Advertisement

A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern

  • Andrey Kuznetsov
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 766)

Abstract

An obvious way of digital image forgery is a copy-move attack. It is quite simple to carry out to hide important information in an image. Copy-move process contains three main steps: copy the fragment from one place of an image, transform it by some means and paste to another place of the same image. A lot of papers on development of copy-move detection algorithms exist nowadays though the achieved results are far from perfect, so they are frequently improved. In this paper, it is proposed a new copy-move detection algorithm based on geometric local binary patterns (GLBP). GLBP features are robust to contrast enhancement, additive Gaussian noise, JPEG compression, affine transform. Another advantage of these features is low computational complexity. Conducted experiments compare GLBP-based features with features based on other forms of local binary patterns. The proposed solution showed high precision and recall values during experimental research for wide ranges of transform parameters. Thus, it showed a meaningful improvement in detection accuracy.

Keywords

Forgery detection Copy-move Geometric local binary pattern GLBP feature Transform invariant 

References

  1. 1.
  2. 2.
  3. 3.
    Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1053–1056 (2009)Google Scholar
  4. 4.
    Bravo-Solorio, S., Nandi, A.K.: Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans. Inf. Forensics Secur. 7, 1018–1028 (2012)CrossRefGoogle Scholar
  5. 5.
    Cao, Y., Gao, T., Fan, L., Yang, Q.: A robust detection algorithm for copy-move forgery in digital images. Forensic Sci. Int. 214, 33–43 (2012)CrossRefGoogle Scholar
  6. 6.
    Christlein, V., Riess, C., Jordan, J., Riess, C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7, 1841–1854 (2012)CrossRefGoogle Scholar
  7. 7.
    Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 206, 178–184 (2011)CrossRefGoogle Scholar
  8. 8.
    Mahdian, B., Saic, S.: Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci. Int. 171, 180–189 (2007)CrossRefGoogle Scholar
  9. 9.
    Muhammad, G., Hussain, M., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9, 49–57 (2012)CrossRefGoogle Scholar
  10. 10.
    Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. In: Proceedings of the 2008 IEEE International Conference on Computer Science and Software Engineering, pp. 926–930 (2008)Google Scholar
  11. 11.
    Lee, J.C., Chang, C.P., Chen, W.K.: Detection of copy–move image forgery using histogram of orientated gradients. Inf. Sci. 321(C), 250–262 (2015)CrossRefGoogle Scholar
  12. 12.
    Fridrich, J., Soukal, D., Lukáš, J.: Detection of copy-move forgery in digital images. In: Proceedings of the Digital Forensic Research Workshop. Citeseer (2003)Google Scholar
  13. 13.
    Wu, Q., Wang, S., Zhang, X.: Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Process. Lett. 18, 559–562 (2011)CrossRefGoogle Scholar
  14. 14.
    Kuznetsov, A., Myasnikov, V.: A copy-move detection algorithm using binary gradient contours. In: Campilho, A., Karray, F. (eds.) ICIAR 2016. LNCS, vol. 9730, pp. 349–357. Springer, Cham (2016). doi: 10.1007/978-3-319-41501-7_40 CrossRefGoogle Scholar
  15. 15.
    Orjuela Vargas, S.A., Yañez Puentes, J.P., Philips, W.: The geometric local textural patterns (GLTP). In: Brahnam, S., Jain, L., Nanni, L., Lumini, A. (eds.) Local Binary Patterns: New Variants and Applications. Studies in Computational Intelligence, vol. 506. Springer, Heidelberg (2014). doi: 10.1007/978-3-642-39289-4_4
  16. 16.
    Wang, L., He, D.-C.: Texture classification using texture spectrum. Pattern Recogn. 23(8), 905–910 (1990)CrossRefGoogle Scholar
  17. 17.
    Arasteh, S., Hung, C.-C.: Color and texture image segmentation using uniform local binary patterns. Mach. Graph. Vis. 15(3–4), 265–274 (2006)Google Scholar
  18. 18.
    Ren, J., Jiang, X., Yuan, J.: Noise-resistant local binary pattern with an embedded error-correction mechanism. IEEE Trans. Image Process. 22(10), 4049–4060 (2013)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Ojala, T., Pietikinen, M., Menp, T.: Multiresolution grayscale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Samara National Research UniversitySamaraRussia

Personalised recommendations