skip to main content
10.1145/3154979.3155001acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccctConference Proceedingsconference-collections
research-article

Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature

Published:24 November 2017Publication History

ABSTRACT

Copy-move is a popular image tampering technique, where one or more regions of an image are copied and pasted into another portion of the same image with an objective to cover a conceivably important region or duplicate some regions. In this paper, a block-based blind technique for copy-move tampering detection is given by extracting Local Binary Pattern Histogram Fourier Features from each overlapping block. Proposed method is tested on benchmarking CoMoFoD dataset. Experimental results show that proposed method not only reduces the time complexity of tampering detection but also robust against different post-processing attacks such as blurring, brightness change, contrast adjustment etc.

References

  1. Timo Ahonen, Jiří Matas, Chu He, and Matti Pietikäinen. 2009. Rotation Invariant Image Description with Local Binary Pattern Histogram Fourier Features. Springer Berlin Heidelberg, Berlin, Heidelberg, 61--70. https://doi.org/10.1007/978-3-642-02230-2_7 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amani Alahmadi, Muhammad Hussain, Hatim Aboalsamh, Ghulam Muhammad, George Bebis, and Hassan Mathkour. 2017. Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing 11, 1 (01 Jan 2017), 81--88. https://doi.org/10.1007/s11760-016-0899-0 Google ScholarGoogle ScholarCross RefCross Ref
  3. E. Ardizzone, A. Bruno, and G. Mazzola. 2010. Detecting multiple copies in tampered images. In 2010 IEEE International Conference on Image Processing. 2117--2120. https://doi.org/10.1109/ICIP.2010.5652490 Google ScholarGoogle ScholarCross RefCross Ref
  4. Herbert Bay, Tinne Tuytelaars, and Luc Van Gool. 2006. SURF: Speeded Up Robust Features. Springer Berlin Heidelberg, Berlin, Heidelberg, 404--417. https://doi.org/10.1007/11744023_32 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Reza Davarzani, Khashayar Yaghmaie, Saeed Mozaffari, and Meysam Tapak. 2013. Copy-move forgery detection using multiresolution local binary patterns. Forensic Science International 231, 1 (2013), 61--72. https://doi.org/10.1016/j.forsciint.2013.04.023 Google ScholarGoogle ScholarCross RefCross Ref
  6. Yanping Huang, Wei Lu, Wei Sun, and Dongyang Long. 2011. Improved DCT-based detection of copy-move forgery in images. Forensic Science International 206, 1 (2011), 178--184. https://doi.org/10.1016/j.forsciint.2010.08.001 Google ScholarGoogle ScholarCross RefCross Ref
  7. Rajib Kumar Jha, Badal Soni, and Kiyoharu Aizawa. 2013. Logo Extraction from Audio Signals by Utilization of Internal Noise. IETE Journal of Research 59, 3 (2013), 270--279. https://doi.org/10.4103/03772063.2013.10876505 Google ScholarGoogle ScholarCross RefCross Ref
  8. Rajib Kumar Jha, Badal Soni, Rajlaxmi Chouhan, and Kiyoharu Aizawa. 2012. Improved Watermark Extraction from Audio Signals by Scaling of Internal Noise in DCT Domain. Springer Berlin Heidelberg, Berlin, Heidelberg, 235--243. https://doi.org/10.1007/978-3-642-30157-5_24 Google ScholarGoogle ScholarCross RefCross Ref
  9. A. Kulkarni and S. Khan. 2010. An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform. International Journal on Computer Science and Engineering (2010), 1801--1806.Google ScholarGoogle Scholar
  10. Li Leida, Li Shushang, and Zhu Hancheng. 2013. An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4, 1 (Nov. 2013), 46--56.Google ScholarGoogle Scholar
  11. David G. Lowe. 2004. Distinctive Image Features from Scale-Invariant Keypoints. Int. J. Comput. Vision 60, 2 (Nov. 2004), 91--110. https://doi.org/10.1023/B:VISI.0000029664.99615.94 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ghulam Muhammad, Munner H. Al-Hammadi, Muhammad Hussain, and George Bebis. 2014. Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications 25, 4 (01 May 2014), 985--995. https://doi.org/10.1007/s00138-013-0547-4 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Muhammad, M. H. Al-Hammadi, M. Hussain, A. M. Mirza, and G. Bebis. 2013. Copy move image forgery detection method using steerable pyramid transform and texture descriptor. In Eurocon 2013. 1586--1592. https://doi.org/10.1109/EUROCON.2013.6625188 Google ScholarGoogle ScholarCross RefCross Ref
  14. G. Muhammad, M. Hussain, K. Khawaji, and G. Bebis. 2011. Blind copy move image forgery detection using dyadic undecimated wavelet transform. In 2011 17th International Conference on Digital Signal Processing (DSP). 1--6. https://doi.org/10.1109/ICDSP.2011.6004974 Google ScholarGoogle ScholarCross RefCross Ref
  15. D. Tralic, I. Zupancic, S. Grgic, and M. Grgic. 2013. CoMoFoD-New database for copy-move forgery detection. In Proceedings ELMAR-2013. 49--54.Google ScholarGoogle Scholar
  16. D. M. Uliyan, H. A. Jalab, and A. W. A. Wahab. 2015. Copy move image forgery detection using Hessian and center symmetric local binary pattern. In 2015 IEEE Conference on Open Systems (ICOS). 7--11. https://doi.org/10.1109/ICOS.2015.7377269 Google ScholarGoogle ScholarCross RefCross Ref
  17. Xiang-yang Wang, Yu-nan Liu, Huan Xu, Pei Wang, and Hong-ying Yang. 2016. Robust copy--move forgery detection using quaternion exponent moments. Pattern Analysis and Applications (31 Oct 2016). https://doi.org/10.1007/s10044-016-0588-1 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Y. Wo, K. Yang, G. Han, H. Chen, and W. Wu. 2017. Copy-move forgery detection based on multi-radius PCET. IET Image Processing 11, 2 (2017), 99--108. https://doi.org/10.1049/iet-ipr.2016.0229 Google ScholarGoogle ScholarCross RefCross Ref
  19. Jianguo Zhang and Tieniu Tan. 2002. Brief review of invariant texture analysis methods. Pattern Recognition 35, 3 (2002), 735--747. https://doi.org/10.1016/S0031-3203(01)00074-7 Image/Video Communication. Google ScholarGoogle ScholarCross RefCross Ref
  20. G. Zhao, T. Ahonen, J. Matas, and M. Pietikainen. 2012. Rotation-Invariant Image and Video Description With Local Binary Pattern Features. IEEE Transactions on Image Processing 21, 4 (April 2012), 1465--1477. https://doi.org/10.1109/TIP.2011.2175739 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jie Zhao and Jichang Guo. 2013. Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Science International 233, 1 (2013), 158--166. https://doi.org/10.1016/j.forsciint.2013.09.013 Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICCCT-2017: Proceedings of the 7th International Conference on Computer and Communication Technology
          November 2017
          157 pages
          ISBN:9781450353243
          DOI:10.1145/3154979

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 November 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          ICCCT-2017 Paper Acceptance Rate33of124submissions,27%Overall Acceptance Rate33of124submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader