Skip to main content

Binary Pattern for Copy-Move Image Forgery Detection

  • Conference paper
  • First Online:
Machine Vision and Augmented Intelligence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1007))

Abstract

To identify copy-move image counterfeiting, this work proposes a new feature extraction approach based on a modified Gabor filter and a Center Symmetric Local Binary Pattern (CSLBP). The input image is first pre-processed, and then Gabor filter and CSLBP feature extraction are performed to the image with various scales and orientations. The Manhattan distance is used to detect forged regions by comparing the critical spots. To classify the counterfeit photos, Hybrid Neural Networks with Decision Tree (HNN-DT) is used on feature extraction. The performance of the proposed Modified Gabor filter with CSLBP is compared to that of existing feature extraction methods such as the Improved Speeded-up Robust Features (SURF) algorithm with PCA and the existing Improved Speeded-up Robust Features (SURF) algorithm with PCA. Using the Gabor filter and CSLBP, the expected results demonstrate efficient classification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ganesan C, Bhuma VR. Digital image forgery detection using color illumination and decision tree classification

    Google Scholar 

  2. Kurmi M (2017) New copy-move image forgery detection based on DCT. Int J Adv Res Comput Sci 8(5)

    Google Scholar 

  3. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245

    Article  Google Scholar 

  4. Kashyap A, Agarwal M, Gupta H (2017) Detection of copy-move image forgery using SVD and cuckoo search algorithm. arXiv preprint arXiv:1704.00631

  5. Kaur M, Walia S (2016) Forgery detection using noise estimation and hog feature extraction. Int J Multimed Ubiquitous Eng 11(4):37–48

    Article  Google Scholar 

  6. Singh S, Agrawal S, Singh G (2016) Accuracy detection of digital image forgery by using ant colony optimization technique. MATEC Web Conf 57. EDP Sciences

    Google Scholar 

  7. Ujjainiya U, Chugh S (2016) Digital image forgery detection based on texture feature and clustering technique. Int J Comput Appl 147(11)

    Google Scholar 

  8. Swetha GR, Kishore MR (2015) Machine-learning algorithm for digital image forgeries by illumination color classification. In: International conference on industrial scientific research engineering conference, Apr 2015, pp 149–152

    Google Scholar 

  9. Kaur H, Babbar G. Copy move forgery detection using discrete cosine transform and bacterial foraging optimization

    Google Scholar 

  10. Cozzolino D, Gragnaniello D, Verdoliva L (2013) Image forgery detection based on the fusion of machine learning and block-matching methods. arXiv preprint arXiv:1311.6934

  11. Kumar S, Desai J, Mukherjee S (2013) A fast DCT based method for copy move forgery detection. In: 2013 IEEE second international conference on image information processing (ICIIP), Dec 2013. IEEE, pp 649–654

    Google Scholar 

  12. Xu B, Liu G, Dai Y (2012) A fast image copy-move forgery detection method using phase correlation. In: 2012 fourth international conference on multimedia information networking and security (MINES), Nov 2012. IEEE, pp 319–322

    Google Scholar 

  13. Pan X, Zhang X, Lyu S (2011) Exposing image forgery with blind noise estimation. In: Proceedings of the thirteenth ACM multimedia workshop on multimedia and security, Sept 2011. ACM, pp 15–20

    Google Scholar 

  14. Peng F, Wang XL (2010) Digital image forgery forensics by using blur estimation and abnormal hue detection. In: 2010 symposium on photonics and optoelectronic (SOPO), June 2010. IEEE, pp 1–4

    Google Scholar 

  15. Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849–1853

    Article  Google Scholar 

  16. Xu Q, Yang J, Ding S (2005) Texture segmentation using LBP embedded region competition. Electron Lett Comput Vis Image Anal (ELCVIA) 5(1):41–47

    Google Scholar 

  17. Vinod Kumar RS. A comparative analysis of histogram of gradient (HOG), Gabor filter bank and DCT based feature extraction methods used for fingerprint recognition

    Google Scholar 

  18. Rathore NK (2016) Faults in grid. Int J Softw Comput Sci Eng 1(1):1–19

    Google Scholar 

  19. Rathore NK (2016) Installation of Alchemi.NET in computational grid. J Comput Sci (JCOM) 4(2):1–5

    Google Scholar 

  20. Rathore NK (2016) Ethical hacking & security against cyber crime. J Inf Technol (JIT) 5(1):7–11

    Google Scholar 

  21. Rathore NK (2015) Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. J Comput Sci (JCOM) 3(3):11–22

    Google Scholar 

  22. Rathore NK (2015) Map reduce architecture for grid. J Softw Eng (JSE) 10(1):21–30

    Google Scholar 

  23. Rathore NK (2015) GridSim installation and implementation process. J Cloud Comput (JCC) 2(4):29–40

    Google Scholar 

  24. Rathore NK, Chana I (2013) Report on hierarchal load balancing technique in grid environment. J Inf Technol (JIT) 2(4):21–35. ISSN Print: 2277-5110

    Google Scholar 

  25. Rathore NK, Chana I (2010) Checkpointing algorithm in Alchemi.NET. Pragyaan J Inf Technol 8(1):32–38. ISSN: 0974-5513. In: IEEE, CSI and MPCET, Dehradun, June 2010. IMS Dehradun

    Google Scholar 

  26. Jain N, Rathore NK, Mishra A (2017) An efficient image forgery detection using biorthogonal wavelet transform and singular value decomposition. In: 5th international conference on advance research applied science, environment, agriculture & entrepreneurship development (ARASEAED), Bhopal, Janparishad, 04–06 Dec 2017. JMBVSS & International Council of People, Bhopal, pp 274–281

    Google Scholar 

  27. Rathore NK, Chana I (2013) A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In: International conference on IEEE-ISPC, 26–28 Sept 2013, pp 1–6. ISBN: 978-1-4673-6188-0

    Google Scholar 

  28. Rathore NK, Chana I (2011) A cognitive analysis of load balancing technique with job migration in grid environment. In: World congress on information and communication technology (WICT), IEEE proceedings paper, Dec 2011. IEEE, Mumbai, pp 77–82. ISBN: 978-1-4673-0127-5, e-book 978-1-4673-0125-1. https://doi.org/10.1109/WICT.2011.6141221

  29. Rathore N (2015) Efficient load balancing algorithm in grid. In: 30th M.P. Young scientist congress, Bhopal, 28 Feb 2015, p 56

    Google Scholar 

  30. Rathore NK (2014) Efficient hierarchical load balancing technique based on grid. In: 29th M.P. Young scientist congress, Bhopal, 28 Feb 2014, p 55

    Google Scholar 

  31. Chouhan R, Rathore NK (2012) Comparison of load balancing technique in grid. In: 17th annual conference of Gwalior academy of mathematical science and national symposium on computational mathematics & information technology, JUET, Guna, 7–9 Dec 2012

    Google Scholar 

  32. Rathore NK, Chana I (2010) Fault tolerance algorithm in Alchemi.NET middleware. In: National conference on education & research (ConFR10), third CSI national conference of CSI division V, Bhopal chapter, 6–7 Mar 2010, JUIT, India. IEEE Bombay, MPCST, Bhopal

    Google Scholar 

  33. Rathore NK, Chana I (2009) Checkpointing algorithm in Alchemi.NET. In: Annual conference of Vijnana Parishad of India and national symposium recent development in applied mathematics & information technology, Dec 2009. JUET, Guna

    Google Scholar 

  34. Rathore NK, Chana I (2008) Comparative analysis of checkpointing. In: PIMR third national IT conference, IT enabled practices and emerging management paradigm book and category is communication technologies and security issues, pp 32–35, topic no/name 46. Prestige Management & Research, Indore

    Google Scholar 

  35. Rathore NK, Chana I (2018) An efficient load balancing technique for grid. Scholar’s Press, Mauritius. Project id: 6621. ISBN: 978-3-330-65134-0

    Google Scholar 

  36. Rathore NK, Singh P (2016) An efficient load balancing algorithm in distributed networks. Lambert Academic Publication House (LBA), Germany. ISBN: 978-3-659-78892-5

    Google Scholar 

  37. Rathore NK, Chohan R (2016) An enhancement of GridSim architecture with load balancing. Scholar’s Press. Project id: 4900. ISBN: 978-3-639-76989-0

    Google Scholar 

  38. Rathore NK, Sharma A (2015) Efficient dynamic distributed load balancing technique. Lambert Academic Publication House, Germany. Project ID: 127478. ISBN: 978-3-659-78288-6

    Google Scholar 

  39. Rathore NK, Chana I (2010) Checkpointing algorithm in Alchemi.NET. Lambert Academic Publication House (LBA), Germany. ISBN-10: 3843361371

    Google Scholar 

  40. Rathore N (2018) Performance of hybrid load balancing algorithm in distributed web server system. Wireless Pers Commun 101(4):1233–1246

    Google Scholar 

  41. Jain N, Rathore N, Mishra A (2017) An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks. Interciencia J 42(11):95–120

    Google Scholar 

  42. Rathore N (2016) Dynamic threshold based load balancing algorithms. Wireless Pers Commun 91(1):151–185

    Google Scholar 

  43. Rathore N, Chana I (2016) Job migration policies for grid environment. Wireless Pers Commun 89(1):241–269

    Google Scholar 

  44. Rathore N, Chana I (2015) Variable threshold-based hierarchical load balancing technique in grid. Eng Comput 31(3):597–615

    Article  Google Scholar 

  45. Sharma V, Kumar R, Rathore NK (2015) Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. J Wireless Mob Netw Ubiquitous Comput Depend Appl (JoWUA) 6(3):54–72

    Google Scholar 

  46. Rathore N, Chana I (2014) Load balancing and job migration techniques in grid: a survey of recent trends. Wireless Pers Commun 79(3):2089–2125

    Article  Google Scholar 

  47. Rathore N, Chana I (2014) Job migration with fault tolerance based QoS scheduling using hash table functionality in social grid computing. J Intell Fuzzy Syst 27(6):2821–2833

    Article  Google Scholar 

  48. Rathore NK, Khan F (2018) Internet of things: a review. J Cloud Comput (JCC) 5(1):20–25. ISSN Print: 2349-6835, ISSN Online: 2350-1308

    Google Scholar 

  49. Rathore NK, Khan F (2018) Survey of IoT. J Cloud Comput (JCC) 1(1):1–13

    Google Scholar 

  50. Rathore NK, Singh PK (2017) A comparative analysis of fuzzy based load balancing algorithm. J Comput Sci (JCS) 5(2):23–33

    Google Scholar 

  51. Rathore NK, Singh H (2017) Analysis of grid simulators architecture. J Mob Appl Technol (JMT) 4(2):32–41

    Google Scholar 

  52. Rathore NK (2016) Checkpointing: fault tolerance mechanism. J Cloud Comput (JCC) 3(4):27–34

    Google Scholar 

  53. Rathore NK (2017) A review towards: load balancing techniques. J Power Syst Eng (JPS) 4(4):47–60

    Google Scholar 

  54. Gugulothu VK, Mohan Rao SK (2020) Classification of IRS LISS-III images by using artificial neural networks. Int J Emerg Technol Adv Eng 10(4):24–31. ISSN: 2250-2459

    Google Scholar 

  55. Hamid MS, Manap NA, Hamzah RA, Kadmin AF (2021) Stereo matching algorithm based on hybrid convolutional neural network and directional intensity difference. Int J Emerg Technol Adv Eng 11(6):87–97. ISSN: 2250-2459

    Google Scholar 

  56. Gomathi R (2017) Forged image detection by analyzing edge, visual saliency and textural features using SVM classifier

    Google Scholar 

  57. Marra F, Poggi G, Roli F, Sansone C, Verdoliva L (2015) Counter-forensics in machine learning based forgery detection. In: Media watermarking, security, and forensics 2015, Mar 2015, vol 9409. International Society for Optics and Photonics, p 94090L

    Google Scholar 

  58. Sokolova M, Japkowicz N, Szpakowicz S (2006) Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation. In: Australasian joint conference on artificial intelligence. Springer, Berlin, Heidelberg, pp 1015–1021

    Google Scholar 

  59. Hsu Y-F, Chang S-F (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE international conference on multimedia and expo. IEEE, pp 549–552

    Google Scholar 

  60. Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on multimedia & security. ACM, pp 51–62

    Google Scholar 

  61. Fridrich J, Soukal BD, Lukas AJ (2003) Detection of copy move forgery in digital images. In: Proceedings of the digital forensic research workshop, Cleveland, OH, Aug 2003

    Google Scholar 

  62. Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57

    Article  Google Scholar 

  63. Zheng N, Wang Y, Xu M (2013) A LBP based method for detecting copy-move forgery with rotation. Springer Science, pp 261–267

    Google Scholar 

  64. Zhang Y, Zhao C, Pi Y, Li S (2012) Revealing image splicing forgery using local binary patterns of DCT coefficients. In: Communications, signal processing, and systems. Springer, New York, pp 181–189

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neeraj Rathore .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rathore, N., Jain, N., Singh, P. (2023). Binary Pattern for Copy-Move Image Forgery Detection. In: Kumar Singh, K., Bajpai, M.K., Sheikh Akbari, A. (eds) Machine Vision and Augmented Intelligence. Lecture Notes in Electrical Engineering, vol 1007. Springer, Singapore. https://doi.org/10.1007/978-981-99-0189-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-0189-0_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-0188-3

  • Online ISBN: 978-981-99-0189-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics