Skip to main content
Top
Published in: Machine Vision and Applications 4/2014

01-05-2014 | Original Paper

Image forgery detection using steerable pyramid transform and local binary pattern

Authors: Ghulam Muhammad, Munner H. Al-Hammadi, Muhammad Hussain, George Bebis

Published in: Machine Vision and Applications | Issue 4/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a novel image forgery detection method is proposed based on the steerable pyramid transform (SPT) and local binary pattern (LBP). First, given a color image, we transform it in the YCbCr color space and apply the SPT transform on chrominance channels Cb and Cr, yielding a number of multi-scale and multi-oriented subbands. Then, we describe the texture in each SPT subband using LBP histograms. The histograms from each subband are concatenated to produce a feature vector. Finally, a support vector machine uses the feature vector to classify images into forged or authentic. The proposed method has been evaluated on three publicly available image databases. Our experimental results demonstrate the effectiveness of the proposed method and its superiority over some recent other methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003) Fridrich, J., Soukal, D., Lukas, J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)
2.
go back to reference Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 206(1–3), 178–184 (2011)CrossRef Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 206(1–3), 178–184 (2011)CrossRef
3.
go back to reference Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME), Beijing China, pp. 1750–1753 (2007) Li, G., Wu, Q., Tu, D., Sun, S.: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME), Beijing China, pp. 1750–1753 (2007)
4.
go back to reference Muhammad, G., Hussain, M., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1), 49–57 (2012) Muhammad, G., Hussain, M., Bebis, G.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1), 49–57 (2012)
5.
go back to reference Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011) Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)
8.
go back to reference Ng, T.T., Chang, S.F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 688–691 (2004) Ng, T.T., Chang, S.F., Sun, Q.: Blind detection of photomontage using higher order statistics. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 688–691 (2004)
9.
go back to reference Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME), pp. 549–552 (2006) Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME), pp. 549–552 (2006)
10.
go back to reference Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of ACM Multimedia and Security (MM &Sec), pp. 51–62 (2007) Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of ACM Multimedia and Security (MM &Sec), pp. 51–62 (2007)
11.
go back to reference He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recog. 45(12), 4292–4299 (2012)CrossRef He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recog. 45(12), 4292–4299 (2012)CrossRef
12.
go back to reference Wang, W., Dong, J., Tan, T.: Image tampering detection based on stationary distribution of Markov chain. In: Proceedings of IEEE International Conference on Image Processing (ICIP), pp. 2101–2104 (2010) Wang, W., Dong, J., Tan, T.: Image tampering detection based on stationary distribution of Markov chain. In: Proceedings of IEEE International Conference on Image Processing (ICIP), pp. 2101–2104 (2010)
14.
go back to reference Unser, M., Chenouard, N., Ville, V.D.: Steerable pyramids and tight wavelet frames in L2 (Rd). IEEE Trans. Image Process. 20(10), 2705–2721 (2011)CrossRefMathSciNet Unser, M., Chenouard, N., Ville, V.D.: Steerable pyramids and tight wavelet frames in L2 (Rd). IEEE Trans. Image Process. 20(10), 2705–2721 (2011)CrossRefMathSciNet
15.
go back to reference Simoncelli, E.P., Freeman, W.T.: The steerable pyramid: a flexible architecture for multi-scale derivative computation. Proc. IEEE Int. Conf. Image Process. (ICIP) III, 444–447 (1995)CrossRef Simoncelli, E.P., Freeman, W.T.: The steerable pyramid: a flexible architecture for multi-scale derivative computation. Proc. IEEE Int. Conf. Image Process. (ICIP) III, 444–447 (1995)CrossRef
16.
go back to reference Ahonen, T., Hadid, A., Pietikainen, M.: Face description with local binary patterns: application to face recognition. IEEE Trans. Pattern Anal. Machine Intell. 28(12) (2006) Ahonen, T., Hadid, A., Pietikainen, M.: Face description with local binary patterns: application to face recognition. IEEE Trans. Pattern Anal. Machine Intell. 28(12) (2006)
17.
go back to reference Weston, J., Elisseeff, A., Scholkopf, B., Tipping, M.: Use of the zero-norm with linear models and kernel methods. J. Machine Learn. Res. 3, 1439–1461 (2003)MATHMathSciNet Weston, J., Elisseeff, A., Scholkopf, B., Tipping, M.: Use of the zero-norm with linear models and kernel methods. J. Machine Learn. Res. 3, 1439–1461 (2003)MATHMathSciNet
18.
go back to reference Sun, Y., Todorovic, S., Goodison, S.: Local learning based feature selection for high dimensional data analysis. IEEE Trans. Pattern Anal. Machine Intell. 32(9), 1610–1626 (2010)CrossRef Sun, Y., Todorovic, S., Goodison, S.: Local learning based feature selection for high dimensional data analysis. IEEE Trans. Pattern Anal. Machine Intell. 32(9), 1610–1626 (2010)CrossRef
20.
go back to reference Zhao, X., Li, J., Li, S., Wang, S.: Detecting digital image splicing in chroma spaces. In: Proceedings of International Workshop on Digital Watermarking, pp. 12–22 (2011) Zhao, X., Li, J., Li, S., Wang, S.: Detecting digital image splicing in chroma spaces. In: Proceedings of International Workshop on Digital Watermarking, pp. 12–22 (2011)
Metadata
Title
Image forgery detection using steerable pyramid transform and local binary pattern
Authors
Ghulam Muhammad
Munner H. Al-Hammadi
Muhammad Hussain
George Bebis
Publication date
01-05-2014
Publisher
Springer Berlin Heidelberg
Published in
Machine Vision and Applications / Issue 4/2014
Print ISSN: 0932-8092
Electronic ISSN: 1432-1769
DOI
https://doi.org/10.1007/s00138-013-0547-4

Other articles of this Issue 4/2014

Machine Vision and Applications 4/2014 Go to the issue

Premium Partner