A Passive Blind Approach for Image Splicing Detection Based on DWT and LBP Histograms

  • Mandeep KaurEmail author
  • Savita Gupta
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 625)


Splicing is the most generic kind of forgery found in digital images. Blind detection of such operations has become significant in determining the integrity of digital content. The current paper proposes a passive-blind technique for detecting image splicing using Discrete Wavelet Transform and histograms of Local Binary Pattern (LBP). Splicing operation introduces sharp transition in the form of lines, edges and corners, which are represented by high frequency components. Wavelet analysis characterizes these short-time transient by measuring local sharpness or smoothness from wavelet coefficients. After first level wavelet decomposition of the image, texture variation is studied along the detailed and approximation coefficients using local binary pattern (LBP), since tampering operations disrupts the textural microstructure of an image. Feature vector is formed by concatenating the LBP histogram from the four wavelet sub bands. The classification accuracy of the algorithm was determined using svm classifier using 10-fold cross validation. The method gives maximum accuracy for the chrominance channel of YCbCr color space, which is weak at hiding tampering traces. It is tested on four different kinds of standard spliced image dataset and its performance is compared with some of the latest methods. The method offers accuracy up to 97 % for JPEG images present in the spliced image dataset.


Passive-blind approach Image forensics Tamper detection LBP histograms 


  1. 1.
    Babak Mahdian, S.: A bibliography on blind methods for identifying image forgery. J. Sig. Process. Image Commun. 25(6), 389–399 (2010)CrossRefGoogle Scholar
  2. 2.
    Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digital Invest. 10(3), 226–245 (2013)CrossRefGoogle Scholar
  3. 3.
    Farid, H.: A Survey of Image Forgery Detection. Signal Process. Mag. 26(2), 16–25 (2009)CrossRefGoogle Scholar
  4. 4.
    Piva, A.: An overview on image forensics. ISRN Signal Process. J. 2013, 22 (2013). Article ID 496701Google Scholar
  5. 5.
    Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 177–187. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Yun, Q., Shi, C.: A natural image model approach to splicing detection. ACM, 12–13 (2007)Google Scholar
  7. 7.
    He, Z., W, Lu, et al.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45, 4292–4299 (2012)CrossRefGoogle Scholar
  8. 8.
    Ghulam Muhammad, M.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Inverstigation, 49–57 (2012). ElsevierGoogle Scholar
  9. 9.
    Zahra Moghaddasi, H.: A comparison study on SVD-based features in different transforms for image splicing detection. In: International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taiwan, pp. 13–14 (2015)Google Scholar
  10. 10.
    Muhammad Hussain, G.: Image forgery detection using multi-resolution weber local descriptors. In: EuroCon 2013, Zagreb, Croatia, pp. 1570–1577 (2013)Google Scholar
  11. 11.
    Muhammad Hussain, S.: Comparison between WLD and LBP descriptors for non-intrusive image forgery detection. (2014)Google Scholar
  12. 12.
    Ng, T.T., Chang, S.F.: A dataset of authentic and spliced image. In: Columbia Image Splicing Detection Evaluation Dataset, DVMM,Columbia University. Accessed 2004
  13. 13.
    Dong, J., Wang, W.: CASIA tampered image detection evaluation (TIDE) database v1.0 and v2.0 (2011). http://forensics.idealtest
  14. 14.
    Amerini, I.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)CrossRefGoogle Scholar
  15. 15.
    Saba Mushtaq, A.: Novel method for image splicing detection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2398–2403 (2014)Google Scholar
  16. 16.
    He, Z., Sun, W.: Digital image splicing detection based on approximate run length. Pattern Recogn. Lett. 32, 1591–1597 (2011)CrossRefGoogle Scholar
  17. 17.
    Muhammad, G., Al-Hammadi, M.H., Hussain, M., et al.: Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25, 985–995 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  1. 1.University Institute of Engineering and TechnologyPanjab UniversityChandigarhIndia

Personalised recommendations