COVERAGE - A novel database for copy-move forgery detection
We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged-original p...
Saved in:
Published in | Proceedings - International Conference on Image Processing pp. 161 - 165 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2016
|
Subjects | |
Online Access | Get full text |
ISSN | 2381-8549 |
DOI | 10.1109/ICIP.2016.7532339 |
Cover
Abstract | We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged-original pairs are annotated with (i) the duplicated and forged region masks, and (ii) the tampering factor/similarity metric. For benchmarking, forgery quality is evaluated using (i) computer vision-based methods, and (ii) human detection performance. We also propose a novel sparsity-based metric for efficiently estimating forgery quality. Experimental results show that (a) popular forgery detection methods perform poorly over COVERAGE, and (b) the proposed sparsity based metric best correlates with human detection performance. We release the COVERAGE database to the research community. |
---|---|
AbstractList | We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged-original pairs are annotated with (i) the duplicated and forged region masks, and (ii) the tampering factor/similarity metric. For benchmarking, forgery quality is evaluated using (i) computer vision-based methods, and (ii) human detection performance. We also propose a novel sparsity-based metric for efficiently estimating forgery quality. Experimental results show that (a) popular forgery detection methods perform poorly over COVERAGE, and (b) the proposed sparsity based metric best correlates with human detection performance. We release the COVERAGE database to the research community. |
Author | Xuanjing Shen Subramanian, Ramanathan Bihan Wen Tian-Tsong Ng Ye Zhu Winkler, Stefan |
Author_xml | – sequence: 1 surname: Bihan Wen fullname: Bihan Wen organization: Adv. Digital Sci. Center, Univ. of Illinois at Urbana-Champaign, Singapore, Singapore – sequence: 2 surname: Ye Zhu fullname: Ye Zhu organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China – sequence: 3 givenname: Ramanathan surname: Subramanian fullname: Subramanian, Ramanathan organization: Adv. Digital Sci. Center, Univ. of Illinois at Urbana-Champaign, Singapore, Singapore – sequence: 4 surname: Tian-Tsong Ng fullname: Tian-Tsong Ng organization: Situational Awareness Analytics, Inst. for Infocomm Res., Singapore, Singapore – sequence: 5 surname: Xuanjing Shen fullname: Xuanjing Shen organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China – sequence: 6 givenname: Stefan surname: Winkler fullname: Winkler, Stefan organization: Adv. Digital Sci. Center, Univ. of Illinois at Urbana-Champaign, Singapore, Singapore |
BookMark | eNotj9FKw0AURFdRsK39APFlf2Dj3dxkN4tPIcQaKFREfS3buzcSaZOSBCF_b4tlHoY5DAMzFzdt17IQDxoircE9VUX1FsWgTWRTjBHdlVg6m-nEWHTOaHMtZjFmWmVp4u7EfBh-AE591DPxXGy-yvd8VUolc9l2v7yXwY9-5weWdddL6o6TOpz4OX1zP8nAI9PYdO29uK39fuDlxRfi86X8KF7VerOqinytGm3TUQUig-TJOjSBkjqlQBkRc7DADs7y5JKdhWCCBu1tTA7QoE8gdRniQjz-7zbMvD32zcH30_byFf8AKKpIRA |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/ICIP.2016.7532339 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences |
EISBN | 9781467399616 1467399612 |
EISSN | 2381-8549 |
EndPage | 165 |
ExternalDocumentID | 7532339 |
Genre | orig-research |
GroupedDBID | 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI M43 OCL RIE RIL RIO RNS |
ID | FETCH-LOGICAL-i175t-dcc63cac7936dc4f5cdc8cceed70e909090ac94b70d6d101a72c90363a4059833 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:12:17 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-dcc63cac7936dc4f5cdc8cceed70e909090ac94b70d6d101a72c90363a4059833 |
PageCount | 5 |
ParticipantIDs | ieee_primary_7532339 |
PublicationCentury | 2000 |
PublicationDate | 2016-Sept. |
PublicationDateYYYYMMDD | 2016-09-01 |
PublicationDate_xml | – month: 09 year: 2016 text: 2016-Sept. |
PublicationDecade | 2010 |
PublicationTitle | Proceedings - International Conference on Image Processing |
PublicationTitleAbbrev | ICIP |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020131 |
Score | 2.529186 |
Snippet | We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 161 |
SubjectTerms | Adaptation models Benchmark database Benchmark testing Copy-move forgery Flyback transformers Forgery Forgery quality Image Forensics Measurement Sparsity-based metric Visualization |
Title | COVERAGE - A novel database for copy-move forgery detection |
URI | https://ieeexplore.ieee.org/document/7532339 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3mauom_ycGj6bo2Sxs8jbG5CdMhTnYb7csriNoO7QT9603aOlE8SC5NoOSR8Pi-5H3vBeBMkjHPEHXeS5TLRZc8rjwZc-2igYMwikVRgW96LcdzcbXoLWpwvsmFIaJCfEaO_Sxi-TrDtb0q6xhq7fm-qkM9CFSZq7U5XNm6MVXUsuuqzmQwmVnhlnSqn368nlKAx6gJ069pS83Io7POYwc_flVk_K9d29D-TtNjsw0A7UCN0l1oVrySVV772oKLwc398LZ_OWSc9VmavdETs8pQi2DMkFaG2eqdP5tx27NZ0kxTXmi00jbMR8O7wZhXjybwB8MEcq4RpY8RGr-TGkXSQ40hWksCl5RrW4RKxIGrpTb-GAUeKhvNjQx1U6Hv70EjzVLaB-YhicD3tSDDM1AnkTAn6US6pMOwm8j4AFp2LZarsi7GslqGw7-Hj2DL7kepzzqGRv6yphMD6Hl8WuzkJxC7n4c |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedDT1E38bQ4eTde1adrgaYzpptscssluo31JQdR2aCfoX2_S1oniQXppAyWPhMf3vbzvvQCccaXN00SderGwKWsphwqHR1TaqOEgCCOWd-Abjnhvyq5n3qwC56taGKVULj5TlnnNc_kyxaU5Kmtqau24rliDdU9HFX5RrbUKr0znmDJv2bJFs9_pj410i1vlbz_uT8nh47IGw6-JC9XIo7XMIgs_fvVk_K9lW9D4LtQj4xUEbUNFJTtQK5klKf32tQ4Xndv77l37qksoaZMkfVNPxGhDDYYRTVsJpot3-qzHzZepkyZSZblKK2nA9LI76fRoeW0CfdBcIKMSkbsYovY8LpHFHkoM0Fji20rY5glRsMi3JZfaI0PfQWHyuaEmbyJw3V2oJmmi9oA4qJjvupIpzTRQxiHTsXTMbSWDoBXzaB_qZi3mi6IzxrxchoO_h09hozcZDuaD_ujmEDbN3hRqrSOoZi9LdazhPYtO8l39BKUfotg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+International+Conference+on+Image+Processing&rft.atitle=COVERAGE+-+A+novel+database+for+copy-move+forgery+detection&rft.au=Bihan+Wen&rft.au=Ye+Zhu&rft.au=Subramanian%2C+Ramanathan&rft.au=Tian-Tsong+Ng&rft.date=2016-09-01&rft.pub=IEEE&rft.eissn=2381-8549&rft.spage=161&rft.epage=165&rft_id=info:doi/10.1109%2FICIP.2016.7532339&rft.externalDocID=7532339 |