Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization

被引:6
作者
Oommen, Rani Susan [1 ]
Jayamohan, M. [2 ]
Sruthy, S. [1 ]
机构
[1] Sree Buddha Coll Engn, Dept Comp Sci & Engn, Elavumthitta 689625, India
[2] Coll Appl Sci, Dept Comp Sci, Adoor 691523, India
来源
INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015) | 2016年 / 24卷
关键词
Image Forensics; Copy-move forgery detection; Local Fractal Dimension; B plus -tree; Singular Value Decomposition;
D O I
10.1016/j.protcy.2016.05.176
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Verification of the authenticity of images that are circulated through media and public outlets is a critical issue in image forensics. Copy-move forgery is the most common image forgery that conceals a particular feature from the scene by replacing it with another feature of the same image. We propose a hybrid approach based on local fractal dimension (LFD) and singular value decomposition (SVD) to efficiently detect and localize the duplicated regionsin images. First the image is partitioned into fixed size blocks and the local fractal dimension is estimated. In order to reduce the inherent computational complexity of fractal techniques, the image blocks are arranged in a B+ tree based on the LFD values. Pair of blocks within each segment is compared using singular values, to find regions that exhibit maximum resemblance. This reduces the need for comparison to the most suspected image portions alone. The experimental results show how effectively the method identifies the duplicated region; also presents the robustness of the method to detect forgery in the presence of after-copying manipulations such as rotation, blurring of edges and noise addition. The method proves to be effective in detecting multiple forgeries within the image. (C) 2016 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:1452 / 1459
页数:8
相关论文
共 12 条
[1]  
[Anonymous], 2013, J. Inf. Hiding Multimedia Signal Process.
[2]  
[Anonymous], IEEE W NEW YORK IM P
[3]  
Cao L., 2006, Singular value decomposition applied to digital image processing
[4]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854
[5]  
Fridrich A. J., 2003, P DIG FOR RES WORKSH
[6]  
Jiri Fridrich, 1999, MULT SEC WORKSH ACM, V99
[7]  
Mohamadian Zahra, 2013, COMP MOD SIM UKSIM 2
[8]  
Sadek Rowayda A, 2012, 12117102 ARXIV
[9]  
Samanta D., 2000, CLASSIC DATA STRUCTU
[10]   AN EFFICIENT DIFFERENTIAL BOX-COUNTING APPROACH TO COMPUTE FRACTAL DIMENSION OF IMAGE [J].
SARKAR, N ;
CHAUDHURI, BB .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1994, 24 (01) :115-120