Image Splicing Forgery Detection Scheme Using New Local Binary Pattern Varient
In this research develop passive image splicing detection method based on a new descriptor called Adaptive Threshold Mean Ternary Pattern (ATMTP). It was developed based on strength and weaknesses of both Local Binary Pattern (LBP) and Local Ternary Pattern (LTP). ATMTP extraction feature is normally achieved by using proposed mean based thresholding and adaptive ternary thresholding, the former is robust to noise while the latter is robust to noise and other photometric attacks. It is designed to withstand against photometric manipulations, be it single or double attacks. In this research the ATMTP color features extracted from R, G, and B channels have revealed that the present method achieved higher accuracy on standard datasets CASIA V2.0 out of 99.03%, Sensitivity 99.6%, and specificity 98.1%. Finally, in terms of accuracy, the proposed SFD scheme outperformed the best recent works in this area.
2. Aizenberg, I., Butakoff, C., Karnaukhov, V., Merzlyakov, N., & Milukova, O. (2003). Type of Blur and Blur Parameters Identification Using Neural Network and its Application to Image Restoration, 1–7.
3. Alahmadi, A., Hussain, M., Aboalsamh, H., Muhammad, G., Bebis, G., & Mathkour, H. (2017). Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing, 11(1), 81–88.
4. Bahrami, K., & Kot, A. C. (2015). Image Splicing Localization Based on Blur Type Inconsistency, 1042–1045.
5. Choi, H., Jang, H., Kim, D., Son, J., Mun, S., Choi, S., & Lee, H. (2017). Detecting Composite Image Manipulation based on Deep Neural Networks, 0–4.
6. Guo, Z., Zhang, L., & Zhang, D. (2010). A completed modeling of local binary pattern operator for texture classification. IEEE Transactions on Image Processing, 19(6), 1657–1663.
7. Heikkilä, M., Pietikäinen, M., & Schmid, C. (2006). Description of interest regions with center-symmetric local binary patterns. In Computer vision, graphics and image processing (pp. 58–69). Springer.
8. Li, C., Ma, Q., Xiao, L., Li, M., & Zhang, A. (2017). Image splicing detection based on Markov features in QDCT domain. Neurocomputing, 228, 29–36.
9. Li, H., Luo, W., Qiu, X., & Huang, J. (2017). Image forgery localization via integrating tampering possibility maps. IEEE Transactions on Information Forensics and Security, 12(5), 1240–1252.
10. Marra, F., Gragnaniello, D., Cozzolino, D., & Verdoliva, L. (2018). Detection of GAN-generated fake images over social networks. In 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR) (pp. 384–389).
11. Muhammad, G., Al-Hammadi, M. H., Hussain, M., & Bebis, G. (2014). Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications, 25(4), 985–995.
12. Redi, J. A., Taktak, W., & Dugelay, J. L. (2011). Digital image forensics: A booklet for beginners. Multimedia Tools and Applications, 51(1), 133–162. https://doi.org/10.1007/s11042-010-0620-1
13. Tan, X., & Triggs, W. (2010). Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Transactions on Image Processing, 19(6), 1635–1650.
14. Zandi, M., Mahmoudi-Aznaveh, A., & Mansouri, A. (2014). Adaptive matching for copy-move Forgery detection. In Information Forensics and Security (WIFS), 2014 IEEE International Workshop on (pp. 119–124).
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
AJNU is committed to protecting the privacy of the users of this journal website. The names, personal particulars and e-mail addresses entered in this website will be used only for the stated purposes of this journal and will not be made available to third parties without the user's permission or due process. Users consent to receive communication from the AJNU for the stated purposes of the journal. Queries with regard to privacy may be directed to firstname.lastname@example.org.