Skip to main content

A Passive Blind Approach for Image Splicing Detection Based on DWT and LBP Histograms

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 625))

Included in the following conference series:

Abstract

Splicing is the most generic kind of forgery found in digital images. Blind detection of such operations has become significant in determining the integrity of digital content. The current paper proposes a passive-blind technique for detecting image splicing using Discrete Wavelet Transform and histograms of Local Binary Pattern (LBP). Splicing operation introduces sharp transition in the form of lines, edges and corners, which are represented by high frequency components. Wavelet analysis characterizes these short-time transient by measuring local sharpness or smoothness from wavelet coefficients. After first level wavelet decomposition of the image, texture variation is studied along the detailed and approximation coefficients using local binary pattern (LBP), since tampering operations disrupts the textural microstructure of an image. Feature vector is formed by concatenating the LBP histogram from the four wavelet sub bands. The classification accuracy of the algorithm was determined using svm classifier using 10-fold cross validation. The method gives maximum accuracy for the chrominance channel of YCbCr color space, which is weak at hiding tampering traces. It is tested on four different kinds of standard spliced image dataset and its performance is compared with some of the latest methods. The method offers accuracy up to 97 % for JPEG images present in the spliced image dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Babak Mahdian, S.: A bibliography on blind methods for identifying image forgery. J. Sig. Process. Image Commun. 25(6), 389–399 (2010)

    Article  Google Scholar 

  2. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digital Invest. 10(3), 226–245 (2013)

    Article  Google Scholar 

  3. Farid, H.: A Survey of Image Forgery Detection. Signal Process. Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  4. Piva, A.: An overview on image forensics. ISRN Signal Process. J. 2013, 22 (2013). Article ID 496701

    Google Scholar 

  5. Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 177–187. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Yun, Q., Shi, C.: A natural image model approach to splicing detection. ACM, 12–13 (2007)

    Google Scholar 

  7. He, Z., W, Lu, et al.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45, 4292–4299 (2012)

    Article  Google Scholar 

  8. Ghulam Muhammad, M.: Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Inverstigation, 49–57 (2012). Elsevier

    Google Scholar 

  9. Zahra Moghaddasi, H.: A comparison study on SVD-based features in different transforms for image splicing detection. In: International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taiwan, pp. 13–14 (2015)

    Google Scholar 

  10. Muhammad Hussain, G.: Image forgery detection using multi-resolution weber local descriptors. In: EuroCon 2013, Zagreb, Croatia, pp. 1570–1577 (2013)

    Google Scholar 

  11. Muhammad Hussain, S.: Comparison between WLD and LBP descriptors for non-intrusive image forgery detection. (2014)

    Google Scholar 

  12. Ng, T.T., Chang, S.F.: A dataset of authentic and spliced image. In: Columbia Image Splicing Detection Evaluation Dataset, DVMM,Columbia University. http://www.ee.columbia.edu/dvmm/. Accessed 2004

  13. Dong, J., Wang, W.: CASIA tampered image detection evaluation (TIDE) database v1.0 and v2.0 (2011). http://forensics.idealtest

  14. Amerini, I.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  15. Saba Mushtaq, A.: Novel method for image splicing detection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2398–2403 (2014)

    Google Scholar 

  16. He, Z., Sun, W.: Digital image splicing detection based on approximate run length. Pattern Recogn. Lett. 32, 1591–1597 (2011)

    Article  Google Scholar 

  17. Muhammad, G., Al-Hammadi, M.H., Hussain, M., et al.: Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25, 985–995 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mandeep Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kaur, M., Gupta, S. (2016). A Passive Blind Approach for Image Splicing Detection Based on DWT and LBP Histograms. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2738-3_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2737-6

  • Online ISBN: 978-981-10-2738-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics