Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 4/2020

17-02-2020 | Research Article-Computer Engineering and Computer Science

A Passive Approach for Detecting Image Splicing Based on Deep Learning and Wavelet Transform

Authors: Eman I. Abd El-Latif, Ahmed Taha, Hala H. Zayed

Published in: Arabian Journal for Science and Engineering | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Splicing image forgery detection has become a significant research subject in multimedia forensics and security due to its widespread use and its hard detection. Many algorithms have already been executed on the image splicing. The existing algorithms may be affected by some problems, such as high feature dimensionality and low accuracy with high false positive rates. In this paper, an algorithm based on deep learning approach and wavelet transform is proposed to detect the spliced image. In the deep learning approach, convolutional neural network (CNN) is employed to automatically extract features from the spliced image. CNN is applied and then discrete wavelet transform (DWT) is used. Support vector machine is used later for classification. Additional experiments are performed. That is, discrete cosine transform replaces DWT and then principal component analysis is applied. The proposed algorithm is evaluated on a publicly available image splicing datasets (CASIA v1.0 and CASIA v2.0). It achieves high accuracy while using a relatively low-dimensional feature vector. Our results demonstrate that the proposed algorithm is effective and accomplishes better performance for detecting the spliced image.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kumar, C.; Singh, A.K.; Kumar, P.: A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl. 77(3), 3597–3622 (2017)CrossRef Kumar, C.; Singh, A.K.; Kumar, P.: A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl. 77(3), 3597–3622 (2017)CrossRef
2.
go back to reference Qazi, T.; Hayat, K.; Khan, S.U.; Madani, S.A.; Khan, I.A.; Kołodziej, J.; Li, H.; Lin, W.; Yow, K.C.; Xu, C.-Z.: Survey on blind image forgery detection. J. IET Image Process. 7(7), 660–670 (2013)CrossRef Qazi, T.; Hayat, K.; Khan, S.U.; Madani, S.A.; Khan, I.A.; Kołodziej, J.; Li, H.; Lin, W.; Yow, K.C.; Xu, C.-Z.: Survey on blind image forgery detection. J. IET Image Process. 7(7), 660–670 (2013)CrossRef
3.
go back to reference Kapse, A.S.; Belokar, S.; Gorde, Y.; Rane, R.; Yewtkar, S.: Digital image security using digital watermarking. Int. Res. J. Eng. Technol. 5(3), 163–166 (2018) Kapse, A.S.; Belokar, S.; Gorde, Y.; Rane, R.; Yewtkar, S.: Digital image security using digital watermarking. Int. Res. J. Eng. Technol. 5(3), 163–166 (2018)
4.
go back to reference Burvin, P.S.; Esther, J.M.: Analysis of digital image splicing detection. J. Comput. Eng. (IOSR-JCE) 16(2), 10–13 (2014)CrossRef Burvin, P.S.; Esther, J.M.: Analysis of digital image splicing detection. J. Comput. Eng. (IOSR-JCE) 16(2), 10–13 (2014)CrossRef
5.
go back to reference Liua, W.; Wanga, Z.; Liua, X.; Zengb, N.; Liucd, Y.; Alsaadid, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234(19), 11–26 (2017) Liua, W.; Wanga, Z.; Liua, X.; Zengb, N.; Liucd, Y.; Alsaadid, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234(19), 11–26 (2017)
6.
go back to reference Zhang, Y.; Zhao, C.; Pi, Y.; Li, S.; Wang, S.: Image-splicing forgery detection based on local binary patterns of DCT coefficients. Security and communication networks. J. Secur. Commun. Netw. 8(14), 2386–2395 (2015)CrossRef Zhang, Y.; Zhao, C.; Pi, Y.; Li, S.; Wang, S.: Image-splicing forgery detection based on local binary patterns of DCT coefficients. Security and communication networks. J. Secur. Commun. Netw. 8(14), 2386–2395 (2015)CrossRef
7.
go back to reference Muhammad, G.; Al-Hammadi, M.H.; Hussain, M.; Bebis, G.: Image forgery detection using steerable pyramid transform and local binary pattern. J. Mach. Vis. Appl. 25(4), 985–995 (2014)CrossRef Muhammad, G.; Al-Hammadi, M.H.; Hussain, M.; Bebis, G.: Image forgery detection using steerable pyramid transform and local binary pattern. J. Mach. Vis. Appl. 25(4), 985–995 (2014)CrossRef
8.
go back to reference Kaur, M.; Gupta, S.: A passive blind approach for image splicing detection based on DWT and LBP histograms. In: Proceedings of International Symposium on Security in Computing and Communication, pp. 318–327, Chandigarh (Sept. 2016) Kaur, M.; Gupta, S.: A passive blind approach for image splicing detection based on DWT and LBP histograms. In: Proceedings of International Symposium on Security in Computing and Communication, pp. 318–327, Chandigarh (Sept. 2016)
9.
go back to reference Abd El-Latif, E.I.; Taha, A.; Zayed, H.H.: Image splicing detection using uniform local binary pattern and wavelet transform. J. Eng. Appl. Sci. 14(20), 7679–7684 (2019)CrossRef Abd El-Latif, E.I.; Taha, A.; Zayed, H.H.: Image splicing detection using uniform local binary pattern and wavelet transform. J. Eng. Appl. Sci. 14(20), 7679–7684 (2019)CrossRef
10.
go back to reference El-Alfy, E.-S.M.; Qureshi, M.A.: Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Int. J. Pattern Anal. Appl. 18(3), 713–723 (2015)MathSciNetCrossRef El-Alfy, E.-S.M.; Qureshi, M.A.: Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Int. J. Pattern Anal. Appl. 18(3), 713–723 (2015)MathSciNetCrossRef
11.
go back to reference Li, C.; Ma, Q.; Xiao, L.; Li, M.; Zhang, A.: Image splicing detection based on Markov features in QDCT domain. Int. J. Neurocomput. 228(8), 29–36 (2017) Li, C.; Ma, Q.; Xiao, L.; Li, M.; Zhang, A.: Image splicing detection based on Markov features in QDCT domain. Int. J. Neurocomput. 228(8), 29–36 (2017)
12.
go back to reference Han, J.G.; Park, T.H.; Moon, Y.H.; Eoma, I.K.: Efficient Markov feature extraction method for image splicing detection using maximization and threshold. Int. J. Electron. Imaging 25(2), 023031 (2016)CrossRef Han, J.G.; Park, T.H.; Moon, Y.H.; Eoma, I.K.: Efficient Markov feature extraction method for image splicing detection using maximization and threshold. Int. J. Electron. Imaging 25(2), 023031 (2016)CrossRef
13.
go back to reference Zhang, Y.; Goh, J.; Win, L.L.; Thing, V.L.L.: Image region forgery detection: a deep learning approach. In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC), pp. 1–11 (Jan. 2016) Zhang, Y.; Goh, J.; Win, L.L.; Thing, V.L.L.: Image region forgery detection: a deep learning approach. In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC), pp. 1–11 (Jan. 2016)
14.
go back to reference Bayar, B.; Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5–10, Vigo (June 2016) Bayar, B.; Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5–10, Vigo (June 2016)
15.
go back to reference Lee, H.; Ekanadham, C.; Ng, A.Y.: Sparse deep belief net model for visual area V2. In: Proceedings of Neural Information Processing Systems, pp. 873–880, Vancouver (Dec. 2008) Lee, H.; Ekanadham, C.; Ng, A.Y.: Sparse deep belief net model for visual area V2. In: Proceedings of Neural Information Processing Systems, pp. 873–880, Vancouver (Dec. 2008)
16.
go back to reference Larochelle, H.; Bengio, Y.; Louradour, J.; Lamblin, P.: Exploring strategies for training deep neural networks. J. Mach. Learn. Res. 10, 1–40 (2009)MATH Larochelle, H.; Bengio, Y.; Louradour, J.; Lamblin, P.: Exploring strategies for training deep neural networks. J. Mach. Learn. Res. 10, 1–40 (2009)MATH
17.
go back to reference Aker, C.; Kalkan, S.: Using deep networks for drone detection. In: Proceeding of 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1–6, Lecce (Aug. 2017) Aker, C.; Kalkan, S.: Using deep networks for drone detection. In: Proceeding of 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1–6, Lecce (Aug. 2017)
18.
go back to reference Krizhevsky, A.; Sutskever, I.; Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Proceedings of Advances in Neural Information, pp. 1097–1105, USA (Dec. 2012) Krizhevsky, A.; Sutskever, I.; Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Proceedings of Advances in Neural Information, pp. 1097–1105, USA (Dec. 2012)
19.
go back to reference Kingsbury, N.; Magarey, J.: Wavelet transforms in image processing. In: Proceedings of Signal Analysis and Prediction, pp. 27–46. Birkhäuser, Boston (Mar. 1998) Kingsbury, N.; Magarey, J.: Wavelet transforms in image processing. In: Proceedings of Signal Analysis and Prediction, pp. 27–46. Birkhäuser, Boston (Mar. 1998)
20.
go back to reference Bhatia, N.: Survey of nearest neighbor techniques. J. Int. J. Comput. Sci. Inf. Secur. 8(2), 302–305 (2010)MathSciNet Bhatia, N.: Survey of nearest neighbor techniques. J. Int. J. Comput. Sci. Inf. Secur. 8(2), 302–305 (2010)MathSciNet
21.
go back to reference Lakshmi, K.V.; Kumari, N.S.: Survey on naive Bayes algorithm. In: Proceedings of International Conference on Research in Science, Technology and Management, Hyderabad (Mar. 2018) Lakshmi, K.V.; Kumari, N.S.: Survey on naive Bayes algorithm. In: Proceedings of International Conference on Research in Science, Technology and Management, Hyderabad (Mar. 2018)
22.
go back to reference Ben-Hur, A.; Weston, J.: A user’s guide to support vector machines. J. Data Min. Tech. Life Sci. 609, 223–239 (2010)CrossRef Ben-Hur, A.; Weston, J.: A user’s guide to support vector machines. J. Data Min. Tech. Life Sci. 609, 223–239 (2010)CrossRef
23.
go back to reference Zhan, L.; Zhu, Y.; Mo, Z.: An image splicing detection method based on PCA minimum eigenvalues. J. Inf. Hiding Multimed. Signal Process. 7(3), 12 (2016) Zhan, L.; Zhu, Y.; Mo, Z.: An image splicing detection method based on PCA minimum eigenvalues. J. Inf. Hiding Multimed. Signal Process. 7(3), 12 (2016)
26.
go back to reference Saleh, S.Q.; Hussain, M.; Muhammad, G.; Bebis, G.: Evaluation of image forgery detection using multi-scale weber local descriptors. J. Int. Symp. Vis. Comput. 24(4), 416–424 (2015) Saleh, S.Q.; Hussain, M.; Muhammad, G.; Bebis, G.: Evaluation of image forgery detection using multi-scale weber local descriptors. J. Int. Symp. Vis. Comput. 24(4), 416–424 (2015)
27.
go back to reference Mushtaq, S.; Mir, A.H.: Novel method for image splicing detection. In: Proceedings of Advances in Computing, Communications and Informatics (ICACCI), pp. 24–27, New Delhi (Sept. 2014) Mushtaq, S.; Mir, A.H.: Novel method for image splicing detection. In: Proceedings of Advances in Computing, Communications and Informatics (ICACCI), pp. 24–27, New Delhi (Sept. 2014)
28.
go back to reference Shah, A.; El-Alfy, E.-S.M.: Image splicing forgery detection using DCT coefficients with multi-scale LBP. In: Proceeding of International Conference on Computing Sciences and Engineering (ICCSE), pp. 1–6. IEEE, Kuwait City (June 2018) Shah, A.; El-Alfy, E.-S.M.: Image splicing forgery detection using DCT coefficients with multi-scale LBP. In: Proceeding of International Conference on Computing Sciences and Engineering (ICCSE), pp. 1–6. IEEE, Kuwait City (June 2018)
29.
go back to reference Kanwal, N.; Girdhar, A.; Kaur, L.; Bhullar, J.S.: Detection of digital image forgery using fast Fourier transform and local features. In: Proceeding of International Conference on Automation, Computational and Technology Management (ICACTM), pp. 262–267. IEEE, London (July 2019) Kanwal, N.; Girdhar, A.; Kaur, L.; Bhullar, J.S.: Detection of digital image forgery using fast Fourier transform and local features. In: Proceeding of International Conference on Automation, Computational and Technology Management (ICACTM), pp. 262–267. IEEE, London (July 2019)
30.
go back to reference He, Z.; Lu, W.; Sun, W.; Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. J. Pattern Recognit. 45(12), 4292–4299 (2012)CrossRef He, Z.; Lu, W.; Sun, W.; Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. J. Pattern Recognit. 45(12), 4292–4299 (2012)CrossRef
31.
go back to reference Armas Vega, E.A.; Sandoval Orozco, A.L.; García Villalba, L.J.; Hernandez Castro, J.: Digital images authentication technique based on DWT, DCT and local binary patterns. Sensors 18(10), 3372 (2018)CrossRef Armas Vega, E.A.; Sandoval Orozco, A.L.; García Villalba, L.J.; Hernandez Castro, J.: Digital images authentication technique based on DWT, DCT and local binary patterns. Sensors 18(10), 3372 (2018)CrossRef
32.
go back to reference Kirchner, M.; Fridrich, J.: On detection of median filtering in digital images. In: Proceedings of SPIE, Media Forensics Secure. II, vol. 7541, pp. 754110-1–754110-12 (Jan. 2010) Kirchner, M.; Fridrich, J.: On detection of median filtering in digital images. In: Proceedings of SPIE, Media Forensics Secure. II, vol. 7541, pp. 754110-1–754110-12 (Jan. 2010)
33.
go back to reference Zhao, X.; Wang, S.; Li, S.; Li, J.: Passive image-splicing detection by a 2-D noncausal markov mode. J. IEEE Trans. Circuits Syst. Video Technol. 25(2), 185–199 (2015)CrossRef Zhao, X.; Wang, S.; Li, S.; Li, J.: Passive image-splicing detection by a 2-D noncausal markov mode. J. IEEE Trans. Circuits Syst. Video Technol. 25(2), 185–199 (2015)CrossRef
Metadata
Title
A Passive Approach for Detecting Image Splicing Based on Deep Learning and Wavelet Transform
Authors
Eman I. Abd El-Latif
Ahmed Taha
Hala H. Zayed
Publication date
17-02-2020
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 4/2020
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-04401-0

Other articles of this Issue 4/2020

Arabian Journal for Science and Engineering 4/2020 Go to the issue

Research Article - Computer Engineering and Computer Science

TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes

Premium Partners