Copy-Move Detection Based on Different Forms of Local Binary Patterns
An obvious way of digital image forgery is a copy-move attack. It is quite simple to carry out to hide important information in an image. Copy-move process contains three main steps: copy the fragment from one place of an image, transform it by some means and paste to another place of the same image. Nowadays researchers develop a lot of copy-move detection solutions though the achieved results are far from perfect. In this paper, it is proposed a comparison of different local binary patterns (LBP) forms in the task of copy-move detection: geometric local binary patterns (GLBP), binary gradient contours (BGC), local derivative patterns (LDP) and simple LBP forms. All these LBP-based solutions are used to create local features that are robust to contrast enhancement, additive Gaussian noise, JPEG compression, affine transform. All these solutions are different in the number of transforms and transform parameters range that can be detected by the algorithm. Another advantage of these features is low computational complexity. Conducted experiments show that GLBP-based features can be used to detect all 4 transforms with a wide range of transforms parameters. The proposed solution showed high precision and recall values during experimental research for wide ranges of transform parameters. Thus, it showed a meaningful improvement in detection accuracy.
KeywordsForgery Copy-move Local binary pattern Binary gradient contour Geometric local binary pattern Local derivative pattern
This work was supported by the Federal Agency of Scientific Organization (Agreement 007-3/43363/26) in parts “Copy-move detection scheme” and “Binary Gradient Contours” and by the Russian Foundation for Basic Research (no. 19-07-00138) in parts “Geometric Local Binary Pattern”, “Local Derivative Pattern” and “Experiments”.
- 3.Bayram, S., Sencar, H.T., Memon, N.: An efficient and robust method for detecting copy-move forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1053–1056 (2009)Google Scholar
- 10.Kang, X., Wei, S.: Identifying tampered regions using singular value decomposition in digital image forensics. In: Proceedings of the 2008 IEEE International Conference on Computer Science and Software Engineering, pp. 926–930 (2008)Google Scholar
- 12.Orjuela Vargas, S.A., Yañez Puentes, J.P., Philips, W.: The geometric local textural patterns (GLTP). In: Brahnam, S., Jain, L.C., Nanni, L., Lumini, A. (eds.) Local Binary Patterns: New Variants and Applications. Studies in Computational Intelligence, vol. 506, pp. 85–112. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-39289-4_4CrossRefGoogle Scholar