Image Forgery Detection Using Co-occurrence-Based Texture Operator in Frequency Domain

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 518)

Abstract

Image tampering/forgery can be accomplished easily using precise image editing software. However, different type of traces is introduced during image forgery process that may helpful in image forgery detection. This paper is an attempt to propose a robust blind image tampering detection technique in accordance with wavelet transform and texture descriptor. Image crucial details are highlighted using shift-invariant stationary wavelet transform. This transform provides more information about image internal statistics in comparison with DWT. Further to convert this information in terms of the feature vector, co-occurrence-based texture operator is used. The linear kernel SVM classifier is utilized to distinguish between pristine and forged images. The effectiveness of the proposed technique is proved on three image forgery evaluation databases, i.e., CASIA v1.0, Columbia and DSO-1.

Keywords

Image forgery detection Texture operator Splicing 

References

  1. 1.
    Chen, W., Shi, YQ, Su, W.: Image splicing detection using 2-d phase congruency and statistical moments of characteristic function, in Proc. of SPIE, San Jose, CA, (2007) 6505Google Scholar
  2. 2.
    Shao-Jie, S. U. N., W. U. Qiong, L. I. Guo-Hui: Detection of image compositing based on a statistical model for natural images. Acta Automatica Sinica, 35(12), (2009) 1564–1568Google Scholar
  3. 3.
    Zhang, P., Kong, X.: Detecting image tampering using feature fusion. in Proc. International Conference on Availability, Reliability and Security, ARES, (2009) 335–340Google Scholar
  4. 4.
    He, Z., Lu, W., Sun, W., and Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 45(12), (2012) 4292–4299Google Scholar
  5. 5.
    Zhao, X., Wang, S., Li, S., Li, J. and Yuan, Q.: Image splicing detection based on noncausal Markov model. In Proc. IEEE International Conference on Image Processing (ICIP), (2013) 4462–4466Google Scholar
  6. 6.
    Ahonen, T., Hadid, A., Pietikainen, M.: Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), (2006) 2037–2041Google Scholar
  7. 7.
    Muhammad, G., Al-Hammadi, M., Hussain, M., Bebis, G.: Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications, (2013) 1–11Google Scholar
  8. 8.
    Nosaka, R., Ohkawa, Y., Fukui, K.: Feature extraction based on co-occurrence of adjacent local binary patterns. in Proc. of fifth Pacific Rim Conference on Advance Image Video Technology, (2012) 82 –91Google Scholar
  9. 9.
    CASIA Tampered Image Detection Evaluation Database, http://forensics.idealtest.org
  10. 10.
    Ng, T-T, Jessie H., and Shih-Fu C.: Columbia image splicing detection evaluation dataset. (2009)Google Scholar
  11. 11.
    De Carvalho, T.J., Riess, C., Angelopoulou, E., Pedrini, H., de Rezende Rocha, A.: Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security, 8(7), (2013) 1182–1194Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer EngineeringNetaji Subhas Institute of TechnologyDwarka, New DelhiIndia

Personalised recommendations