Monthly Archives: January 2019

Clones Blocks and Clones Keypoints: which one is better?

Clone detection (aka “copy-move detection”) is a very important image authentication task. Clones are a special case of image manipulation where part of an image is copied, possibly resized, rotated, sheared, etc., and then pasted to another region of the same image. The two main applications of cloning are:

  • creating multiple (fake) copies of an object through copy-paste;
  • removing an object from the scene by covering it with a cloned portion of the background.

This is explained with a very simple example in the image below.

Two possible ways of using copy-move to create a fake image.

The image forensics research community worked hard to develop techniques for clone detection, and two main approaches have been invented: block-matching and keypoint-matching. As suggested by their names, they are based on two different strategies, briefly explained below.

Block-matching approach

  1. Split the image in overlapping blocks;
  2. Compute a digest (“descriptor”) for each block, possibly robust to rotation, scaling, compression, etc.;
  3. Search for clusters of matching descriptors.

Keypoint-matching approach

  1. Detect keypoints (SIFT, SURF, BRISK, etc.) from the image;
  2. Compute keypoint local descriptors;
  3. Search for (clusters of) matching keypoints.

Which one is better? It depends, and we try to explain why with the table below:

So, if your question was: “Do I need a block- or a keypoint– based algorithm for my analysis?”, the answer is: you need both!

That’s why Amped Authenticate features both algorithms under the Local Analysis category: Clones Keypoints and Clones Blocks. Let’s compare their output on the sample image we used in this article:

We see that the cloned seagull (top row) is detected by the Clones Keypoints despite the strong down-scaling applied to the cloned object; such a geometrical transformation is too strong to be detected by Clones Blocks. On the other hand, Clones Blocks successfully detects the cloned background (bottom row), that is not detected by Clones Keypoints because the cloned area is just too flat and it does not contain enough keypoints.

We hope you enjoyed this quick tip! Stay tuned and don’t miss our next #ampedtiptuesday post!

Introducing our New Tip Tuesday Series

Happy New Year – this is our first post of 2019!

We are present in many industry and partner events worldwide, but unfortunately, we can’t always meet our global customers face to face to show you how to get the most out of your Amped solutions. So we’ve created a new blog series called Tip Tuesday (#ampedtiptuesday). We hope this year will be full of useful tips and tricks for all our solutions.

We will teach you things in Amped FIVE like how to organize and customize the panels, how to use the Assistant, how to use the concatenation in Covert DVR, and the Screen Capture tool.

For Amped Authenticate, you will learn about differences between Clones Blocks and Clones Keypoints, how to find reference images for your case, how to use PRNU on images gathered from social media, and how some minor metadata may tell more than it seems.

And much much more!

If you have suggestions for things you would like to learn about, send them our way!

Our first tip will be published next Tuesday – don’t miss it!