Edge-texture feature-based image forgery detection with cross-dataset evaluation

被引:17
作者
Asghar, Khurshid [1 ,4 ]
Sun, Xianfang [4 ]
Rosin, Paul L. [4 ]
Saddique, Mubbashar [2 ]
Hussain, Muhammad [3 ]
Habib, Zulfiqar [2 ]
机构
[1] Univ Okara, Dept Comp Sci, Okara, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Lahore Campus, Lahore, Pakistan
[3] King Saud Univ, Dept Comp Sci, Riyadh, Saudi Arabia
[4] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, S Glam, Wales
基金
欧盟地平线“2020”;
关键词
Image forensics; Image forgery detection; Copy-move; Splicing; Cross-dataset evaluation; PASSIVE DETECTION;
D O I
10.1007/s00138-019-01048-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A digital image is a rich medium of information. The development of user-friendly image editing tools has given rise to the need for image forensics. The existing methods for the investigation of the authenticity of an image perform well on a limited set of images or certain datasets but do not generalize well across different datasets. The challenge of image forensics is to detect the traces of tampering which distorts the texture patterns. A method for image forensics is proposed, which employs discriminative robust local binary patterns for encoding tampering traces and a support vector machine for decision making. In addition, to validate the generalization of the proposed method, a new dataset is developed that consists of historic images, which have been tampered with by professionals. Extensive experiments were conducted using the developed dataset as well as the public domain benchmark datasets; the results demonstrate the robustness and effectiveness of the proposed method for tamper detection and validate its cross-dataset generalization. Based on the experimental results, directions are suggested that can improve dataset collection as well as algorithm evaluation protocols. More broadly, discussion in the community is stimulated regarding the very important, but largely neglected, issue of the capability of image forgery detection algorithms to generalize to new test data.
引用
收藏
页码:1243 / 1262
页数:20
相关论文
共 61 条
[1]   Passive detection of copy-move forgery in digital images: State-of-the-art [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
FORENSIC SCIENCE INTERNATIONAL, 2013, 231 (1-3) :284-295
[2]   Passive detection of image forgery using DCT and local binary pattern [J].
Alahmadi, Amani ;
Hussain, Muhammad ;
Aboalsamh, Hatim ;
Muhammad, Ghulam ;
Bebis, George ;
Mathkour, Hassan .
SIGNAL IMAGE AND VIDEO PROCESSING, 2017, 11 (01) :81-88
[3]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[4]  
[Anonymous], 2003, STAT PATTERN RECOGNI
[5]  
[Anonymous], TECHNICAL REPORT AIM
[6]  
[Anonymous], 2016 IEEE International Workshop on Information Forensics and Security (WIFS), DOI DOI 10.1109/WIFS.2016.7823911
[7]  
[Anonymous], PHOTO TAMPERING THRO
[8]  
[Anonymous], IET IMAGE PROCESS
[9]  
[Anonymous], 2016, ARXIV160103239
[10]  
[Anonymous], 1990, Introduction to Statistical Pattern Recognition, DOI DOI 10.5555/92131