Advertisement

Passive Detection of Splicing and Copy-Move Attacks in Image Forgery

  • Mohammad Manzurul Islam
  • Joarder Kamruzzaman
  • Gour Karmakar
  • Manzur Murshed
  • Gayan Kahandawa
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11304)

Abstract

Internet of Things (IoT) image sensors for surveillance and monitoring, digital cameras, smart phones and social media generate huge volume of digital images every day. Image splicing and copy-move attacks are the most common types of image forgery that can be done very easily using modern photo editing software. Recently, digital forensics has drawn much attention to detect such tampering on images. In this paper, we introduce a novel feature extraction technique, namely Sum of Relevant Inter-Cell Values (SRIV) using which we propose a passive (blind) image forgery detection method based on Discrete Cosine Transformation (DCT) and Local Binary Pattern (LBP). First, the input image is divided into non-overlapping blocks and 2D block DCT is applied to capture the changes of a tampered image in the frequency domain. Then LBP operator is applied to enhance the local changes among the neighbouring DCT coefficients, magnifying the changes in high frequency components resulting from splicing and copy-move attacks. The resulting LBP image is again divided into non-overlapping blocks. Finally, SRIV is applied on the LBP image blocks to extract features which are then fed into a Support Vector Machine (SVM) classifier to identify forged images from authentic ones. Extensive experiment on four well-known benchmark datasets of tampered images reveal the superiority of our method over recent state-of-the-art methods.

Keywords

Digital forensics Splicing attack Copy-move attack Discrete Cosine Transformation Local Binary Pattern Support Vector Machine 

Notes

Acknowledgement

This work is supported by the Research Priority Area (RPA) scholarship of Federation University Australia.

References

  1. 1.
    Meola, A.: The Internet of Things: Meaning & Definition. Business Insider (2018)Google Scholar
  2. 2.
    Redi, J.A., Taktak, W., Dugelay, J.-L.: Digital image forensics: a booklet for beginners. Multimed. Tools Appl. 51, 133–162 (2011)CrossRefGoogle Scholar
  3. 3.
    Novak, M.: That Viral Photo of Putin and Trump is Totally Fake. gizmodo.com (2017)Google Scholar
  4. 4.
    Kwitt, R., Meerwald, P., Uhl, A.: Lightweight detection of additive watermarking in the DWT-domain. IEEE Trans. Image Process. 20, 474–484 (2011)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Zhang, Y., Zhao, C., Pi, Y., Li, S., Wang, S.: Image-splicing forgery detection based on local binary patterns of DCT coefficients. Secur. Commun. Netw. 8, 2386–2395 (2015)CrossRefGoogle Scholar
  6. 6.
    Alahmadi, A.A., Hussain, M., Aboalsamh, H.A., Ghulam, M., Bebis, G., Mathkour, H.: Passive detection of image forgery using DCT and local binary pattern. SIViP 11, 81–88 (2017)CrossRefGoogle Scholar
  7. 7.
    Ng, T.-T., Chang, S.-F.: A model for image splicing. In: IEEE International Conference on Image Processing (2004)Google Scholar
  8. 8.
    Hsu, Y.-F., Chang, S.-F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: International Conference on Multimedia and Expo, Canada (2006)Google Scholar
  9. 9.
    Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: IEEE International Conference on Signal and Information Processing, pp. 422–426 (2013)Google Scholar
  10. 10.
    Dong, J., Wang, W.: CASIA tampered imaged detection evaluation database (CASIA TIDE v2.0). National Laboratory of Pattern Recognition, Chinese Academy of Science (2009–2016)Google Scholar
  11. 11.
    Ng, T.-T., Chang, S.-F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits and Systems, pp. 688–691 (2004)Google Scholar
  12. 12.
    Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 177–187. Springer, Heidelberg (2006).  https://doi.org/10.1007/11922841_15CrossRefGoogle Scholar
  13. 13.
    Chen, W., Shi, Y.Q., Su, W.: Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In: Proceedings of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505. SPIE, Washington (2007)Google Scholar
  14. 14.
    Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. In: Kim, H.-J., Katzenbeisser, S., Ho, Anthony T.S. (eds.) IWDW 2008. LNCS, vol. 5450, pp. 76–87. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-04438-0_7CrossRefGoogle Scholar
  15. 15.
    He, Z., Sun, W., Lu, W., Lu, H.: Digital image splicing detection based on approximate run length. Pattern Recogn. Lett. 32, 1591–1597 (2011)CrossRefGoogle Scholar
  16. 16.
    Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of the 9th Workshop on Multimedia & Security, pp. 51–62. ACM, USA (2007)Google Scholar
  17. 17.
    He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45, 4292–4299 (2012)CrossRefGoogle Scholar
  18. 18.
    Wang, W., Dong, J., Tan, T.: Image tampering detection based on stationary distribution of Markov chain. In: IEEE International Conference on Image Processing, pp. 2101–2104 (2010)Google Scholar
  19. 19.
    Khayam, S.A.: The discrete cosine transform (DCT): theory and application. Michigan State University (2003)Google Scholar
  20. 20.
    Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:21–27:27 (2011)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Mohammad Manzurul Islam
    • 1
  • Joarder Kamruzzaman
    • 1
  • Gour Karmakar
    • 1
  • Manzur Murshed
    • 1
  • Gayan Kahandawa
    • 1
  1. 1.School of Science, Engineering and Information TechnologyFederation University AustraliaChurchillAustralia

Personalised recommendations