A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform

被引:81
作者
Mahmood, Toqeer [1 ]
Mehmood, Zahid [2 ]
Shah, Mohsin [3 ]
Saba, Tanzila [4 ]
机构
[1] Univ Engn & Technol, Dept Comp Sci, Taxila 47050, Pakistan
[2] Univ Engn & Technol, Dept Software Engn, Taxila 47050, Pakistan
[3] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230027, Anhui, Peoples R China
[4] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 11586, Saudi Arabia
关键词
Copy-move forgery; Tampered images; Forgery detection; Authenticity; Passive authentication; REGION-DUPLICATION FORGERY; EFFICIENT;
D O I
10.1016/j.jvcir.2018.03.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this era, due to the widespread availability of digital devices, various open source and commercially available image editing tools have made authenticity of image contents questionable. Copy-move forgery (CMF) is a common technique to produce tampered images by concealing undesirable objects or replicating desirable objects in the same image. Therefore, means are required to authenticate image contents and identify the tampered areas. In this paper, a robust technique for CMF detection and localization in digital images is proposed. The technique extracts stationary wavelet transform (SWT) based features for exposing the forgeries in digital images. SWT is adopted because of its impressive localization properties, in both spectral and spatial domains. More specifically approximation subband of the stationary wavelet transform is utilized as this subband holds most of the information that is best suited for forgery detection. The dimension of the feature vectors is reduced by applying discrete cosine transform (DCT). To evaluate the proposed technique, we use two standard datasets namely, the CoMoFoD and the UCID for experimentations. The experimental results reveal that the proposed technique outperforms the existing techniques in terms of true and false detection rate. Consequently, the proposed forgery detection technique can be applied to detect the tampered areas and the benefits can be obtained in image forensic applications.
引用
收藏
页码:202 / 214
页数:13
相关论文
共 51 条
[21]   A New Symmetric Key Encryption Algorithm using Images as Secret Keys [J].
Islam, Mazhar ;
Shah, Mohsin ;
Khan, Zakir ;
Mahmood, Toqeer ;
Khan, Muhammad Jamil .
2015 13TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT), 2015, :1-5
[22]  
Kessler G.C., 2014, An Overview of Steganography for
[23]  
Khan S, 2016, 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), P270, DOI 10.1109/INTECH.2016.7845022
[24]  
Khan Z, 2016, INT ARAB J INF TECHN, V13, P380
[25]   Detection of copy-move image forgery using histogram of orientated gradients [J].
Lee, Jen-Chun ;
Chang, Chien-Ping ;
Chen, Wei-Kuei .
INFORMATION SCIENCES, 2015, 321 :250-262
[26]   Copy-move image forgery detection based on Gabor magnitude [J].
Lee, Jen-Chun .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 31 :320-334
[27]  
Li GH, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, P1750
[29]   A passive image authentication scheme for detecting region-duplication forgery with rotation [J].
Liu, Guangjie ;
Wang, Junwen ;
Lian, Shiguo ;
Wang, Zhiquan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) :1557-1565
[30]  
Mahmood T., 2016, Int. J. Comput. Sci. Inf. Secur, V14, P156