Abstract
To identify copy-move image counterfeiting, this work proposes a new feature extraction approach based on a modified Gabor filter and a Center Symmetric Local Binary Pattern (CSLBP). The input image is first pre-processed, and then Gabor filter and CSLBP feature extraction are performed to the image with various scales and orientations. The Manhattan distance is used to detect forged regions by comparing the critical spots. To classify the counterfeit photos, Hybrid Neural Networks with Decision Tree (HNN-DT) is used on feature extraction. The performance of the proposed Modified Gabor filter with CSLBP is compared to that of existing feature extraction methods such as the Improved Speeded-up Robust Features (SURF) algorithm with PCA and the existing Improved Speeded-up Robust Features (SURF) algorithm with PCA. Using the Gabor filter and CSLBP, the expected results demonstrate efficient classification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ganesan C, Bhuma VR. Digital image forgery detection using color illumination and decision tree classification
Kurmi M (2017) New copy-move image forgery detection based on DCT. Int J Adv Res Comput Sci 8(5)
Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245
Kashyap A, Agarwal M, Gupta H (2017) Detection of copy-move image forgery using SVD and cuckoo search algorithm. arXiv preprint arXiv:1704.00631
Kaur M, Walia S (2016) Forgery detection using noise estimation and hog feature extraction. Int J Multimed Ubiquitous Eng 11(4):37–48
Singh S, Agrawal S, Singh G (2016) Accuracy detection of digital image forgery by using ant colony optimization technique. MATEC Web Conf 57. EDP Sciences
Ujjainiya U, Chugh S (2016) Digital image forgery detection based on texture feature and clustering technique. Int J Comput Appl 147(11)
Swetha GR, Kishore MR (2015) Machine-learning algorithm for digital image forgeries by illumination color classification. In: International conference on industrial scientific research engineering conference, Apr 2015, pp 149–152
Kaur H, Babbar G. Copy move forgery detection using discrete cosine transform and bacterial foraging optimization
Cozzolino D, Gragnaniello D, Verdoliva L (2013) Image forgery detection based on the fusion of machine learning and block-matching methods. arXiv preprint arXiv:1311.6934
Kumar S, Desai J, Mukherjee S (2013) A fast DCT based method for copy move forgery detection. In: 2013 IEEE second international conference on image information processing (ICIIP), Dec 2013. IEEE, pp 649–654
Xu B, Liu G, Dai Y (2012) A fast image copy-move forgery detection method using phase correlation. In: 2012 fourth international conference on multimedia information networking and security (MINES), Nov 2012. IEEE, pp 319–322
Pan X, Zhang X, Lyu S (2011) Exposing image forgery with blind noise estimation. In: Proceedings of the thirteenth ACM multimedia workshop on multimedia and security, Sept 2011. ACM, pp 15–20
Peng F, Wang XL (2010) Digital image forgery forensics by using blur estimation and abnormal hue detection. In: 2010 symposium on photonics and optoelectronic (SOPO), June 2010. IEEE, pp 1–4
Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849–1853
Xu Q, Yang J, Ding S (2005) Texture segmentation using LBP embedded region competition. Electron Lett Comput Vis Image Anal (ELCVIA) 5(1):41–47
Vinod Kumar RS. A comparative analysis of histogram of gradient (HOG), Gabor filter bank and DCT based feature extraction methods used for fingerprint recognition
Rathore NK (2016) Faults in grid. Int J Softw Comput Sci Eng 1(1):1–19
Rathore NK (2016) Installation of Alchemi.NET in computational grid. J Comput Sci (JCOM) 4(2):1–5
Rathore NK (2016) Ethical hacking & security against cyber crime. J Inf Technol (JIT) 5(1):7–11
Rathore NK (2015) Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. J Comput Sci (JCOM) 3(3):11–22
Rathore NK (2015) Map reduce architecture for grid. J Softw Eng (JSE) 10(1):21–30
Rathore NK (2015) GridSim installation and implementation process. J Cloud Comput (JCC) 2(4):29–40
Rathore NK, Chana I (2013) Report on hierarchal load balancing technique in grid environment. J Inf Technol (JIT) 2(4):21–35. ISSN Print: 2277-5110
Rathore NK, Chana I (2010) Checkpointing algorithm in Alchemi.NET. Pragyaan J Inf Technol 8(1):32–38. ISSN: 0974-5513. In: IEEE, CSI and MPCET, Dehradun, June 2010. IMS Dehradun
Jain N, Rathore NK, Mishra A (2017) An efficient image forgery detection using biorthogonal wavelet transform and singular value decomposition. In: 5th international conference on advance research applied science, environment, agriculture & entrepreneurship development (ARASEAED), Bhopal, Janparishad, 04–06 Dec 2017. JMBVSS & International Council of People, Bhopal, pp 274–281
Rathore NK, Chana I (2013) A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In: International conference on IEEE-ISPC, 26–28 Sept 2013, pp 1–6. ISBN: 978-1-4673-6188-0
Rathore NK, Chana I (2011) A cognitive analysis of load balancing technique with job migration in grid environment. In: World congress on information and communication technology (WICT), IEEE proceedings paper, Dec 2011. IEEE, Mumbai, pp 77–82. ISBN: 978-1-4673-0127-5, e-book 978-1-4673-0125-1. https://doi.org/10.1109/WICT.2011.6141221
Rathore N (2015) Efficient load balancing algorithm in grid. In: 30th M.P. Young scientist congress, Bhopal, 28 Feb 2015, p 56
Rathore NK (2014) Efficient hierarchical load balancing technique based on grid. In: 29th M.P. Young scientist congress, Bhopal, 28 Feb 2014, p 55
Chouhan R, Rathore NK (2012) Comparison of load balancing technique in grid. In: 17th annual conference of Gwalior academy of mathematical science and national symposium on computational mathematics & information technology, JUET, Guna, 7–9 Dec 2012
Rathore NK, Chana I (2010) Fault tolerance algorithm in Alchemi.NET middleware. In: National conference on education & research (ConFR10), third CSI national conference of CSI division V, Bhopal chapter, 6–7 Mar 2010, JUIT, India. IEEE Bombay, MPCST, Bhopal
Rathore NK, Chana I (2009) Checkpointing algorithm in Alchemi.NET. In: Annual conference of Vijnana Parishad of India and national symposium recent development in applied mathematics & information technology, Dec 2009. JUET, Guna
Rathore NK, Chana I (2008) Comparative analysis of checkpointing. In: PIMR third national IT conference, IT enabled practices and emerging management paradigm book and category is communication technologies and security issues, pp 32–35, topic no/name 46. Prestige Management & Research, Indore
Rathore NK, Chana I (2018) An efficient load balancing technique for grid. Scholar’s Press, Mauritius. Project id: 6621. ISBN: 978-3-330-65134-0
Rathore NK, Singh P (2016) An efficient load balancing algorithm in distributed networks. Lambert Academic Publication House (LBA), Germany. ISBN: 978-3-659-78892-5
Rathore NK, Chohan R (2016) An enhancement of GridSim architecture with load balancing. Scholar’s Press. Project id: 4900. ISBN: 978-3-639-76989-0
Rathore NK, Sharma A (2015) Efficient dynamic distributed load balancing technique. Lambert Academic Publication House, Germany. Project ID: 127478. ISBN: 978-3-659-78288-6
Rathore NK, Chana I (2010) Checkpointing algorithm in Alchemi.NET. Lambert Academic Publication House (LBA), Germany. ISBN-10: 3843361371
Rathore N (2018) Performance of hybrid load balancing algorithm in distributed web server system. Wireless Pers Commun 101(4):1233–1246
Jain N, Rathore N, Mishra A (2017) An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks. Interciencia J 42(11):95–120
Rathore N (2016) Dynamic threshold based load balancing algorithms. Wireless Pers Commun 91(1):151–185
Rathore N, Chana I (2016) Job migration policies for grid environment. Wireless Pers Commun 89(1):241–269
Rathore N, Chana I (2015) Variable threshold-based hierarchical load balancing technique in grid. Eng Comput 31(3):597–615
Sharma V, Kumar R, Rathore NK (2015) Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. J Wireless Mob Netw Ubiquitous Comput Depend Appl (JoWUA) 6(3):54–72
Rathore N, Chana I (2014) Load balancing and job migration techniques in grid: a survey of recent trends. Wireless Pers Commun 79(3):2089–2125
Rathore N, Chana I (2014) Job migration with fault tolerance based QoS scheduling using hash table functionality in social grid computing. J Intell Fuzzy Syst 27(6):2821–2833
Rathore NK, Khan F (2018) Internet of things: a review. J Cloud Comput (JCC) 5(1):20–25. ISSN Print: 2349-6835, ISSN Online: 2350-1308
Rathore NK, Khan F (2018) Survey of IoT. J Cloud Comput (JCC) 1(1):1–13
Rathore NK, Singh PK (2017) A comparative analysis of fuzzy based load balancing algorithm. J Comput Sci (JCS) 5(2):23–33
Rathore NK, Singh H (2017) Analysis of grid simulators architecture. J Mob Appl Technol (JMT) 4(2):32–41
Rathore NK (2016) Checkpointing: fault tolerance mechanism. J Cloud Comput (JCC) 3(4):27–34
Rathore NK (2017) A review towards: load balancing techniques. J Power Syst Eng (JPS) 4(4):47–60
Gugulothu VK, Mohan Rao SK (2020) Classification of IRS LISS-III images by using artificial neural networks. Int J Emerg Technol Adv Eng 10(4):24–31. ISSN: 2250-2459
Hamid MS, Manap NA, Hamzah RA, Kadmin AF (2021) Stereo matching algorithm based on hybrid convolutional neural network and directional intensity difference. Int J Emerg Technol Adv Eng 11(6):87–97. ISSN: 2250-2459
Gomathi R (2017) Forged image detection by analyzing edge, visual saliency and textural features using SVM classifier
Marra F, Poggi G, Roli F, Sansone C, Verdoliva L (2015) Counter-forensics in machine learning based forgery detection. In: Media watermarking, security, and forensics 2015, Mar 2015, vol 9409. International Society for Optics and Photonics, p 94090L
Sokolova M, Japkowicz N, Szpakowicz S (2006) Beyond accuracy, F-score and ROC: a family of discriminant measures for performance evaluation. In: Australasian joint conference on artificial intelligence. Springer, Berlin, Heidelberg, pp 1015–1021
Hsu Y-F, Chang S-F (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE international conference on multimedia and expo. IEEE, pp 549–552
Shi YQ, Chen C, Chen W (2007) A natural image model approach to splicing detection. In: Proceedings of the 9th workshop on multimedia & security. ACM, pp 51–62
Fridrich J, Soukal BD, Lukas AJ (2003) Detection of copy move forgery in digital images. In: Proceedings of the digital forensic research workshop, Cleveland, OH, Aug 2003
Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57
Zheng N, Wang Y, Xu M (2013) A LBP based method for detecting copy-move forgery with rotation. Springer Science, pp 261–267
Zhang Y, Zhao C, Pi Y, Li S (2012) Revealing image splicing forgery using local binary patterns of DCT coefficients. In: Communications, signal processing, and systems. Springer, New York, pp 181–189
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rathore, N., Jain, N., Singh, P. (2023). Binary Pattern for Copy-Move Image Forgery Detection. In: Kumar Singh, K., Bajpai, M.K., Sheikh Akbari, A. (eds) Machine Vision and Augmented Intelligence. Lecture Notes in Electrical Engineering, vol 1007. Springer, Singapore. https://doi.org/10.1007/978-981-99-0189-0_37
Download citation
DOI: https://doi.org/10.1007/978-981-99-0189-0_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0188-3
Online ISBN: 978-981-99-0189-0
eBook Packages: Computer ScienceComputer Science (R0)