An efficient forensic technique for exposing region duplication forgery in digital images

被引:27
作者
Mahmood, Toqeer [1 ]
Mehmood, Zahid [2 ]
Shah, Mohsin [3 ,4 ]
Khan, Zakir [3 ]
机构
[1] Univ Engn & Technol, Dept Comp Engn, Taxila, Pakistan
[2] Univ Engn & Technol, Dept Software Engn, Taxila, Pakistan
[3] Hazara Univ, Dept Informat Technol, Mansehra, Pakistan
[4] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei, Anhui, Peoples R China
关键词
Digital forensics; Region duplication; Copy-move; Image tampering; Passive authentication; COPY-MOVE FORGERY; DCT;
D O I
10.1007/s10489-017-1038-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The internet users share a massive amount of digital images daily. The accessibility of powerful image manipulation tools has made the integrity of image contents questionable. The most popular image tampering is to duplicate a region elsewhere in the same image to replicate or conceal some other region. The duplicated regions have identical color and texture attributes that make this artifact invisible to the human eye. Therefore, efficient techniques are required to verify the credibility of image contents by detecting the regions duplicated in the digital images. This paper proposes an efficient technique for exposing region duplication forgery in digital images. The proposed technique divides the approximation (LL) sub-band of shift invariant stationary wavelet transform into overlapping blocks of w x w (i.e. w = 4, 8) sizes. The distinctive features extracted from the overlapping blocks are utilized to expose the region duplication forgeries in digital images. The experimental results of the proposed technique are compared with state-of-the-art techniques that reveal the prominence, and effectiveness of the proposed technique in terms of precision, recall and F (1) score for different block sizes. Therefore, the proposed technique can reliably be applied to identify the counterfeited regions and the benefits of the proposed technique can be achieved in different fields for example crime investigation, news reporting, and judiciary.
引用
收藏
页码:1791 / 1801
页数:11
相关论文
共 26 条
[1]   Passive detection of image forgery using DCT and local binary pattern [J].
Alahmadi, Amani ;
Hussain, Muhammad ;
Aboalsamh, Hatim ;
Muhammad, Ghulam ;
Bebis, George ;
Mathkour, Hassan .
SIGNAL IMAGE AND VIDEO PROCESSING, 2017, 11 (01) :81-88
[2]   Detection of copy-move image forgery based on discrete cosine transform [J].
Alkawaz, Mohammed Hazim ;
Sulong, Ghazali ;
Saba, Tanzila ;
Rehman, Amjad .
NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01) :183-192
[3]   Counter-forensics of SIFT-based copy-move detection by means of keypoint classification [J].
Amerini, Irene ;
Barni, Mauro ;
Caldelli, Roberto ;
Costanzo, Andrea .
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2013,
[4]   Copy-move and splicing image forgery detection and localization techniques: a review [J].
Asghar, Khurshid ;
Habib, Zulfiqar ;
Hussain, Muhammad .
AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2017, 49 (03) :281-307
[5]  
Bausys R, 2008, ELEKTRON ELEKTROTECH, P65
[6]  
Christlein V., 2010, Sicherheit, V2010, P105
[7]  
Fridrich AJ, 2003, CITESEER
[8]   Forgery detection in digital images via discrete wavelet and discrete cosine transforms [J].
Hayat, Khizar ;
Qazi, Tanzeela .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 62 :448-458
[9]   Improved DCT-based detection of copy-move forgery in images [J].
Huang, Yanping ;
Lu, Wei ;
Sun, Wei ;
Long, Dongyang .
FORENSIC SCIENCE INTERNATIONAL, 2011, 206 (1-3) :178-184
[10]   Copy-move image forgery detection based on Gabor magnitude [J].
Lee, Jen-Chun .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 31 :320-334