Abstract
A new method for extracting the image from the copy-move forging was created by changing the Gabor filter and the Local Binary-Pattern Center Symmetric (LBP-CS) is given in this article. In this article the LBP- CS is a modification of the local binary pattern which is free of the illumination and rotational effect differences, which is commonly used as a feature extractor for the core detecting stage. This method is used to find Center Symmetric Local Binary Pattern values for every Gabor picture (sub-bands) from the previous stage, based on the Gabor filter in different scales and orientations in the input image. This article contains information about the mechanism to detect a forgery in the copy-move and a flowchart of the system proposed. The input image is pre-processed and the Gabor Filter and LBP-CS function is extracted with various scales and guidelines. There are five different types of passive image forgery detection methods. Pixel-based techniques draw attention to the pixels in a digital image. Copy-move processes include things like splicing, resampling, and statistical approaches. The similitude of the original and the forgery image was calculated using Euclidean distance in the next step. In the last study, the output of the method proposed is compared to the excising function extraction method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Uliyan, D.M., Jalab, H.A., Wahab, A.W.A.: Copy move image forgery detection using Hessian and center symmetric local binary pattern. In 2015 IEEE Conference on Open Systems (ICOS), pp. 7–11 (2015)
Davarzani, R., Mozaffari, S., Yaghmaie, K.: Perceptual image hashing using center-symmetric local binary patterns. Multimedia Tools and Applications 75(8), 4639–4667 (2015). https://doi.org/10.1007/s11042-015-2496-6
Park, J.Y., Kang, T.A., Moon, Y.H., Eom, I.K.: Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry 12(4), 492 (2020)
Tuncer, T., Kaya, M.: A novel image watermarking method based on center symmetric local binary pattern with minimum distortion. Optik 185, 972–984 (2019)
Singh, M.K., Singh, A.K., Singh, N.: Multimedia analysis for disguised voice and classification efficiency. Multimedia Tools and Applications 78(20), 29395–29411 (2018). https://doi.org/10.1007/s11042-018-6718-6
Soni, B., Das, P. K., Thounaojam, D. M.: Copy-move tampering detection based on local binary pattern histogram Fourier feature. In Proceedings of the 7th International Conference on Computer and Communication Technology, pp. 78–83 (2017)
Singh, M.K., Singh, A.K., Singh, N.: Disguised voice with fast and slow speech and its acoustic analysis. Int. J. Pure Appl. Math 11(14), 241–246 (2018)
Dey, A., Pal, P., Chowdhuri, P., Singh, P. K., Jana, B.: Center-symmetric local binary pattern-based image authentication using local and global features vector. In Computational Intelligence in Pattern Recognition, pp. 489–501. Springer, Singapore (2020)
Singh, M. K., Singh, A. K., Singh, N.: Acoustic comparison of electronics disguised voice using different semitones. Int. J. Eng. Technol. (2018).
Chalamalasetty, S. P., Giduturi, S. R.: Research perception towards copy-move image forgery detection: challenges and future directions. Int. J. Image Grap. 2150054 (2021).
Singh, M., Nandan, D., Kumar, S.: Statistical analysis of lower and raised pitch voice signal and its efficiency calculation. Trait. Sig. 36(5), 455–461 (2019)
Singh, M.K., Singh, A.K., Singh, N.: Multimedia utilization of non-computerized disguised voice and acoustic similarity measurement. Multimedia Tools and Applications 79(47–48), 35537–35552 (2019). https://doi.org/10.1007/s11042-019-08329-y
Brogan, J.: Advancing Biometrics and Image Forensics Through Vision and Learning Systems. The University of Notre Dame, Dame (2019)
Kanchana, V., Nath, S., Singh, M. K. (2021). A study of internet of things oriented smart medical systems. In: Materials Today: Proceedings
Balaji, V.N., Srinivas, P.B., Singh, M.K.: Neuromorphic advancements architecture design and its implementations technique. In: Materials Today: Proceedings (2021)
Jalilian, E., Uhl, A.: Enhanced segmentation-CNN-based finger-vein recognition by joint training with automatically generated and manual labels. In: 2019 IEEE 5th International Conference on Identity. Security, and Behavior Analysis (ISBA), pp. 1–8. IEEE, New York (2019)
Punyavathi, G., Neeladri, M., Singh, M.K.: Vehicle tracking and detection techniques using IoT. In: Materials Today: Proceedings (2021)
Kumar, A.: Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int. J. Cloud Appl. Comput. 9(3), 22–36 (2019)
Kumar, A., Zhang, Z.J., Lyu, H.: Object detection in real time based on improved single shot multi-box detector algorithm. EURASIP J. Wirel. Commun. Netw. 2020(1), 1–18 (2020). https://doi.org/10.1186/s13638-020-01826-x
Kumar, A.: A review on implementation of digital image watermarking techniques using LSB and DWT. In: the Third International Conference on Information and Communication Technology for Sustainable Development (ICT4SD 2018), 30–31 Aug 2018, Hotel Vivanta by Taj, GOA, India
Walia, S., Kumar, K.: Pragmatical investigation of frequency-domain and spatial-structure-based image forgery detection methods. Int. J. Comput. Intell. IoT 1, 2 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kalyan, M.P., Kishore, D., Singh, M.K. (2022). Local Binary Pattern Symmetric Centre Feature Extraction Method for Detection of Image Forgery. In: Kumar, A., Fister Jr., I., Gupta, P.K., Debayle, J., Zhang, Z.J., Usman, M. (eds) Artificial Intelligence and Data Science. ICAIDS 2021. Communications in Computer and Information Science, vol 1673. Springer, Cham. https://doi.org/10.1007/978-3-031-21385-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-21385-4_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21384-7
Online ISBN: 978-3-031-21385-4
eBook Packages: Computer ScienceComputer Science (R0)