Forgery Detection in Images under Geometric Transforms. Multimedia Tools and Applications, 75, 11513-11527. [Google Scholar] [CrossRef
[5] Mahdian, B. and Saic, S. (2007) Detection of Copy-Move Forgery Using a Method Based on Blur Moment Invariants. Forensic Science International, 171, 180-189. [Google Scholar] [CrossRef] [PubMed]
[6] Ryu, S.J., Kirchner, M., Lee, M.J. and Lee, H.K. (2013) Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. IEEE Transactions on Information Forensics and Security, 8, 1355-1370. [Google Scholar] [CrossRef
[7] Cozzolino, D., Poggi, G. and Verdoliva, L. (2015) Efficient Dense-Field Copy-Move Forgery Detection. IEEE Transactions on Information Forensics and Security, 10, 2284-2297. [Google Scholar] [CrossRef
[8] Bi, X. and Pun, C. (2018) Fast Copy-Move Forgery Detection Using Local Bidirectional Coherency Error Refinement. Pattern Recognition, 81, 161-175. [Google Scholar] [CrossRef
[9] Li, Y. and Zhou, J. (2018) Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching. IEEE Transactions on Information Forensics and Security, 14, 1307-1322. [Google Scholar] [CrossRef
[10] Wang, C., Huang, Z., Qi, S., Yu, Y., Shen, G. and Zhang, Y. (2023) Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. IEEE Transactions on Information Forensics and Security, 18, 1064-1079. [Google Scholar] [CrossRef
[11] Sujin, J.S. and Sophia, S. (2024) High-Performance Image Forgery Detection via Adaptive SIFT Feature Extraction for Low-Contrast or Small or Smooth Copy-Move Region Images. Soft Computing, 28, 437-445. [Google Scholar] [CrossRef
[12] Silva, E., Carvalho, T., Ferreira, A. and Rocha, A. (2015) Going Deeper into Copy-Move Forgery Detection: Exploring Image Telltales via Multi-Scale Analysis and Voting Processes. Journal of Visual Communication and Image Representation, 29, 16-32. [Google Scholar] [CrossRef
[13] Yang, F., Li, J., Lu, W. and Weng, J. (2017) Copy-Move Forgery Detection Based on Hybrid Features. Engineering Applications of Artificial Intelligence, 59, 73-83. [Google Scholar] [CrossRef
[14] Mukherjee, S., Pal, A.K. and Maji, S. (2024) A Copy-Move Forgery Detection Technique Using DBSCAN-Based Key Point Similarity Matching. International Journal of Machine Learning and Cybernetics, 15, 5607-5634. [Google Scholar] [CrossRef
[15] Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A. and Serra, G. (2011) A Sift-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery. IEEE Transactions on Information Forensics and Security, 6, 1099-1110. [Google Scholar] [CrossRef
[16] Wang, X.Y., Li, S., Liu, Y.N., Niu, Y., Yang, H.Y. and Zhou, Z.L. (2017) A New Keypoint-Based Copy-Move Forgery Detection for Small Smooth Regions. Multimedia Tools and Applications, 76, 23353-23382. [Google Scholar] [CrossRef
[17] Lin, C., Yang, H., Huang, K., Long, D., Zhong, Y., Deng, Y., et al. (2025) Copy-Move Forgery Detection of Social Media Images Using Tendency Sparsity Filtering and Variable Cluster Spectral Clustering. Journal of Visual Communication and Image Representation, 114, Article 104635. [Google Scholar] [CrossRef
[18] Rao, Y. and Ni, J. (2016) A Deep Learning Approach to Detection of Splicing and Copy-Move Forgeries in Images. 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, 4-7 December 2016, 1-6. [Google Scholar] [CrossRef
[19] Vaishali, S. and Neetu, S. (2024) Enhanced Copy-Move Forgery Detection Using Deep Convolutional Neural Network (DCNN) Employing the Resnet-101 Transfer Learning Model. Multimedia Tools and Applications, 83, 10839-10863. [Google Scholar] [CrossRef
[20] Liu, T., Yuan, X., Xie, Z., Zhao, K., Huang, G. and Pun, C. (2024) A Two-Phase Scheme by Integration of Deep and Corner Feature for Balanced Copy-Move Forgery Localization. IEEE Transactions on Industrial Informatics, 21, 1299-1308. [Google Scholar] [CrossRef
[21] Zhang, Y., Zhu, G., Wang, X., Luo, X., Zhou, Y., Zhang, H., et al. (2022) CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/Target Distinguishment. IEEE Transactions on Circuits and Systems for Video Technology, 33, 2019-2032. [Google Scholar] [CrossRef
[22] Li, Y., He, Y., Chen, C., Dong, L., Li, B., Zhou, J., et al. (2024) Image Copy-Move Forgery Detection via Deep Patchmatch and Pairwise Ranking Learning. IEEE Transactions on Image Processing, 34, 425-440. [Google Scholar] [CrossRef] [PubMed]
[23] Wang, J., Nie, J., Jing, N., Liang, X., Wang, X., Chi, C., et al. (2025) Copy-Move Forgery Image Detection Based on Cross-Scale Modeling and Alternating Refinement. IEEE Transactions on Multimedia, 27, 5452-5465. [Google Scholar] [CrossRef
[24] Lin, C., Yang, H., Huang, K., Wu, Y., Wen, Y. and Deng, Y. (2025) Image Copy-Move Forgery Detection in the Social Media Based on a Prior Density Clustering and the Point Density. In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, 239-257. [Google Scholar] [CrossRef
[25] Shao, H.C., Liao, Y.R., Tseng, T.Y., Chuo, Y.L. and Lin, F.Y. (2025) Copy-Move Detection in Optical Microscopy: A Segmentation Network and a Dataset. IEEE Signal Processing Letters, 32, 1106-1110. [Google Scholar] [CrossRef
[26] Weng, S., Zhang, J., Zhu, T., Yu, L. and Zhang, C. (2025) DCM-Net: A Diffusion Model-Based Detection Network Integrating the Characteristics of Copy-Move Forgery. IEEE Transactions on Multimedia, 27, 503-514. [Google Scholar] [CrossRef