Copy-move forgery detection using multiresolution local binary patterns

被引:79
作者
Davarzani, Reza [1 ]
Yaghmaie, Khashayar [1 ]
Mozaffari, Saeed [1 ]
Tapak, Meysam [1 ]
机构
[1] Semnan Univ, Dept Elect & Comp Engn, Semnan, Iran
关键词
Digital image forensics; Copy-move forgery; Local binary patterns; Duplicated region detection; SEARCH TREES; REGION; CLASSIFICATION;
D O I
10.1016/j.forsciint.2013.04.023
中图分类号
DF [法律]; D9 [法律]; R [医药、卫生];
学科分类号
0301 ; 10 ;
摘要
Copy-move forgery is one of the most popular tampering artifacts in digital images. In this paper, we present an efficient method for copy-move forgery detection using Multiresolution Local Binary Patterns (MLBP). The proposed method is robust to geometric distortions and illumination variations of duplicated regions. Furthermore, the proposed block-based method recovers parameters of the geometric transformations. First, the image is divided into overlapping blocks and feature vectors for each block are extracted using LBP operators. The feature vectors are sorted based on lexicographical order. Duplicated image blocks are determined in the block matching step using k-d tree for more time reduction. Finally, in order to both determine the parameters of geometric transformations and remove the possible false matches, RANSAC (RANdom SAmple Consensus) algorithm is used. Experimental results show that the proposed approach is able to precisely detect duplicated regions even after distortions such as rotation, scaling, JPEG compression, blurring and noise adding. (c) 2013 Elsevier Ireland Ltd. All rights reserved.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 31 条
[1]   Face description with local binary patterns:: Application to face recognition [J].
Ahonen, Timo ;
Hadid, Abdenour ;
Pietikainen, Matti .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2006, 28 (12) :2037-2041
[2]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[3]  
Amsberry C., 1989, The Wall Street Journal
[4]  
[Anonymous], 2004, ADVENT TECHNICAL REP
[5]  
[Anonymous], TR2004515 DARTM COLL
[6]  
[Anonymous], PATTERN RECOG IMAGE
[7]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[8]   MULTIDIMENSIONAL BINARY SEARCH TREES USED FOR ASSOCIATIVE SEARCHING [J].
BENTLEY, JL .
COMMUNICATIONS OF THE ACM, 1975, 18 (09) :509-517
[9]  
Blythe P., 2004, P DIG FOR RES C DFRW
[10]   Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (08) :1759-1770