Skip to main content

Local Binary Pattern Symmetric Centre Feature Extraction Method for Detection of Image Forgery

  • Conference paper
  • First Online:
Artificial Intelligence and Data Science (ICAIDS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1673))

Included in the following conference series:

  • 391 Accesses

Abstract

A new method for extracting the image from the copy-move forging was created by changing the Gabor filter and the Local Binary-Pattern Center Symmetric (LBP-CS) is given in this article. In this article the LBP- CS is a modification of the local binary pattern which is free of the illumination and rotational effect differences, which is commonly used as a feature extractor for the core detecting stage. This method is used to find Center Symmetric Local Binary Pattern values for every Gabor picture (sub-bands) from the previous stage, based on the Gabor filter in different scales and orientations in the input image. This article contains information about the mechanism to detect a forgery in the copy-move and a flowchart of the system proposed. The input image is pre-processed and the Gabor Filter and LBP-CS function is extracted with various scales and guidelines. There are five different types of passive image forgery detection methods. Pixel-based techniques draw attention to the pixels in a digital image. Copy-move processes include things like splicing, resampling, and statistical approaches. The similitude of the original and the forgery image was calculated using Euclidean distance in the next step. In the last study, the output of the method proposed is compared to the excising function extraction method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Uliyan, D.M., Jalab, H.A., Wahab, A.W.A.: Copy move image forgery detection using Hessian and center symmetric local binary pattern. In 2015 IEEE Conference on Open Systems (ICOS), pp. 7–11 (2015)

    Google Scholar 

  2. Davarzani, R., Mozaffari, S., Yaghmaie, K.: Perceptual image hashing using center-symmetric local binary patterns. Multimedia Tools and Applications 75(8), 4639–4667 (2015). https://doi.org/10.1007/s11042-015-2496-6

    Article  Google Scholar 

  3. Park, J.Y., Kang, T.A., Moon, Y.H., Eom, I.K.: Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry 12(4), 492 (2020)

    Article  Google Scholar 

  4. Tuncer, T., Kaya, M.: A novel image watermarking method based on center symmetric local binary pattern with minimum distortion. Optik 185, 972–984 (2019)

    Article  Google Scholar 

  5. Singh, M.K., Singh, A.K., Singh, N.: Multimedia analysis for disguised voice and classification efficiency. Multimedia Tools and Applications 78(20), 29395–29411 (2018). https://doi.org/10.1007/s11042-018-6718-6

    Article  Google Scholar 

  6. Soni, B., Das, P. K., Thounaojam, D. M.: Copy-move tampering detection based on local binary pattern histogram Fourier feature. In Proceedings of the 7th International Conference on Computer and Communication Technology, pp. 78–83 (2017)

    Google Scholar 

  7. Singh, M.K., Singh, A.K., Singh, N.: Disguised voice with fast and slow speech and its acoustic analysis. Int. J. Pure Appl. Math 11(14), 241–246 (2018)

    Google Scholar 

  8. Dey, A., Pal, P., Chowdhuri, P., Singh, P. K., Jana, B.: Center-symmetric local binary pattern-based image authentication using local and global features vector. In Computational Intelligence in Pattern Recognition, pp. 489–501. Springer, Singapore (2020)

    Google Scholar 

  9. Singh, M. K., Singh, A. K., Singh, N.: Acoustic comparison of electronics disguised voice using different semitones. Int. J. Eng. Technol. (2018).

    Google Scholar 

  10. Chalamalasetty, S. P., Giduturi, S. R.: Research perception towards copy-move image forgery detection: challenges and future directions. Int. J. Image Grap. 2150054 (2021).

    Google Scholar 

  11. Singh, M., Nandan, D., Kumar, S.: Statistical analysis of lower and raised pitch voice signal and its efficiency calculation. Trait. Sig. 36(5), 455–461 (2019)

    Google Scholar 

  12. Singh, M.K., Singh, A.K., Singh, N.: Multimedia utilization of non-computerized disguised voice and acoustic similarity measurement. Multimedia Tools and Applications 79(47–48), 35537–35552 (2019). https://doi.org/10.1007/s11042-019-08329-y

    Article  Google Scholar 

  13. Brogan, J.: Advancing Biometrics and Image Forensics Through Vision and Learning Systems. The University of Notre Dame, Dame (2019)

    Google Scholar 

  14. Kanchana, V., Nath, S., Singh, M. K. (2021). A study of internet of things oriented smart medical systems. In: Materials Today: Proceedings

    Google Scholar 

  15. Balaji, V.N., Srinivas, P.B., Singh, M.K.: Neuromorphic advancements architecture design and its implementations technique. In: Materials Today: Proceedings (2021)

    Google Scholar 

  16. Jalilian, E., Uhl, A.: Enhanced segmentation-CNN-based finger-vein recognition by joint training with automatically generated and manual labels. In: 2019 IEEE 5th International Conference on Identity. Security, and Behavior Analysis (ISBA), pp. 1–8. IEEE, New York (2019)

    Google Scholar 

  17. Punyavathi, G., Neeladri, M., Singh, M.K.: Vehicle tracking and detection techniques using IoT. In: Materials Today: Proceedings (2021)

    Google Scholar 

  18. Kumar, A.: Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int. J. Cloud Appl. Comput. 9(3), 22–36 (2019)

    Google Scholar 

  19. Kumar, A., Zhang, Z.J., Lyu, H.: Object detection in real time based on improved single shot multi-box detector algorithm. EURASIP J. Wirel. Commun. Netw. 2020(1), 1–18 (2020). https://doi.org/10.1186/s13638-020-01826-x

    Article  Google Scholar 

  20. Kumar, A.: A review on implementation of digital image watermarking techniques using LSB and DWT. In: the Third International Conference on Information and Communication Technology for Sustainable Development (ICT4SD 2018), 30–31 Aug 2018, Hotel Vivanta by Taj, GOA, India

    Google Scholar 

  21. Walia, S., Kumar, K.: Pragmatical investigation of frequency-domain and spatial-structure-based image forgery detection methods. Int. J. Comput. Intell. IoT 1, 2 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahesh K. Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kalyan, M.P., Kishore, D., Singh, M.K. (2022). Local Binary Pattern Symmetric Centre Feature Extraction Method for Detection of Image Forgery. In: Kumar, A., Fister Jr., I., Gupta, P.K., Debayle, J., Zhang, Z.J., Usman, M. (eds) Artificial Intelligence and Data Science. ICAIDS 2021. Communications in Computer and Information Science, vol 1673. Springer, Cham. https://doi.org/10.1007/978-3-031-21385-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21385-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21384-7

  • Online ISBN: 978-3-031-21385-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics