COVERAGE - A novel database for copy-move forgery detection

We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged-original p...

Full description

Saved in:
Bibliographic Details
Published inProceedings - International Conference on Image Processing pp. 161 - 165
Main Authors Bihan Wen, Ye Zhu, Subramanian, Ramanathan, Tian-Tsong Ng, Xuanjing Shen, Winkler, Stefan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2016
Subjects
Online AccessGet full text
ISSN2381-8549
DOI10.1109/ICIP.2016.7532339

Cover

Abstract We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged-original pairs are annotated with (i) the duplicated and forged region masks, and (ii) the tampering factor/similarity metric. For benchmarking, forgery quality is evaluated using (i) computer vision-based methods, and (ii) human detection performance. We also propose a novel sparsity-based metric for efficiently estimating forgery quality. Experimental results show that (a) popular forgery detection methods perform poorly over COVERAGE, and (b) the proposed sparsity based metric best correlates with human detection performance. We release the COVERAGE database to the research community.
AbstractList We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged-original pairs are annotated with (i) the duplicated and forged region masks, and (ii) the tampering factor/similarity metric. For benchmarking, forgery quality is evaluated using (i) computer vision-based methods, and (ii) human detection performance. We also propose a novel sparsity-based metric for efficiently estimating forgery quality. Experimental results show that (a) popular forgery detection methods perform poorly over COVERAGE, and (b) the proposed sparsity based metric best correlates with human detection performance. We release the COVERAGE database to the research community.
Author Xuanjing Shen
Subramanian, Ramanathan
Bihan Wen
Tian-Tsong Ng
Ye Zhu
Winkler, Stefan
Author_xml – sequence: 1
  surname: Bihan Wen
  fullname: Bihan Wen
  organization: Adv. Digital Sci. Center, Univ. of Illinois at Urbana-Champaign, Singapore, Singapore
– sequence: 2
  surname: Ye Zhu
  fullname: Ye Zhu
  organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
– sequence: 3
  givenname: Ramanathan
  surname: Subramanian
  fullname: Subramanian, Ramanathan
  organization: Adv. Digital Sci. Center, Univ. of Illinois at Urbana-Champaign, Singapore, Singapore
– sequence: 4
  surname: Tian-Tsong Ng
  fullname: Tian-Tsong Ng
  organization: Situational Awareness Analytics, Inst. for Infocomm Res., Singapore, Singapore
– sequence: 5
  surname: Xuanjing Shen
  fullname: Xuanjing Shen
  organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
– sequence: 6
  givenname: Stefan
  surname: Winkler
  fullname: Winkler, Stefan
  organization: Adv. Digital Sci. Center, Univ. of Illinois at Urbana-Champaign, Singapore, Singapore
BookMark eNotj9FKw0AURFdRsK39APFlf2Dj3dxkN4tPIcQaKFREfS3buzcSaZOSBCF_b4tlHoY5DAMzFzdt17IQDxoircE9VUX1FsWgTWRTjBHdlVg6m-nEWHTOaHMtZjFmWmVp4u7EfBh-AE591DPxXGy-yvd8VUolc9l2v7yXwY9-5weWdddL6o6TOpz4OX1zP8nAI9PYdO29uK39fuDlxRfi86X8KF7VerOqinytGm3TUQUig-TJOjSBkjqlQBkRc7DADs7y5JKdhWCCBu1tTA7QoE8gdRniQjz-7zbMvD32zcH30_byFf8AKKpIRA
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ICIP.2016.7532339
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
EISBN 9781467399616
1467399612
EISSN 2381-8549
EndPage 165
ExternalDocumentID 7532339
Genre orig-research
GroupedDBID 29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i175t-dcc63cac7936dc4f5cdc8cceed70e909090ac94b70d6d101a72c90363a4059833
IEDL.DBID RIE
IngestDate Wed Aug 27 02:12:17 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-dcc63cac7936dc4f5cdc8cceed70e909090ac94b70d6d101a72c90363a4059833
PageCount 5
ParticipantIDs ieee_primary_7532339
PublicationCentury 2000
PublicationDate 2016-Sept.
PublicationDateYYYYMMDD 2016-09-01
PublicationDate_xml – month: 09
  year: 2016
  text: 2016-Sept.
PublicationDecade 2010
PublicationTitle Proceedings - International Conference on Image Processing
PublicationTitleAbbrev ICIP
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020131
Score 2.529186
Snippet We present COVERAGE - a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to...
SourceID ieee
SourceType Publisher
StartPage 161
SubjectTerms Adaptation models
Benchmark database
Benchmark testing
Copy-move forgery
Flyback transformers
Forgery
Forgery quality
Image Forensics
Measurement
Sparsity-based metric
Visualization
Title COVERAGE - A novel database for copy-move forgery detection
URI https://ieeexplore.ieee.org/document/7532339
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3mauom_ycGj6bo2Sxs8jbG5CdMhTnYb7csriNoO7QT9603aOlE8SC5NoOSR8Pi-5H3vBeBMkjHPEHXeS5TLRZc8rjwZc-2igYMwikVRgW96LcdzcbXoLWpwvsmFIaJCfEaO_Sxi-TrDtb0q6xhq7fm-qkM9CFSZq7U5XNm6MVXUsuuqzmQwmVnhlnSqn368nlKAx6gJ069pS83Io7POYwc_flVk_K9d29D-TtNjsw0A7UCN0l1oVrySVV772oKLwc398LZ_OWSc9VmavdETs8pQi2DMkFaG2eqdP5tx27NZ0kxTXmi00jbMR8O7wZhXjybwB8MEcq4RpY8RGr-TGkXSQ40hWksCl5RrW4RKxIGrpTb-GAUeKhvNjQx1U6Hv70EjzVLaB-YhicD3tSDDM1AnkTAn6US6pMOwm8j4AFp2LZarsi7GslqGw7-Hj2DL7kepzzqGRv6yphMD6Hl8WuzkJxC7n4c
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedDT1E38bQ4eTde1adrgaYzpptscssluo31JQdR2aCfoX2_S1oniQXppAyWPhMf3vbzvvQCccaXN00SderGwKWsphwqHR1TaqOEgCCOWd-Abjnhvyq5n3qwC56taGKVULj5TlnnNc_kyxaU5Kmtqau24rliDdU9HFX5RrbUKr0znmDJv2bJFs9_pj410i1vlbz_uT8nh47IGw6-JC9XIo7XMIgs_fvVk_K9lW9D4LtQj4xUEbUNFJTtQK5klKf32tQ4Xndv77l37qksoaZMkfVNPxGhDDYYRTVsJpot3-qzHzZepkyZSZblKK2nA9LI76fRoeW0CfdBcIKMSkbsYovY8LpHFHkoM0Fji20rY5glRsMi3JZfaI0PfQWHyuaEmbyJw3V2oJmmi9oA4qJjvupIpzTRQxiHTsXTMbSWDoBXzaB_qZi3mi6IzxrxchoO_h09hozcZDuaD_ujmEDbN3hRqrSOoZi9LdazhPYtO8l39BKUfotg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+International+Conference+on+Image+Processing&rft.atitle=COVERAGE+-+A+novel+database+for+copy-move+forgery+detection&rft.au=Bihan+Wen&rft.au=Ye+Zhu&rft.au=Subramanian%2C+Ramanathan&rft.au=Tian-Tsong+Ng&rft.date=2016-09-01&rft.pub=IEEE&rft.eissn=2381-8549&rft.spage=161&rft.epage=165&rft_id=info:doi/10.1109%2FICIP.2016.7532339&rft.externalDocID=7532339