Robust Image Forgery Detection Using Point Feature Analysis

被引:2
作者
William, Youssef [1 ]
Safwat, Sherine [1 ]
Salem, Mohammed Abdel-Megeed [1 ,2 ]
机构
[1] German Univ Cairo, Cairo, Egypt
[2] Ain Shams Univ, Cairo, Egypt
来源
PROCEEDINGS OF THE 2019 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS) | 2019年
关键词
Image Forgery; Copy-Move Forgery Detection; Image Splicing; SIFT; SURF; Support Vector Machine (SVM); benchmark dataset; CASIA datasets; Gray Level Co-occurrence Matrix (GLCM);
D O I
10.15439/2019F227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Day for day it becomes easier to temper digital images. Thus, people are in need of various forgery image detection. In this paper, we present forgery image detection techniques for two of the most common image tampering techniques; copy-move and splicing. We use match points technique after feature extraction process using SIFT and SURF. For splicing detection, we extracted the edges of the integral images of Y, C-b, and C-r, image components. GLCM is applied for each edge integral image and the feature vector is formed. The feature vector is then fed to a SVM classifier. For the copy-move, the results show that SURF feature extraction can be more efficient than SIFT, where we achieved 80% accuracy of detecting tempered images. On the other hand, processing the image in YCbCr color model is found to give promising results in splicing image detection. We have achieved 99% true positive rate for detecting splicing images.
引用
收藏
页码:373 / 380
页数:8
相关论文
共 27 条
[1]  
Adams Tim, 2018, FEDCSIS COMMUNICATIO, DOI [10.15439/2018F176, DOI 10.15439/2018F176]
[2]   Fusing directional wavelet local binary pattern and moments for human action recognition [J].
Al-Berry, Maryam Nabil ;
Salem, Mohammed A. -M. ;
Ebeid, Hala Mousher ;
Hussein, Ashraf S. ;
Tolba, Mohammed F. .
IET COMPUTER VISION, 2016, 10 (02) :153-162
[3]  
Alahmadi AA, 2013, IEEE GLOB CONF SIG, P253, DOI 10.1109/GlobalSIP.2013.6736863
[4]  
Alberry Hesham A., 2018, Future Computing and Informatics Journal, V3, P159, DOI 10.1016/j.fcij.2018.03.001
[5]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[6]  
[Anonymous], 2011, International Journal of Computer Science Issues (IJCSI)
[7]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[8]  
Bayram Sevinc, 2008, SURVEY COPY MOVE FOR, P538, DOI [10.1109/ICISC.2017.8068703, DOI 10.1109/ICISC.2017.8068703]
[9]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854
[10]  
Fridrich A Jessica, 2003, P DIG FOR RES WORKSH, DOI [10.1016/j. forsciint.2013.05.027., DOI 10.1016/J.FORSCIINT.2013.05.027]