Rotation Invariant Forgery Detection using LBP Variants

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2019 by IJETT Journal
Volume-67 Issue-3
Year of Publication : 2019
Authors : Ms. Gurpreet Kaur, Dr. Rajan Manro
  10.14445/22315381/IJETT-V67I3P229

MLA 

MLA Style: Ms. Gurpreet Kaur, Dr. Rajan Manro "Rotation Invariant Forgery Detection using LBP Variants" International Journal of Engineering Trends and Technology 67.3 (2019): 152-157.

APA Style: Ms. Gurpreet Kaur, Dr. Rajan Manro (2019). Rotation Invariant Forgery Detection using LBP Variants. International Journal of Engineering Trends and Technology, 67(3), 152-157.

Abstract
Digital Forensics is anoutlet of forensic science which is connected to cyber-crime. Mostly it includes the detection, recovery and investigation of digital devices. As we now in today’s world, Digital images and videos play most important role in digital forensics because they are the majorindicator of any crime scene. So the reliability of the image is important. These images can be easily manipulated and edited with the help of image processing tools. Under this, Copy-move Forgery is the most basic form of cyber-attack on digital images. In Copy-move forgery, particular amount of image (region) itself is copied and pasted into another fragmentof the same image. The idea behind this type of attack is to “add” or “delete” some objects from the image to break the faithfulness of the image and befool the viewer. This type of attack is more dominant in images having same texture or patterns, for e.g. sand, grass, water etc. In some cases when the copied region is processed before pasted i.e. some geometric transformations like rotation, scaling is applied on the pasted region. In such cases, It is not possible for human eyes to detect such kind of forgeries. When forgery is done in this way then techniques like block matching, key points are also unable to detect forgery. Soin thispaper, we explore some rotation invariant methods which are able to detect these kind of forgeries which include geometric transformations

Reference
[1] Math, S. &Tripathi, R. C. (2011). Image quality feature based detection algorithm for forgery in images. International Journal of Computer Graphics and Animation (IJCGA), 1, 13-21
[2] Singh, V. K. &Tripathi, R. C. (2011). Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method. International Journal of Advanced Science & Technology, 35, 93-102.
[3] Z. Junliu ; G Yanfen (2016),. Detection of copy–move forgery using discrete analytical Fourier–Mellintransform.Nonlinear Dynamics April 2016, Volume 84, Issue 1, pp 189–202
[4] Ryu, S. J., Lee, M. J. & Lee, H. K. (2010). Detection of CopyRotate-Move Forgery Using Zemike Moments. Springer, Information Hiding Lecture Notes in Computer Science, 6387, 51- 65.
[5] XiuliBi, Chi-Man Pun, Xiao-Chen Yuan (2016). Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection. published in Information Sciences 345(2016) 226–242
[6] Dr. S.D. Chede, Prof. P.R.Lakhe(2015). Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method. International Journal of Advanced Research in Computer and Commu(2013). Copy-Move Forgery Detection using DCT and SIFT. International Journal of Computer Applications (0975 – 8887) Volume 70– No.7, May 2013
[7] Huan Wang, Hong-Xia Wang, Xing-Ming Sun, Qing Qian (2017). Passive authentication scheme for copy-move forgery based on package clustering algorithm. published in Multimedia Tools and Applications May 2017, Volume 76, Issue 10, pp 12627–12644
[8] Khana, A., Malika, S. A., Alib, A., Chamlawia, R., Hussaina, M., Mahmoodc, M. T. &Usmand, I. (2012). Intelligent Reversible Watermarking and Authentication: Hiding Depth Map Information for 3D Cameras. Elsevier, Information Science, 216, 155—175.
[9] Hsiao, J. H., Chen, C. S., Chien, L. F. & Chen, M. S. (2007). A New Approach to Image Copy Detection Based on Extended Feature Sets. IEEE Transactions on Image Processing, 16, 2069-2079.
[10] Ling, H., Cheng, H., Ma, Q., Zou, F. & Yan, W. (2012). Efficient Image Copy Detection Using Multiscale Fingerprints.IEEE Multimedia, 19, 60- 69.
[11] Nikolopoulos, S., Zafeiriou, S., Nikolaidis, N. & Pitas, I. (2010). Image Replica Detection System Utilizing R-trees and Linear Discriminant Analysis. Elsevier Pattern Recognition, 43, 636-649.
[12] D. Tralic, I. Zupancic, S. Grgic, and M. Grgic, ―CoMoFoD-New database for copy–move forgery detection,‖ in 55th IEEE International Symposium ELMAR 2013.
[13] DijanaTralic; Sonja Grgic; XianfangSunPaul ; L. Rosin (2016). Combining cellular automata and local binary patterns for copy-move forgery detection.Multimedia Tools and Applications Dec,, Volume 75, Issue 24, pp 16881–16903
[14] Hu, WC., Chen, WH., Huang, DY. et al. (2016). Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes.Multimed Tools Appl (2016) 75: 3495.
[15] Lien, C. C., Shih, C. L., & Chou, C. H. (2010). Fast forgery detection with the intrinsic resampling properties. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 232-235
[16] Hajihashemi V., Gharahbagh A.A. (2018) A Fast, Block Based, Copy-Move Forgery Detection Approach Using Image Gradient and Modified K-Means. In: Thampi S., Mitra S., Mukhopadhyay J., Li KC., James A., Berretti S. (eds) Intelligent Systems Technologies and Applications. ISTA 2017.Advances in Intelligent Systems and Computing, vol 683. Springer, Cham
[17] Devadoss, C.P. &Sankaragomathi, (2018) "Near lossless medical image compression using block BWT–MTF and hybrid fractal compression techniques" Cluster Computing pp 1–9.

Keywords
Digital Forensics, Keyword Based, Gabor Filter,ZM, PZM