• Laser & Optoelectronics Progress
  • Vol. 57, Issue 10, 101102 (2020)
Jing Wang, Yuchen Zhang, Zhanqiang Huo*, and Liqin Jia
Author Affiliations
  • College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan 454003, China
  • show less
    DOI: 10.3788/LOP57.101102 Cite this Article Set citation alerts
    Jing Wang, Yuchen Zhang, Zhanqiang Huo, Liqin Jia. Image Tampering Detection Method Based on Approximate Nearest Neighbor Search[J]. Laser & Optoelectronics Progress, 2020, 57(10): 101102 Copy Citation Text show less
    Feature matching steps. (a) Initialization; (b) propagation; (c) random search
    Fig. 1. Feature matching steps. (a) Initialization; (b) propagation; (c) random search
    Detection results of the algorithm on rotation transform operation. (a) Original image; (b) tampering image (rotation 90°); (c) matching result; (d) detection result
    Fig. 2. Detection results of the algorithm on rotation transform operation. (a) Original image; (b) tampering image (rotation 90°); (c) matching result; (d) detection result
    Detection results of the algorithm on scaling transformation operation. (a) Original image; (b) tampering image (reduced by 80%); (c) matching result; (d) detection result
    Fig. 3. Detection results of the algorithm on scaling transformation operation. (a) Original image; (b) tampering image (reduced by 80%); (c) matching result; (d) detection result
    Detection results of the algorithm on mirror transformation operation. (a) Original image; (b) mirror image (horizontal); (c) matching result; (d) detection result
    Fig. 4. Detection results of the algorithm on mirror transformation operation. (a) Original image; (b) mirror image (horizontal); (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region I transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Fig. 5. Detection results of the algorithm for multi-region I transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region II transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Fig. 6. Detection results of the algorithm for multi-region II transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region mirroring I transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Fig. 7. Detection results of the algorithm for multi-region mirroring I transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Detection results of the algorithm for multi-region mirroring II transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    Fig. 8. Detection results of the algorithm for multi-region mirroring II transform operation. (a) Original image; (b) tampering image; (c) matching result; (d) detection result
    ParameterValueExplanation
    Td50Minimum distance of tampered area
    τ360Minimum threshold of minimumsquare linear model
    Tm1000Minimum radius of tampered area
    ρm5Radius of median filter
    ρe8Regional radius of minimumsquare linear model
    Table 1. Experimental parameters
    AlgorithmRotate90°Zoom80%Multi-regionⅠMulti-region Ⅱ
    Ref. [4]81.3450.1454.1562.12
    Ref. [2]79.1784.2379.3184.13
    Ref. [6]85.5483.5491.2392.15
    This algorithm94.7690.4593.7593.12
    Table 2. F-measure of algorithm detection under different tampering operations%
    AlgorithmRotateZoomMulti-regionⅠMulti-regionⅡ
    Ref. [4]39.8777.49507.45511.94
    Ref. [2]53.9156.84110.67146.78
    Ref. [6]34.0243.62303.87297.59
    This algorithm27.2833.1972.9481.85
    Table 3. Comparison of average running time of different algorithmss
    AlgorithmF-measureTime /s
    Mirrorimage /%Multi mirrorimage /%
    Ref. [11]90.6253.46140.43
    Ref. [12]84.4372.90165.72
    Ref. [13]91.1275.12179.32
    This algorithm94.4993.5280.97
    Table 4. Comparison of tampering detection performance of different algorithms under mirror operation
    Jing Wang, Yuchen Zhang, Zhanqiang Huo, Liqin Jia. Image Tampering Detection Method Based on Approximate Nearest Neighbor Search[J]. Laser & Optoelectronics Progress, 2020, 57(10): 101102
    Download Citation