Spatial-contextual texture and edge analysis approach for unsupervised change detection of faces in counterfeit images

被引:2
作者
David, Beulah [1 ]
Rangasamy, Dorai [1 ]
机构
[1] Department of Computer Science and Engineering, Sathyabama University, Chennai
关键词
Change detection; cloned image forgery; counterfeit; face comparison; face segmentation; feature comparison;
D O I
10.1080/1206212X.2016.1188555
中图分类号
学科分类号
摘要
Images transfer more information about expressing an occasion than words. The skillful knowledge should exist to perceive the change in objects present in those images. Also, there is no sign existing to crisscross the objects are liable or not. The internet images should be legitimate to approve its truthiness. The cloned image forgery can be performed by many sophisticated cameras and by editing software. Therefore, a proposal should present to detect the change in counterfeit or forgery-based images to warrant the objects existing in the image are true. The input images are pre-processed to generate the Gray world and illuminant maps. The faces in the input images are segmented using both automatic and semi-automatic methods. The texture from the faces is bred using the values from pixels of locality. Canny detector is applied to distinguish the edge in the face. The features acquired from the faces are compared with each other to sense the counterfeit face that is spliced in the original image to make them as the composite image. The features are then trained to catalog them as forgery or no forgery. Existing methodologies has the capability to identify forgery in image with the extreme of two faces. The proposed method has the prospect to spot every faces present in the image. The cloned counterfeit faces are removed from the image by spatial contextual correlation strategy of image completion. Experimental results show that the proposed methodology achieves well than the other approaches present in the literature. © 2016 Informa UK Limited.
引用
收藏
页码:143 / 159
页数:16
相关论文
共 27 条
[11]  
Johnson M., Farid H., Exposing digital forgeries in complex lighting environments, IEEE Trans. Inf. Forensics Secur., 2, pp. 450-461, (2007)
[12]  
Johnson M., Farid H., Exposing digital forgeries through specular highlights on the eye, Proceedings of the International Workshop on Information Hiding, pp. 311-325, (2007)
[13]  
Barnard K., Cardei V., Funt B., A comparison of computational color constancy algorithms. I: Methodology and experiments with synthesized data, IEEE Trans. Image Process., 11, pp. 972-984, (2002)
[14]  
Ebner M., Color constancy using local color shifts, Proceedings of the European Conference on Computer Vision. Part III., pp. 276-287, (2004)
[15]  
Gijsenij A., Lu R., Gevers T., Color constancy for multiple light sources, IEEE Trans. Image Process., 21, pp. 697-707, (2012)
[16]  
Wu X., Fang Z., Image splicing detection using illuminant color inconsistency, Proceedings of the IEEE International Conference on Multimedia Information, Networking and Security, pp. 600-603, (2011)
[17]  
Kavitha V.P., Priyatha M., A novel digital image forgery detection method using SVM classifier, Int. J. Adv. Res. Electr. Electron. Instrum. Eng., 3, pp. 160-165, (2014)
[18]  
Gepshtein S., Keller Y., Image completion by diffusion maps and spectral relaxation, IEEE Trans. Image Process., 22, pp. 2983-2994, (2013)
[19]  
Farid H., A 3-D lighting and shadow analysis of the JFK Zapruder film (Frame 317), Tech. Rep. TR2010-677, (2010)
[20]  
Theo E., Real-time Viola Jones face detection in a web browser, Proceedings of the Canadian Conference on Computer and Robot Vision, (2009)