IMAGE FORGERY DETECTION USING GABOR FILTERS AND DCT

被引:0
作者
Muhammad, Ghulam [1 ]
Dewan, M. Solaiman [2 ]
Moniruzzaman, M. [3 ]
Hussain, Muhammad [1 ]
Huda, M. Nurul
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[2] Tofa Ltd, London, England
[3] Teraways Pvt Ltd, Singapore, Singapore
来源
2014 1ST INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT 2014) | 2014年
关键词
image forgery detection; Gabor filters; discrete cosine transform; support vector machine; TRANSFORM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Determining the authenticity of an image has become crucial due to a widespread use of images in various media to covey real or fake messages. In this paper, an image forgery detection method based on Gabor filters and discrete cosine transform (DCT) is proposed. The output of this method is to determine whether an image is authentic or forged. In this method, first, the input image is converted to gray scale image. Second, several Gabor filters with different scales and orientations are applied to the image. Then the DCT from all the filter outputs (subbands) is calculated. The first N coefficients of the DCT from all the subbands are concatenated to form the feature vector. Some feature selections are used to find optimal feature set. Support vector machine (SVM) is used as a classifier. In the experiments, the proposed method outperforms some state-of-the-art methods of image forgery detection.
引用
收藏
页数:5
相关论文
共 25 条
[1]   DISCRETE COSINE TRANSFORM [J].
AHMED, N ;
NATARAJAN, T ;
RAO, KR .
IEEE TRANSACTIONS ON COMPUTERS, 1974, C 23 (01) :90-93
[2]  
Al-Hammadi MH, 2013, LECT NOTES COMPUT SC, V8034, P503, DOI 10.1007/978-3-642-41939-3_49
[3]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[4]  
Bravo-Solario S., 2009, EUR SIGN PROC C GLAS
[5]  
Chang C., 2010, LIBSVM: A library for support vector machines 2010
[6]   Region duplication detection based on Harris corner points and step sector statistics [J].
Chen, Likai ;
Lu, Wei ;
Ni, Jiangqun ;
Sun, Wei ;
Huang, Jiwu .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (03) :244-254
[7]   TWO-DIMENSIONAL SPECTRAL-ANALYSIS OF CORTICAL RECEPTIVE-FIELD PROFILES [J].
DAUGMAN, JG .
VISION RESEARCH, 1980, 20 (10) :847-856
[8]   Exposing Digital Forgeries From JPEG Ghosts [J].
Farid, Hany .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :154-160
[9]   Normalized Energy Density-Based Forensic Detection of Resampled Images [J].
Feng, Xiaoying ;
Cox, Ingemar J. ;
Doerr, Gwenael .
IEEE TRANSACTIONS ON MULTIMEDIA, 2012, 14 (03) :536-545
[10]   Digital image splicing detection based on Markov features in DCT and DWT domain [J].
He, Zhongwei ;
Lu, Wei ;
Sun, Wei ;
Huang, Jiwu .
PATTERN RECOGNITION, 2012, 45 (12) :4292-4299