Abstract
Digital images were considered as authentic proof of evidence some years ago but advancement in technology has made image tampering an easy task for every user. Investigation of the digital images for forgery detection, and authenticate their genuineness is need of the hour. To address this issue, the paper proposes a new block-based technique for image splicing detection. In this technique, first the image is converted to YCbCr format and chrominance component of the image is extracted. This component is segmented in overlapping blocks to extract local features. The paper proposes to use a new texture descriptor named as otsu based enhanced local ternary pattern (OELTP) for feature extraction from these blocks. OELTP uses an optimal threshold value to improve the enhanced local ternary pattern (ELTP) texture descriptor, for better detection of image forgery. Further, the paper proposes to use energy for reducing dimensionality of features, instead of using complex computations as used in earlier techniques. Finally, the features are sorted for speedy classification and fed to support vector machine (SVM) for labelling the images either as authentic or forged. The proposed technique has been tested on varying groups of data from the benchmark dataset(s) and has achieved an accuracy upto 98.25%. To demonstrate the superiority of proposed technique, results are also compared with the state-of-the-art techniques.
Similar content being viewed by others
References
Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern. SIViP 11(1):81–88. https://doi.org/10.1007/s11760-016-0899-0
BT RIR (1990) Studio encoding parameters of digital television for standard 4: 3 and wide-screen 16: 9 aspect ratios
Cavalin P, Oliveira LS (2017) A review of texture classification methods and databases. In: 2017 30th SIBGRAPI Conference on graphics, patterns and images tutorials (SIBGRAPI-T). IEEE, pp 1–8
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297
Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit & international conference on signal and information processing (ChinaSIP). IEEE, pp 422–426
Farid H (2006) Digital doctoring: how to tell the real from the fake. Significance 3(4):162–166
Farid H (2010) Photo tampering throughout history, accessed 14.05.18 http://www.cs.dartmouth.edu/farid/research/digitaltampering
Goh J, Thing VL (2015) A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection
Hakimi F, Hariri M, Azad I (2015) Image-splicing forgery detection based on improved LBP and K-nearest neighbors algorithm
Hakimi F, Hariri M, GharehBaghi F (2015) Image splicing forgery detection using local binary pattern and discrete wavelet transform, pp 1–4. https://doi.org/10.1109/KBEI.2015.7436195
He Z, Sun W, Lu W, Lu H (2011) Digital image splicing detection based on approximate run length. Pattern Recogn Lett 32(12):1591–1597. https://doi.org/10.1016/j.patrec.2011.05.013
He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn 45(12):4292–4299. https://doi.org/10.1016/j.patcog.2012.05.014
Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: International conference on multimedia and expo
Kanwal N, Girdhar A, Kaur L, Bhullar J (2017) A taxonomy and analysis of digital image forgery detection techniques. Journal of Engineering, Science and Technology
Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in dct domain. Int J Phys Sci 5(17):2543–2554
Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in dct domain for face and palmprint recognition. In: 2010 International conference on information and communication technology convergence (ICTC). IEEE, pp 467–471
Li C, Ma Q, Xiao L, Li M, Zhang A (2017) Image splicing detection based on Markov features in QDCT domain. Neurocomputing 228:29–36. https://doi.org/10.1016/j.neucom.2016.04.068
Mayer O, Stamm MC (2018) Accurate and efficient image forgery detection using lateral chromatic aberration. IEEE Trans Inform Forens Secur 13(7):1762–1777. https://doi.org/10.1109/TIFS.2018.2799421
Moghaddasi Z, Jalab HA, Md Noor R, Aghabozorgi S (2014) Improving RLRN image splicing detection with the use of PCA and kernel PCA. Sci World J, 2014. https://doi.org/10.1155/2014/606570
Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995. https://doi.org/10.1007/s00138-013-0547-4
Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987
Qureshi MA, Deriche M (2015) A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun 39:46–74. https://doi.org/10.1016/j.image.2015.08.008
Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51(1):133–162. https://doi.org/10.1007/s11042-010-0620-1
Shah A, El-Alfy ES (2018) Image splicing forgery detection using DCT coefficients with multi-scale LBP. In: 2018 International Conference on Computing Sciences and Engineering. ICCSE 2018 - Proceedings, pp 1–6, DOI https://doi.org/10.1109/ICCSE1.2018.8374214
Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on multimedia & security - MM&Sec ’07, p 51. https://doi.org/10.1145/1288869.1288878. http://portal.acm.org/citation.cfm?doid=1288869.1288878
Su B, Yuan Q, Wang S, Zhao C, Li S (2014) Enhanced state selection Markov model for image splicing detection. EURASIP J Wireless Commun Network 2014(1):7
Tan X, Triggs B (2010) Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans Image Process 19(6):1635–1650
Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD - new database for copy-move forgery detection. In: Proceedings of 55th international symposium ELMAR-2013, pp 25–27
Vert JP, Tsuda K, Schölkopf B (2004) A primer on kernel methods. Kernel Methods Comput Biol 47:35–70
Warif NBA, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, Choo KKR (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259–278. https://doi.org/10.1016/j.jnca.2016.09.008
Yao H, Wang S, Zhang X, Qin C, Wang J (2017) Detecting image splicing based on noise level inconsistency. Multimed Tools Appl 76(10):12457–12479. https://doi.org/10.1007/s11042-016-3660-3
Yuan JH, Zhu HD, Gan Y, Shang L (2014) Enhanced local ternary pattern for texture classification. In: International conference on intelligent computing. Springer, pp 443–448
Zeng H, Zhan Y, Kang X, Lin X (2017) Image splicing localization using PCA-based noise level estimation. Multimed Tools Appl 76(4):4783–4799. https://doi.org/10.1007/s11042-016-3712-8
Acknowledgements
“Credits for the use of the Columbia Image Splicing Detection Evaluation Dataset are given to the DVMM Laboratory of Columbia University, CalPhotos Digital Library and the photographers listed in http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/photographers.htm”
“I.K.G. Punjab Technical University, Kapurthala for providing the opportunity to do research in this field.”
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kanwal, N., Girdhar, A., Kaur, L. et al. Digital image splicing detection technique using optimal threshold based local ternary pattern. Multimed Tools Appl 79, 12829–12846 (2020). https://doi.org/10.1007/s11042-020-08621-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08621-2