A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform

被引:81
作者
Mahmood, Toqeer [1 ]
Mehmood, Zahid [2 ]
Shah, Mohsin [3 ]
Saba, Tanzila [4 ]
机构
[1] Univ Engn & Technol, Dept Comp Sci, Taxila 47050, Pakistan
[2] Univ Engn & Technol, Dept Software Engn, Taxila 47050, Pakistan
[3] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230027, Anhui, Peoples R China
[4] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 11586, Saudi Arabia
关键词
Copy-move forgery; Tampered images; Forgery detection; Authenticity; Passive authentication; REGION-DUPLICATION FORGERY; EFFICIENT;
D O I
10.1016/j.jvcir.2018.03.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this era, due to the widespread availability of digital devices, various open source and commercially available image editing tools have made authenticity of image contents questionable. Copy-move forgery (CMF) is a common technique to produce tampered images by concealing undesirable objects or replicating desirable objects in the same image. Therefore, means are required to authenticate image contents and identify the tampered areas. In this paper, a robust technique for CMF detection and localization in digital images is proposed. The technique extracts stationary wavelet transform (SWT) based features for exposing the forgeries in digital images. SWT is adopted because of its impressive localization properties, in both spectral and spatial domains. More specifically approximation subband of the stationary wavelet transform is utilized as this subband holds most of the information that is best suited for forgery detection. The dimension of the feature vectors is reduced by applying discrete cosine transform (DCT). To evaluate the proposed technique, we use two standard datasets namely, the CoMoFoD and the UCID for experimentations. The experimental results reveal that the proposed technique outperforms the existing techniques in terms of true and false detection rate. Consequently, the proposed forgery detection technique can be applied to detect the tampered areas and the benefits can be obtained in image forensic applications.
引用
收藏
页码:202 / 214
页数:13
相关论文
共 51 条
[31]  
Mahmood T, 2015, 2015 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET)
[32]   An efficient forensic technique for exposing region duplication forgery in digital images [J].
Mahmood, Toqeer ;
Mehmood, Zahid ;
Shah, Mohsin ;
Khan, Zakir .
APPLIED INTELLIGENCE, 2018, 48 (07) :1791-1801
[33]   Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images [J].
Mahmood, Toqeer ;
Irtaza, Aun ;
Mehmood, Zahid ;
Mahmood, Muhammad Tariq .
FORENSIC SCIENCE INTERNATIONAL, 2017, 279 :8-21
[34]  
Mahmood T, 2016, 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), P578, DOI 10.1109/INTECH.2016.7845040
[35]   Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images [J].
Mahmood, Toqeer ;
Nawaz, Tabassam ;
Irtaza, Aun ;
Ashraf, Rehan ;
Shah, Mohsin ;
Mahmood, Muhammad Tariq .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
[36]  
Mahmoud K, 2016, INT ARAB J INF TECHN, V13, P930
[37]   Image forgery detection using steerable pyramid transform and local binary pattern [J].
Muhammad, Ghulam ;
Al-Hammadi, Munner H. ;
Hussain, Muhammad ;
Bebis, George .
MACHINE VISION AND APPLICATIONS, 2014, 25 (04) :985-995
[38]   Passive copy move image forgery detection using undecimated dyadic wavelet transform [J].
Muhammad, Ghulam ;
Hussain, Muhammad ;
Bebis, George .
DIGITAL INVESTIGATION, 2012, 9 (01) :49-57
[39]  
Popescu A.C., 2004, Exposing digital forgeries by detecting duplicated image regions
[40]   A bibliography of pixel-based blind image forgery detection techniques [J].
Qureshi, Muhammad Ali ;
Deriche, Mohamed .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2015, 39 :46-74