Passive Detection of Splicing and Copy-Move Attacks in Image Forgery

Internet of Things (IoT) image sensors for surveillance and monitoring, digital cameras, smart phones and social media generate huge volume of digital images every day. Image splicing and copy-move attacks are the most common types of image forgery that can be done very easily using modern photo editing software. Recently, digital forensics has drawn much attention to detect such tampering on images. In this paper, we introduce a novel feature extraction technique, namely Sum of Relevant Inter-Cell Values (SRIV) using which we propose a passive (blind) image forgery detection method based on Discrete Cosine Transformation (DCT) and Local Binary Pattern (LBP). First, the input image is divided into non-overlapping blocks and 2D block DCT is applied to capture the changes of a tampered image in the frequency domain. Then LBP operator is applied to enhance the local changes among the neighbouring DCT coefficients, magnifying the changes in high frequency components resulting from splicing and copy-move attacks. The resulting LBP image is again divided into non-overlapping blocks. Finally, SRIV is applied on the LBP image blocks to extract features which are then fed into a Support Vector Machine (SVM) classifier to identify forged images from authentic ones. Extensive experiment on four well-known benchmark datasets of tampered images reveal the superiority of our method over recent state-of-the-art methods.

[1]  Jing Dong,et al.  Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.

[2]  Muhammad Ghulam,et al.  Passive detection of image forgery using DCT and local binary pattern , 2016, Signal, Image and Video Processing.

[3]  Yiming Pi,et al.  Image-splicing forgery detection based on local binary patterns of DCT coefficients , 2015, Secur. Commun. Networks.

[4]  Yun Q. Shi,et al.  A natural image model approach to splicing detection , 2007, MM&Sec.

[5]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[6]  Andreas Uhl,et al.  Lightweight Detection of Additive Watermarking in the DWT-Domain , 2011, IEEE Transactions on Image Processing.

[7]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[8]  Wei Su,et al.  Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.

[9]  Wei Lu,et al.  Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..

[10]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[11]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[12]  Jing Dong,et al.  CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[13]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[14]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[15]  Hongtao Lu,et al.  Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..

[16]  Tieniu Tan,et al.  Image tampering detection based on stationary distribution of Markov chain , 2010, 2010 IEEE International Conference on Image Processing.