A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform

被引:81
作者
Mahmood, Toqeer [1 ]
Mehmood, Zahid [2 ]
Shah, Mohsin [3 ]
Saba, Tanzila [4 ]
机构
[1] Univ Engn & Technol, Dept Comp Sci, Taxila 47050, Pakistan
[2] Univ Engn & Technol, Dept Software Engn, Taxila 47050, Pakistan
[3] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230027, Anhui, Peoples R China
[4] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 11586, Saudi Arabia
关键词
Copy-move forgery; Tampered images; Forgery detection; Authenticity; Passive authentication; REGION-DUPLICATION FORGERY; EFFICIENT;
D O I
10.1016/j.jvcir.2018.03.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this era, due to the widespread availability of digital devices, various open source and commercially available image editing tools have made authenticity of image contents questionable. Copy-move forgery (CMF) is a common technique to produce tampered images by concealing undesirable objects or replicating desirable objects in the same image. Therefore, means are required to authenticate image contents and identify the tampered areas. In this paper, a robust technique for CMF detection and localization in digital images is proposed. The technique extracts stationary wavelet transform (SWT) based features for exposing the forgeries in digital images. SWT is adopted because of its impressive localization properties, in both spectral and spatial domains. More specifically approximation subband of the stationary wavelet transform is utilized as this subband holds most of the information that is best suited for forgery detection. The dimension of the feature vectors is reduced by applying discrete cosine transform (DCT). To evaluate the proposed technique, we use two standard datasets namely, the CoMoFoD and the UCID for experimentations. The experimental results reveal that the proposed technique outperforms the existing techniques in terms of true and false detection rate. Consequently, the proposed forgery detection technique can be applied to detect the tampered areas and the benefits can be obtained in image forensic applications.
引用
收藏
页码:202 / 214
页数:13
相关论文
共 51 条
[1]   Comparison of Matching Methods for Copy-Move Image Forgery Detection [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
9TH INTERNATIONAL CONFERENCE ON ROBOTIC, VISION, SIGNAL PROCESSING AND POWER APPLICATIONS: EMPOWERING RESEARCH AND INNOVATION, 2017, 398 :209-218
[2]   Detection of copy-move image forgery based on discrete cosine transform [J].
Alkawaz, Mohammed Hazim ;
Sulong, Ghazali ;
Saba, Tanzila ;
Rehman, Amjad .
NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01) :183-192
[3]   High capacity steganographic method based upon JPEG [J].
Almohammad, Adel ;
Hierons, Robert M. ;
Ghinea, Gheorghita .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :544-+
[4]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[5]  
[Anonymous], 1995, Translation-invariant De-noising
[6]  
[Anonymous], 2017, P IEEE C COMP VIS PA
[7]  
[Anonymous], INT C CHEM ENG ADV C
[8]  
[Anonymous], 2016 IEEE International Workshop on Information Forensics and Security (WIFS), DOI [DOI 10.1109/WIFS.2016.7823911, 10.1109/WIFS.2016.7823911]
[9]  
[Anonymous], WORKSH INF HID DIG W
[10]  
[Anonymous], 2004, ELECT IMAGING