Detection of Duplicated Image Regions using Cellular Automata

被引:0
作者
Tralic, Dijana [1 ]
Rosin, Paul L. [2 ]
Sun, Xianfang [2 ]
Grgic, Sonja [1 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Unska 3, Zagreb 10000, Croatia
[2] Cardiff Univ, Sch Comp Sci & Informat, Cardiff CF24 3AA, S Glam, Wales
来源
21ST INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2014) | 2014年
关键词
Image Forensics; Copy-Move Forgery; Cellular Automata; Post-processing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A common image forgery method is copy-move forgery (CMF), where part of an image is copied and moved to a new location. Identification of CMF can be conducted by detection of duplicated regions in the image. This paper presents a new approach for CMF detection where cellular automata (CA) are used. The main idea is to divide an image into overlapping blocks and use CA to learn a set of rules. Those rules appropriately describe the intensity changes in every block and are used as features for detection of duplicated areas in the image. Use of CA for image processing implies use of pixels' intensities as cell states, leading to a combinatorial explosion in the number of possible rules and subsets of those rules. Therefore, we propose a reduced description based on a proper binary representation using local binary patterns (LBPs). For detection of plain CMF, where no transformation of the copied area is applied, sufficient detection is accomplished by ID CA. The main issue of the proposed method is its sensitivity to post-processing methods, such as the addition of noise or blurring. Coping with that is possible by pre-processing of the image using an averaging filter.
引用
收藏
页码:167 / 170
页数:4
相关论文
共 12 条
[1]  
[Anonymous], 2010, IEEE T IMAGE PROCESS
[2]  
[Anonymous], WSEAS T SIGNAL PROCE
[3]   Image Forgery Detection A survey [J].
Farid, Hany .
IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) :16-25
[4]  
Fridrich A.J., 2003, P DIGITAL FORENSIC R
[5]  
Luo W., 2006, ICPR, V4, P746
[6]   Multiresolution gray-scale and rotation invariant texture classification with local binary patterns [J].
Ojala, T ;
Pietikäinen, M ;
Mäenpää, T .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (07) :971-987
[7]  
Popescu A.C., 2004, Exposing digital forgeries by detecting duplicated image regions
[8]   Training cellular automata for image processing [J].
Rosin, Paul L. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (07) :2076-2087
[9]   Detection of Copy-Rotate-Move Forgery Using Zernike Moments [J].
Ryu, Seung-Jin ;
Lee, Min-Jeong ;
Lee, Heung-Kyu .
INFORMATION HIDING, 2010, 6387 :51-65
[10]  
Shivakumar B. L., 2010, GLOBAL J COMPUT SCI, V10, P61