ArticlePDF Available

Image Splicing Forgery Detection Using Local Binary Pattern and Shift Vector

Authors:
  • Alimam University Coolege
  • Al-Rasheed University College

Abstract

Digital images are the simple and fast way of communication. It can convey huge information in short time. But In our now life days various tools and application are available that manipulates the image without leaving any trace of tampering. So we need to design a system to detect the forged image. There are two types of image forgery first one is copy-move and second one is Image splicing. In this paper will base on the splicing image, and the proposed system will utilize Local Binary Pattern and Shift Vector techniques. The required steps to detect the forgery are pre-processing, feature extraction, feature matching.
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2015): 78.96 | Impact Factor (2015): 6.391
Volume 6 Issue 7, July 2017
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Image Splicing Forgery Detection Using Local
Binary Pattern and Shift Vector
Mohanad F. Jwaid Al-Husseinawi1, Husam K. Salih2, Saif A. Salim3, Ahmed Q. Mohammed4
1, 2Maharashtra Institute of Technology, Information Technology, Pune, India
3, 4Dr. DY Patil Institute of Technology, Department of Computer, Pune, India
Abstract: Digital images are the simple and fast way of communication. It can convey huge information in short time. But In our now
life days various tools and application are available that manipulates the image without leaving any trace of tampering. So we need to
design a system to detect the forged image. There are two types of image forgery first one is copy-move and second one is Image
splicing. In this paper will base on the splicing image, and the proposed system will utilize Local Binary Pattern and Shift Vector
techniques. The required steps to detect the forgery are pre-processing, feature extraction, feature matching.
Keywords: Digital image, Splicing image, LBP, Shift Vector
1. Introduction
In our time, digital image plays a significant part in our life.
It being used as a means of pictorial information in everyday
newspapers and magazines as a proof in courts of law, and in
the medical diagnose field [1]. On the other hand, there are
an advanced of great image processing tools, anyone can
easily modification a real picture and generate a fake image.
Photoshop, GIMP, PAINT COREL are an example of such
an editing tools which can do an alteration in digital images
by changing chunks of an image without leaving the special
effects of the modification in the fake image. These changes
cannot be discovered through human eyes. The image fakes
can hide or add a significant piece in an original image to
misguide the court of law [2]. There are two methods of
image forgery, passive and active approach, where passive
method contain image splicing and copy-move image. The
active method contain digital signature and watermarking.
Image splicing is one of the most common kinds of image
tampering [3]. There are many techniques utilized for
discovery image forgery as: discrete wavelet transform,
principle component analysis, discrete cosine transform,
Singular Value Decomposition, Scale Invariant Feature
Transformation and Locally Linear Embedding. In this paper
will base on LBP, shift vector techniques. There is an urgent
need to design an image forgery detection system in various
fields of Forensic investigation, Criminal investigation,
insurance processing, Surveillance systems, Intelligence
services, Medical imaging and Journalism. Next figures will
present image forgery types.
Figure 1: Image forgery types
2. Image Splicing
Image splicing is a common kind to make a tampered image
where a section from one image is copied and pasted into
another image which products composite picture called
spliced image; cut and join two or more snaps of pictures [2].
This type of fake is a challenging issue from tamper detection
point of view. The complicated forgery may include some
post-processing like blurring, JPEG compression, etc. [4].
That performs the forgery detection very hard. Many
researchers tend to discover techniques that discover this
kind of forgery. There are various methods to discover such
an alteration, some of them dependent on the format of the
image Figure 2 shows one of the example of image splicing
process.
Figure 2: Steps to create image splicing
+
Paper ID: ART20175144
406
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2015): 78.96 | Impact Factor (2015): 6.391
Volume 6 Issue 7, July 2017
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Figure 3: Example of image splicing
3. Proposed Algorithm
To detect the splicing forgery image, we must to apply four
steps: pre-processing, feature extraction, feature matching
then Post-processing
3.1 Convert RGB to YCbCr
In this step we change the colour of an input image from R,
G, B (red, green, blue) to the YCbCr colour. First thing we
need to know what the meaning of RGB. Image is stored in
the memory as values of pixels, each pixel include three
bytes, and each bytes include eight bits. So the total values is
equal to 16 million colour in each pixel.
Figure 4: RGB colour
While YCbCr Contain the color information and they can be
highly compressed. It is include two parts, Luminance and
Chrominance. This paper based on the Chrominance, because
the human eyes are less sensitive to chrominance than
luminance.
Figure 5: YCbCr colour
To extract YCbCr from R, G, and B, we need to apply:
𝑌=0.299𝑅+0.587𝐺+0.114𝐵 ………… (1)
𝐶𝑟=0.701𝑅0.587𝐺0.114𝐵…….….. (2)
𝐶𝑏=−0.299𝑅0.587𝐺+0.886𝐵……… (3)
Figure 6: Pre-processing
After pre-processing, input image will dividing into
overlapping block.
3.2 Apply LBP
In feature extraction, we utilize Local Binary Pattern. Where
LBP is a powerful feature for texture classification which has
been used widely in this manner. LBP computed by apply:
LBPp.r = )2i ……… (4)
S (Pi-Pc) = … (5)
Where pc is the gray value of the center pixel and pi
represents eight neighbouring pixels. If pi is smaller than pc,
then the binary result of the pixel is set to 0; otherwise, it is
set to 1.
Figure: 7 computing the original LBP code
Paper ID: ART20175144
407
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2015): 78.96 | Impact Factor (2015): 6.391
Volume 6 Issue 7, July 2017
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
After feature extraction step, blocks with similar feature
vectors must be identified, and exact copied blocks are
determined based upon some criteria. To implement this
method, the feature vectors are lexicographically sorted and
similar vectors are determined to specify the forgery.
3.3 Apply Shift vector
In this step we match between the points of images to select
if the upload image is original or forgery. Shift vector is
utilize in this step. Let (x1, x2) and (y1, y2) be the locations
of two similar blocks. The shift vector between blocks can be
computed as in:
Sh = (sh1, sh2) = (x1-y1), (x2-y2) ………. (6)
Sh and Sh, both shift vectors represents same shifting so
they can be normalized. If required, shift vector is multiplied
with −1 such that sh1 ≥ 0. Counter value k of normalized
shift vector increased block pair with same shifting is
detected.
K (Sh1, Sh2) = k (Sh1, Sh2) +1 ……………… (7)
Firstly, counter value is set as zero. When this method
complete, counter value displays frequency of occurrence of
different shift vectors corresponding to matching chunks. A
threshold is set for occurrence of normalized shift. Sh (1), Sh
(2), Sh (n). . If threshold value is great then some matching
blocks will be detected as non-match. For minor value of
threshold too a lot of incorrect matches will happen.
With shift vectors, matched blocks are discovered. Blocks
with similar shifting are characterized with different colour to
display fake section of input duplicate.
Figure 8: Proposed system architecture
4. Experimental Result
The upload image of the proposed system is being taken from
CASIA dataset. CASIA ITDE V1.0, it is collected an image
set containing 1,721 color images of size 384 _ 256 pixels
with JPEG format. It divided these images into two subsets:
authentic set and tampered set. There are 800 images in the
authentic set and 921 images in the tampered set. The
proposed system is based on two parameters:
TPR = ……. (8)
FPR = … (9)
Table 1: Average detection rate
Method TPR % FPR %
Yu-Feng Hsu and Shih-Fu Chang [7] 70 9
X.Pan, and S.Lyu [6] 83 8.8
Thibaut Julliand_, Vincent Nozick † and
Hugues Talbot [8] 84 5.9
The proposed method 89 8
5. Conclusion
The meaning of image forgery detection discussed in this
paper, there are two types of forgery. The common types of
forgery is splicing image. The proposed method started with
divide the chrominance of input image into overlapping
blocks. Then Local Binary Pattern utilized in feature
extraction. In the feature, matching applied shift vector. The
input image is taken from CASIA V1. The accuracy is
achieved to 89 % and the percent of false is decreased to 8%.
References
[1] Bayram S., Avcibas I., Sankur, and B. Memon N.,
“Image manipulation detection,” Journal of Electronic
Imaging October - December 2006 Volume 15, Issue
4, 041102 (17 pages), vol. 15(4), 2006.
[2] Sencar H. T. Memon N. Sutcu Y., Coskun B., “Tamper
detection based on regularity of wavelet transform
coefficients,” Proc. ICIP, International Conference on
Image Processing, 2007.
[3] T. J. De Carvalho, C. Riess, E. Angelopoulou, H.
Pedrini, and A. D. R. Rocha, “Exposing digital image
forgeries by illumination color classification,” IEEE
Trans. Inf. Forensics Secur., vol. 8, no. 7, pp. 1182
1194, 2013
[4] P. Zhang, and X. Kong, “Detecting image tampering
using feature fusion,” In Proc. International Conference
on Availability, Reliability, and Security, ARES, pp.
335340, 2009.
[5] Y.-F. Hsu and S.-F. Chang, “Detecting image splicing
using geometry invariants and camera characteristics
consistency”, IEEE ICME, July 2006.
[6] X.Pan, and S.Lyu, Member, "Region Duplication
Detection Using Image Feature Matching", IEEE
transactions on information forensics and security, vol.
5, no. 4, december 2010
[7] Yu-Feng Hsu and Shih-Fu Chang, image splicing
detection using camera response function consistency
and automatic segmentation”, IEEE, ICME 2007
[8] Thibaut Julliand, Vincent Nozick, Hugues Talbot,
Automated Image Splicing Detection from Noise
Estimation in Raw Images”, 2017
[9] B. Mahdian and S. Saic. Using Noise Inconsistencies for
Blind Image Forensics. Image and Vision Computing,
2009.
Paper ID: ART20175144
408
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2015): 78.96 | Impact Factor (2015): 6.391
Volume 6 Issue 7, July 2017
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
[10] K. Francis, S. Gholap, and P. K. Bora, “Illuminant
colour based image forensics using mismatch in human
skin highlights,” 20th Natl. Conf. Commun. NCC 2014,
2014
[11] S. J. Ryu, M. Kirchner, M. J. Lee, and H. K. Lee,
"Rotation Invariant Localization of Duplicated Image
Regions Based on Zernike Moments," Ieee Transactions
on Information Forensics and Security, vol. 8, pp. 1355-
1370, Aug 2013.
[12] J. Wang, G. Liu, Z. Zhang, Y. Dai, and Z. Wang, "Fast
and robust forensics for image region-duplication
forgery," Acta Automatica Sinica, vol. 35, pp. 1488-
1495, 2009.
[13] A. J. Fridrich, B. D. Soukal, and A. J. Lukáš, "Detection
of copy-move forgery in digital images," in in
Proceedings of Digital Forensic Research Workshop,
2003.
[14] Sokolova, M., N. Japkowicz, Beyond Accuracy, F-Score
and ROC: A Family of Discriminant Measures for
Perfor- mance Evaluation, Advances in Arti_cial
Intelligence, 4304, 1015-1021 (2006).
[15] Jaberi, M., Bebis, G., Hussain, M., Muhammad, G., Ac-
Curate and robust localization of duplicated region in
copy-Move image forgery, Machine Vision and
Applications, 25(2), 451-475 (2014).
Author Profile
Mohanad F. Jwaid Al-Husseinawi was born in
Baghdad, Iraq1988. He received his Bachelors in
Engineering of Computer Techniques from Al-
Mammon University Collage, Baghdad, Iraq 2014. He
took his Masters in Engineering of Information Technology from
Maharashtra Institute of Technology (MIT), Pune University, Pune,
India 2017. His areas of interest include Image Processing,
communications.
Husam K. Salih Jubori was born in Baghdad,
Iraq1989. He received his Bachelors in Engineering of
Computer Techniques from Al-Mammon University
Collage, Baghdad, Iraq 2014. He took his Masters in
Engineering of Information Technology from
Maharashtra Institute of Technology (MIT), Pune University, Pune,
India 2017. His areas of interest include Image Processing,
Artificial Intelligence.
Saif A. Salim was born in Baghdad, Iraq1992. He
received his Bachelors in Engineering of Computer
Techniques from Al-Mammon University Collage,
Baghdad, Iraq 2014. He took his Masters in Computer
Engineering from DR.DY Patil Institute of
Technology, Pune University, Pune, India 2017. His
areas of interest include Big Data, Image processing.
Ahmed Q. Mohammed was born in Baghdad,
Iraq1989. He received his Bachelors in Engineering of
Computer Techniques from Al-Mammon University
Collage, Baghdad, Iraq 2013. He took his Masters in
Computer Engineering from DR.DY Patil Institute of
Technology, Pune University, Pune, India 2017. His areas of
interest include Big Data, Image processing.
Paper ID: ART20175144
409
Article
Full-text available
Splicing is a common image manipulation technique in which a region from a first image is pasted onto a second image to alter its content. In this paper, we use the fact that different images have different noise characteristics, according to the camera and lighting conditions during the image acquisition. The proposed method automatically detects image splicing in raw images by highlighting local noise inconsistencies within a quadtree scan of the image. The image noise is modelized by both Gaussian and Poisson noise components. We demonstrate the efficiency and robustness of our method on several images generated with an automated image splicing.
Article
Full-text available
For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Although photographers are able to create composites of analog pictures, this process is very time consuming and requires expert knowledge. Today, however, powerful digital image editing software makes image modifications straightforward. This undermines our trust in photographs and, in particular, questions pictures as evidence for real-world events. In this paper, we analyze one of the most common forms of photographic manipulation, known as image composition or splicing. We propose a forgery detection method that exploits subtle inconsistencies in the color of the illumination of images. Our approach is machine-learning-based and requires minimal user interaction. The technique is applicable to images containing two or more people and requires no expert interaction for the tampering decision. To achieve this, we incorporate information from physics- and statistical-based illuminant estimators on image regions of similar material. From these illuminant estimates, we extract texture- and edge-based features which are then provided to a machine-learning approach for automatic decision-making. The classification performance using an SVM meta-fusion classifier is promising. It yields detection rates of 86% on a new benchmark dataset consisting of 200 images, and 83% on 50 images that were collected from the Internet.
Article
Full-text available
Copy–move image forgery detection has recently become a very active research topic in blind image forensics. In copy–move image forgery, a region from some image location is copied and pasted to a different location of the same image. Typically, post-processing is applied to better hide the forgery. Using keypoint-based features, such as SIFT features, for detecting copy–move image forgeries has produced promising results. The main idea is detecting duplicated regions in an image by exploiting the similarity between keypoint-based features in these regions. In this paper, we have adopted keypoint-based features for copy–move image forgery detection; however, our emphasis is on accurate and robust localization of duplicated regions. In this context, we are interested in estimating the transformation (e.g., affine) between the copied and pasted regions more accurately as well as extracting these regions as robustly by reducing the number of false positives and negatives. To address these issues, we propose using a more powerful set of keypoint-based features, called MIFT, which shares the properties of SIFT features but also are invariant to mirror reflection transformations. Moreover, we propose refining the affine transformation using an iterative scheme which improves the estimation of the affine transformation parameters by incrementally finding additional keypoint matches. To reduce false positives and negatives when extracting the copied and pasted regions, we propose using “dense” MIFT features, instead of standard pixel correlation, along with hysteresis thresholding and morphological operations. The proposed approach has been evaluated and compared with competitive approaches through a comprehensive set of experiments using a large dataset of real images (i.e., CASIA v2.0). Our results indicate that our method can detect duplicated regions in copy–move image forgery with higher accuracy, especially when the size of the duplicated region is small.
Article
Full-text available
Region duplication is a simple and effective operation to create digital image forgeries, where a continuous portion of pixels in an image, after possible geometrical and illumination adjustments, are copied and pasted to a different location in the same image. Most existing region duplication detection methods are based on directly matching blocks of image pixels or transform coefficients, and are not effective when the duplicated regions have geometrical or illumination distortions. In this work, we describe a new region duplication detection method that is robust to distortions of the duplicated regions. Our method starts by estimating the transform between matched scale invariant feature transform (SIFT) keypoints, which are insensitive to geometrical and illumination distortions, and then finds all pixels within the duplicated regions after discounting the estimated transforms. The proposed method shows effective detection on an automatically synthesized forgery image database with duplicated and distorted regions. We further demonstrate its practical performance with several challenging forgery images created with state-of-the-art tools.
Conference Paper
Full-text available
Along with the development of sophisticated image processing software, it is getting easier forging a digital image but harder to detect it. It is already a problem for us to distinguish tampered photos from authentic ones. In this paper, we propose an approach based on feature fusion to detect digital image tampering. First, we extract the feature statistics that can represent the property of a camera from the images taken by that camera. These feature statistics are used for training a one-class classifier in order to get the feature pattern of the given camera. Then, we do sliding segmentation to testing images. Finally, feature statistics extracted from image blocks are fed into the trained one-class classifier to match the feature pattern of the given camera. The images with low percentage of matched blocks are classified as tampered ones. Our method could achieve a high accuracy in detecting the tampered images that undergone post-processing such as JPEG compression, re-sampling and retouching.
Article
Full-text available
Techniques and methodologies for validating the authenticity of digital images and testing for the presence of doctoring and manipulation operations on them has recently attracted attention. We review three categories of forensic features and discuss the design of classifiers between doctored and original images. The performance of classifiers with respect to selected controlled manipulations as well as to uncontrolled manipulations is analyzed. The tools for image manipulation detection are treated under feature fusion and decision fusion scenarios. (c) 2006 SPIE and IS&T
Conference Paper
This paper presents a method to detect image splicing, specifically copying and pasting a person from an image to another. This is based on the fact that it is very difficult to match the illuminance property of the light sources estimated from several persons in a spliced image. The proposed method detects the illuminant colour mismatch among different persons in a composite image. The dichromatic reflection model is utilized to obtain the illuminant colour estimate from human skin highlights. The illuminant colour obtained is quantified using chromaticity coordinates. It is then matched against that of different persons in the composite image to detect the forgery.
Article
This paper proposes a forensic technique to localize duplicated image regions based on Zernike moments of small image blocks. We exploit rotation invariance properties to reliably unveil duplicated regions after arbitrary rotations. We devise a novel block matching procedure based on locality sensitive hashing and reduce false positives by examining the moments' phase. A massive experimental test setup benchmarks our algorithm against state-of-the-art methods under various perspectives, examining both pixel-level localization and image-level detection performance. By taking signal characteristics into account and distinguishing between “textured” and “smooth” duplicated regions, we find that the proposed method outperforms prior art in particular when duplicated regions are smooth. Experiments indicate high robustness against JPEG compression, blurring, additive white Gaussian noise, and moderate scaling.
Article
Region duplication forgery, in which a part of a digital image is copied and then pasted to another portion of the same image, is one of the simple and common image forgery techniques. Most of the existing algorithms are not robust to the post region duplication image processing, and have high time complexity. In this paper, we describe an efficient and robust algorithm for detecting and localizing this type of malicious tampering. The image is first reduced in dimension by Gaussian pyramid, and the Hu moment is applied to the fixed sized overlapping blocks of low-frequency image. The eigenvectors are lexicographically sorted. Then, similar eigenvectors are matched by a certain threshold value. Finally, the area threshold value is proposed to remove the wrong similar blocks. The mathematical morphology operations are performed to locate the tampered part. Experimental results show that our method is robust and that it can not only successfully detect this type of tampering for images subject to various forms of post region duplication image processing, including noise contamination, blurring, and severe lossy compression, but also reduce the total number of blocks to narrow block-matching searching space, which can improve the method efficiency.
Article
A commonly used tool to conceal the traces of tampering is the addition of locally random noise to the altered image regions. The noise degradation is the main cause of failure of many active or passive image forgery detection methods. Typically, the amount of noise is uniform across the entire authentic image. Adding locally random noise may cause inconsistencies in the image’s noise. Therefore, the detection of various noise levels in an image may signify tampering. In this paper, we propose a novel method capable of dividing an investigated image into various partitions with homogenous noise levels. In other words, we introduce a segmentation method detecting changes in noise level. We assume the additive white Gaussian noise. Several examples are shown to demonstrate the proposed method’s output. An extensive quantitative measure of the efficiency of the noise estimation part as a function of different noise standard deviations, region sizes and various JPEG compression qualities is proposed as well.