Skip to main content
Log in

Passive detection of image forgery using DCT and local binary pattern

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

With the development of easy-to-use and sophisticated image editing software, the alteration of the contents of digital images has become very easy to do and hard to detect. A digital image is a very rich source of information and can capture any event perfectly, but because of this reason, its authenticity is questionable. In this paper, a novel passive image forgery detection method is proposed based on local binary pattern (LBP) and discrete cosine transform (DCT) to detect copy–move and splicing forgeries. First, from the chrominance component of the input image, discriminative localized features are extracted by applying 2D DCT in LBP space. Then, support vector machine is used for detection. Experiments carried out on three image forgery benchmark datasets demonstrate the superiority of the method over recent methods in terms of detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Farid, H.: A survey of image forgery detection. IEEE Signal Process. Mag. 2(26), 16–25 (2009)

    Article  Google Scholar 

  2. Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Signal Process. Image Commun. 25(6), 389–399 (2010)

    Article  Google Scholar 

  3. Shivakumar, B.L., Baboo, S.S.: Detecting copy-move forgery in digital images: a survey and analysis of current methods. Glob. J. Comput. Sci. Technol. 10(7), 61–65 (2011)

    Google Scholar 

  4. Hussain, M., Saleh, S.Q., Aboalsamh, H., Muhammad, G., Bebis, G.: Comparison between WLD and LBP descriptors for non-intrusive image forgery detection. In: Proceedings of the IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA 2014) (2014)

  5. Muhammad, G., Hussain, M., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1), 49–57 (2012)

    Article  Google Scholar 

  6. Jaberi, M., Bebis, G., Hussain, M., Muhammad, G.: Accurate and robust localization of duplicated region in copy–move image forgery. Mach. Vis. Appl. 25(2), 451–475 (2014)

    Article  Google Scholar 

  7. Shi, Y.Q., Chen, C.: A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on Multimedia and Security, Dallas, TX, pp. 51–62 (2007)

  8. Zhang, Y., Zhao, C.: Revealing image splicing forgery using local binary patterns of DCT coefficients. Commun. Signal Process. Syst. 202, 181–189 (2012)

    Article  Google Scholar 

  9. Johnson, M.K., Farid, H.: Exposing digital forgeries through chromatic aberration. In: Proceedings of the 8th Workshop on Multimedia and Security, Geneva, pp. 48–55 (2006)

  10. Zhao, X., Li, J.: Detecting digital image splicing in chroma spaces. Digit. Watermarking 6526, 12–22 (2011)

    Article  Google Scholar 

  11. Alahmadi, A.A., Hussain, M., Aboalsamh, M., Muhammad, G., Bebis, G.: Splicing image forgery detection based on DCT and local binary pattern. In: IEEE Global Conference on Signal and Information Processing (GlobalSIP 2013) (2013)

  12. Ng, T.-T., Chang, S.-F.: A Data Set of Authentic and Spliced Image Blocks. ADVENT Technical Report, #203-2004-3, Columbia University (2004)

  13. Zhen, Z., Jiquan, K.: An effective algorithm of image splicing detection. In: Proceedings of the International Conference on Computer Science and Software Engineering, Wuhan, Hubei, pp. 1035–1039 (2008)

  14. Wei, W., Jing, D.: Image tampering detection based on stationary distribution of Markov chain. In: 17th IEEE International Conference Image Processing (ICIP 2010), Hong Kong, pp. 2101–2104 (2010)

  15. CASIA, Image Tampering Detection Evaluation Database, http://forensics.idealtest.org

  16. He, Z., Lu, W.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit. 45(12), 4292–4299 (2012)

  17. Dong, J., Wang, W.: Run-length and edge statistics based approach for image splicing detection. Digit. Watermarking 5450, 76–87 (2009)

    Article  Google Scholar 

  18. Yu-Feng, H., Shih-Fu, C.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: IEEE International Conference on Multimedia and Expo, Toronto, ON

  19. Hussain, M., Muhammad, G., Saleh, S.Q., Mirza, A., M., Bebis, G.: Image forgery detection using multi-resolution Weber local descriptors. In: Proceedings of the IEEE EUROCON, Zagreb, pp. 1570–1577 (2013)

  20. Muhammad, G., Al-Hammadi, M., Hussain, M., Bebis, G.: Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25(4), 985–995 (2014)

    Article  Google Scholar 

  21. Zhang, G., Huang, X.: Boosting local binary pattern (LBP)-based face recognition. Adv. Biometr. Person Authent. 3338, 179–186 (2005)

    Article  Google Scholar 

  22. Lee, B.B., Pokorny, J.: Luminance and chromatic modulation sensitivity of macaque ganglion cells and human observers. JOSA A 7, 2223–2236 (1990)

    Article  Google Scholar 

  23. Di, H., Caifeng, S.: Local binary patterns and its application to facial image analysis: a survey. IEEE Trans. Syst. Man Cybern. 41(6), 765–781 (2011)

    Article  Google Scholar 

  24. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)

    MATH  Google Scholar 

  25. Hussain, M., Wajid, S.K., Elzaart, A., Berbar, M.: A comparison of SVM kernel functions for breast cancer detection. In: Proceedings of the 2011 Eighth International Conference on Computer Graphics, Imaging and Visualization (CGIV 2011), Singapore, pp. 145–150 (2011)

  26. Hsu, C.-W., Chang, C.-C., Lin, C.-J.: A practical guide to support vector classification. http://www.csie.ntu.edu.tw/~cjlin (2010)

  27. Sokolova, M., Japkowicz, N.: Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation. Adv. Artif. Intell. 4304, 1015–1021 (2006)

    Google Scholar 

Download references

Acknowledgments

This project was supported by NSTIP strategic technologies programs, Grant No. 10-INF1140-02, in the Kingdom of Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Hussain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alahmadi, A., Hussain, M., Aboalsamh, H. et al. Passive detection of image forgery using DCT and local binary pattern. SIViP 11, 81–88 (2017). https://doi.org/10.1007/s11760-016-0899-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-016-0899-0

Keywords

Navigation