Skip to main content
Top

2013 | OriginalPaper | Chapter

A LBP-Based Method for Detecting Copy-Move Forgery with Rotation

Authors : Ning Zheng, Yixing Wang, Ming Xu

Published in: Multimedia and Ubiquitous Engineering

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Copy-move is the most common tampering manipulations, which copies one part of the image and pastes into another part in the same image. Most existing techniques for detecting tampering are sensitive to rotation and reflection. This paper proposed an approach to detect Copy-Move forgery with rotation. Firstly the suspicious image is divided into overlapping blocks, and then LBP operator are used to produce a descriptor invariant to the rotation for similar blocks matching. It is effective to solve the mismatch problem caused by the geometric changes in duplicated regions. In order to make the algorithm more effective, some parameters are proposed to remove the wrong matching blocks. Experiment results show that the proposed method is not only robust to rotation, but also to blurring or noise adding.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fridrich J, Soukal D, Lukas J (2003) Detection of copy–move forgery in digital images. In: Proceedings of digital forensic research workshop, IEEE Computer Society, Cleveland, OH, USA, August, pp 55–61 Fridrich J, Soukal D, Lukas J (2003) Detection of copy–move forgery in digital images. In: Proceedings of digital forensic research workshop, IEEE Computer Society, Cleveland, OH, USA, August, pp 55–61
2.
go back to reference Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions, Technical Report TR2004-515, Department of Computer Science, Dartmouth College Popescu A, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions, Technical Report TR2004-515, Department of Computer Science, Dartmouth College
3.
go back to reference Myna AN, Venkateshmurthy MG, Patil CG (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In: Proceedings of the international conference on computational intelligence and multimedia applications, Washington, DC, USA, pp 371–377 Myna AN, Venkateshmurthy MG, Patil CG (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In: Proceedings of the international conference on computational intelligence and multimedia applications, Washington, DC, USA, pp 371–377
4.
go back to reference Huang H, Guo W, Zhang Y (2008) Detection of copy–move forgery in digital images using sift algorithm. In: Proceedings of the 2008 IEEE Pacific-Asia workshop on computational intelligence and industrial application, IEEE Computer Society, Washington, DC, USA, pp 272–276 Huang H, Guo W, Zhang Y (2008) Detection of copy–move forgery in digital images using sift algorithm. In: Proceedings of the 2008 IEEE Pacific-Asia workshop on computational intelligence and industrial application, IEEE Computer Society, Washington, DC, USA, pp 272–276
5.
go back to reference Schaefer G, Stich M (2004) UCID-An uncompressed colour image database. In: Proceedings of the SPIE, storage and retrieval methods and applications for multimedia, pp 472–480 Schaefer G, Stich M (2004) UCID-An uncompressed colour image database. In: Proceedings of the SPIE, storage and retrieval methods and applications for multimedia, pp 472–480
8.
go back to reference Wang JW, Liu GJ (2009) Detection of image region duplication forgery using model with circle block. In: International conference on multimedia information networking and security Wang JW, Liu GJ (2009) Detection of image region duplication forgery using model with circle block. In: International conference on multimedia information networking and security
Metadata
Title
A LBP-Based Method for Detecting Copy-Move Forgery with Rotation
Authors
Ning Zheng
Yixing Wang
Ming Xu
Copyright Year
2013
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6738-6_33