Efficient hybrid passive method for the detection and localization of copy-move and spliced images

Efficient hybrid passive method for the detection and localization of copy-move and spliced images

Digital passive image forgery methods are extensively used to verify the authenticity and integrity of images. Splicing and copy-move are the most common types of passive digital image forgeries. Several approaches have been proposed to detect these forgeries separately, but very few approaches are available that can detect them simultaneously. However, a more efficient method is still in demand to meet the day-to-day challenges to detect these forgeries at the same time. So, a passive hybrid approach based on discrete fractional cosine transform (DFrCT) and local binary pattern (LBP) is proposed to detect copy-move and splicing forgeries simultaneously. The extra parameter i.e. fractional parameter of DFrCT is utilized to enhance the accuracy and LBP is used to highlight the tampering artifacts effectively. Then, a support vector machine (SVM) is employed to categorize the images into authentic, copy-move, and spliced images. Next, localization is performed on both the copy-move and spliced images to localize the duplicated areas in the image. Experiments on six benchmark datasets, namely, CASIA v1.0, GRIP, CASIA v2.0, IMD, COVERAGE, and Columbia, attain accuracy rates of 99.67%, 99.23%, 99.76%, 98.81%, 95%, and 98.17%, respectively. To validate the effectiveness of the proposed method, comparative analysis has been performed with existing methods in terms of ROC, precision, recall, F1 score, F2 score, and accuracy. Moreover, the robustness of the proposed work is tested under rotation attack and better results are attained in comparison to the existing techniques

___

  • [1] Prakash CS, Kumar A, Maheshkar S, Maheshkar V. An integrated method of copy-move and splicing for image forgery detection. Multimedia Tools and Applications 2018; 77 (20): 26939-26963. doi: 10.1007/s11042-018-5899-3
  • [2] Teerakanok S, Uehara T. Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis. IEEE Access 2019; 7 (1): 40550-40568. doi: 10.1109/ACCESS.2019.2907316
  • [3] Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G et al. Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing 2017; 11 (1): 81-88. doi: 10.1007/s11760-016-0899-0
  • [4] He Z, Lu W, Sun W, Huang J. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition 2012; 45 (12): 4292-4299. doi: 10.1016/j.patcog.2012.05.014
  • [5] Zhang Q, Lu W, Weng J. Joint image splicing detection in DCT and Contourlet transform domain. Journal of Visual Communication and Image Representation 2016; 40 (1): 449-458. doi: 10.1016/j.jvcir.2016.07.013
  • [6] Agarwal S, Chand S. Image forgery detection using Markov features in undecimated wavelet transform. In: 2016 Ninth International Conference on Contemporary Computing (IC3); Noida, India; 2016. pp. 1-6.
  • [7] El-Alfy ES, Qureshi MA. Robust content authentication of gray and color images using lbp-dct markov-based features. Multimedia Tools and Applications 2017; 76 (12): 14535-14556. doi: 10.1007/s11042-016-3855-7
  • [8] Sheng H, Shen X, Lyu Y, Shi Z, Ma S. Image splicing detection based on Markov features in discrete octonion cosine transform domain. IET Image Processing 2018; 12 (10): 1815-1823. doi: 10.1049/iet-ipr.2017.1131
  • [9] Sun Y, Ni R, Zhao Y. Nonoverlapping blocks based copy-move forgery detection. Security and Communication Networks 2018; 2018 (1): 1-11. doi: 10.1155/2018/1301290
  • [10] Lamba AK, Jindal N, Sharma S. Digital image copy-move forgery detection based on discrete fractional wavelet transform. Turkish Journal of Electrical Engineering & Computer Science 2018; 26 (3): 1261-1277. doi: 10.3906/elk- 1701-275
  • [11] Pan X, Lyu S. Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security 2010; 5 (4): 857-867. doi: 10.1109/TIFS.2010.2078506
  • [12] Yang F, Li J, Lu W, Weng J. Copy-move forgery detection based on hybrid features. Engineering Applications of Artificial Intelligence 2017; 59 (1): 73-83. doi: 10.1016/j.engappai.2016.12.022
  • [13] Prakash CS, Panzade PP, Om H, Maheshkar S. Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multimedia Tools and Applications 2019; 78 (16): 23535-23558. doi: 10.1007/s11042-019-7629-x
  • 14] Li Y, Zhou J. Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Transactions on Information Forensics and Security 2018; 14 (5): 1307-1322. doi: 10.1109/TIFS.2018.2876837
  • [15] Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G. A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 2011; 6 (3): 1099-1110. doi: 10.1109/TIFS.2011.2129512
  • [16] Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery de- tection approaches. IEEE Transactions on Information Forensics and Security 2012; 7 (6): 1841-1854. doi: 10.1109/TIFS.2012.2218597
  • [17] Li J, Li X, Yang B, Sun X. Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 2014; 10 (3): 507-518. doi: 10.1109/TIFS.2014.2381872
  • [18] Cozzolino D, Poggi G, Verdoliva L. Efficient dense-field copy–move forgery detection. IEEE Transactions on Information Forensics and Security 2015; 10 (11): 2284-2297. doi: 10.1109/TIFS.2015.2455334
  • [19] Emam M, Han Q, Niu X. PCET based copy-move forgery detection in images under geometric transforms. Multi- media Tools and Applications 2016; 75 (18): 11513-11527. doi: 10.1007/s11042-015-2872-2
  • [20] Zandi M, Mahmoudi-Aznaveh A, Talebpour A. Iterative copy-move forgery detection based on a new inter- est point detector. IEEE Transactions on Information Forensics and Security 2016; 11 (11): 2499-2512. doi: 10.1109/TIFS.2016.2585118
  • [21] Zhang Y, Zhao C, Pi Y, Li S. Revealing image splicing forgery using local binary patterns of DCT coefficients. In: Communications, Signal Processing, and Systems; Springer, New York, NY; 2012. pp. 181-189.
  • [22] Alahmadi AA, Hussain M, Aboalsamh H, Muhammad G, Bebis G. Splicing image forgery detection based on DCT and Local Binary Pattern. In: IEEE 2013 Global Conference on Signal and Information Processing; Austin, TX, USA; 2013. pp. 253-256.
  • [23] Muhammad G, Al-Hammadi MH, Hussain M, Bebis G. Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications 2014; 25 (4): 985-995. doi: 10.1007/s00138-013-0547-4
  • [24] Jindal N, Singh K. Image and video processing using discrete fractional transforms. Signal, Image and Video Processing 2014; 8 (8): 1543-1553. doi: 10.1007/s11760-012-0391-4
  • [25] Singh K, Saxena RG. Performance of discrete fractional Fourier transform classes in signal processing applications, PhD, Thapar Institute of Engineering and Technology, Patiala, Punjab, India, 2006.
  • [26] Rhee KH. Median filtering detection based on variations and residuals in image forensics. Turkish Journal of Electrical Engineering & Computer Science 2017; 25 (5): 3811-3826. doi:10.3906/elk-1606-410
  • [27] Chang CC, Lin CJ. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent systems and technology 2011; 2 (3): 1-27. doi: 10.1145/1961189.1961199
  • [28] Pun CM, Yuan XC, Bi XL. Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security 2015; 10 (8): 1705-1716. doi: 10.1109/TIFS.2015.2423261
  • [29] Han CY. Improved SLIC imagine segmentation algorithm based on K-means. Cluster Computing 2017; 20 (2): 1017-1023. doi: 10.1007/s10586-017-0792-9
  • [30] Jindal N, Singh K. Digital image forensics-gateway to authenticity: Crafted with observations, trends and forecasts. In: Singh AK, Mohan A (editors). Handbook of Multimedia Information Security: Techniques and Applications, Springer, Cham, 2019, pp. 681-701.
  • [31] Rublee E, Rabaud V, Konolige K, Bradski GR. ORB: An efficient alternative to SIFT or SURF. In: IEEE 2011 International Conference on Computer Vision; Barcelona, Spain; 2011. pp. 2564-2571.
  • [32] Sujatha P, Sudha KK. Performance analysis of different edge detection techniques for image segmentation. Indian Journal of Science and Technology 2015; 8 (14): 1-6. doi: 10.17485/ijst/2015/v8i14/72946
  • [33] Dong J, Wang W, Tan T. Casia image tampering detection evaluation database. In: IEEE 2013 China Summit and International Conference on Signal and Information Processing; Beijing, China; 2013. pp. 422-426.
  • [34] Hsu YF, Chang SF. Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE 2006 International Conference on Multimedia and Expo; Toronto, Ont., Canada; 2006. pp. 549-552.
  • [35] Wen B, Zhu Y, Subramanian R, Ng TT, Shen X et al. COVERAGE-A novel database for copy-move forgery detection. In: IEEE 2016 International Conference on Image Processing; Phoenix, AZ, USA; 2016. pp. 161-165.
  • [36] Bozkurt I, Bozkurt MH, Ulutas G. A new video forgery detection approach based on forgery line. Turkish Journal of Electrical Engineering & Computer Sciences 2017; 25 (6): 4558-4574. doi: 10.3906/elk-1703-125
  • [37] Alahmadi A, Hussain M, Aboalsamh HA, Zuair M. PCAPooL: unsupervised feature learning for face recogni- tion using PCA, LBP, and pyramid pooling. Pattern Analysis and Applications 2019; 23 (1) : 673–682. doi: 10.1007/s10044-019-00818-y
  • [38] Pham NT, Lee JW, Kwon GR, Park CS. Hybrid image-retrieval method for image-splicing validation. Symmetry 2019; 11 (83): 1-15. doi: 10.3390/sym11010083