A Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images
Abstract
:1. Introduction
- Our proposed method is highly robust as it is capable of detecting image forgery even when a low number of forgery samples (accuracy of 77.01% vs. 61.17% for 3% forgery samples in training set for our proposed method vs. method in [10]) are available in training set for FBDDF (Federation–Berkeley Deep Drive Forgery) dataset. This level of performance vindicates our proposed detection system is more suitable for IoT image forgery detection.
- We introduce an innovative feature extraction method that reduces the impact of translation, rotation, and scale on feature extraction, and inherently yields a fixed low dimensional feature set presenting a more computationally efficient system. Another important aspect of this technique is that the extracted feature set is equally applicable for both types of images which is justified by the reported results using the benchmark datasets for color and gray level images.
- We develop a new dataset named FBDDF (Federation–Berkeley Deep Drive Forgery) using Berkeley’s Deep Drive dataset [16], one of the widely used dataset for IoT based self-driving vehicular vision research. FBDDF fills-in the gap for a benchmark dataset for IoT around image forgery research.
- Our proposed method outperforms other image forgery detection techniques when tested on five publicly available and widely used datasets. The use of DCT, LBP, and other processing steps to extract features in our method which, when trained with SVM, leads to better detection performance (up to 13.20% improvement across the datasets).
2. Related Works
2.1. Spatial Domain Based Techniques
2.2. Frequency Domain Based Techniques
2.3. Hybrid Techniques
3. Proposed Method
3.1. Converting Color Images into Grayscale and YCbCr Color Space Images
3.2. Block Division of Grayscale Image and YCbCr Color Space Components
3.3. Block Discrete Cosine Transformation (BDCT)
3.4. Local Binary Pattern (LBP) Operator
3.5. Block Division of LBP Array
3.6. Mean-Based Feature Extraction
4. Experiments and Results
4.1. Description of Datasets
4.1.1. Existing Datasets
4.1.2. Our Developed Dataset—FBDDF
4.2. SVM Classifier and Model Validation
4.3. Performance Metrics
4.3.1. Accuracy
4.3.2. False Negative Rate (FNR)
4.3.3. Sensitivity
4.3.4. Specificity
4.4. Results and Discussion
4.4.1. Effects of Number of Positive Samples in Training Set
4.4.2. Effects of IoT Image Rotation, Scaling and Compression
4.4.3. Comparison with Recent Methods
4.4.4. Comparison of CPU Processing Time
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
DCT | Discrete Cosine Transformation |
LBP | Local Binary Pattern |
SVM | Support Vector Machine |
FBDDF | Federation–Berkeley Deep Drive Forgery |
DWT | Discrete Wavelet Transformation |
RLRN | Run-Length Run Number |
WLD | Weber Local Descriptor |
LTP | Local Ternary Pattern |
ELTP | Enhanced Local Ternary Pattern |
FFT | Fast Fourier Transform |
SPT | Steerable Pyramid Transform |
PCA | Principle Component Analysis |
IIoT | Industrial Internet of Things |
BDCT | Block Discrete Cosine Transformation |
LSB | Least Significant Bit |
MSB | Most Significant Bit |
BDD | Berkely Deep Drive |
ITS | Intelligent Traffic System |
JPEG | Joint Photographic Experts Group |
RBF | Radial Basis Function |
TP | True Positive |
TN | True Negative |
FP | False Positive |
FN | False Negative |
FNR | False Negative Rate |
SD | Standard Deviations |
TIFF | Tagged Image File Format |
References
- Jonsson, P.; Carson, S. Ericsson Mobility Report; Ericsson: Stockholm, Sweden, 2018. [Google Scholar]
- Redi, J.A.; Taktak, W.; Dugelay, J.L. Digital image forensics: A booklet for beginners. Multimed. Tools Appl. 2011, 51, 133–162. [Google Scholar] [CrossRef] [Green Version]
- Mallonee, L. Infamously Altered Photos, Before and After Their Edits. Wired. 2015. Available online: https://bit.ly/2Ia8zqf (accessed on 15 March 2020).
- Wikipedia contributors. List of Photo Manipulation Controversies. Wikipedia. 2019. Available online: https://bit.ly/2wcweBB (accessed on 15 March 2020).
- Allbeson, T.; Allan, S. The War of Images in the Age of Trump. In Trump’s Media War; Happer, C., Hoskins, A., Merrin, W., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 69–84. [Google Scholar]
- Schreiber, M. APTOPIX TRUMP GERMANY G20; Associated Press: New York, NY, USA, 2017. [Google Scholar]
- Novak, M. That Viral Photo of Putin and Trump Is Totally Fake. GIZMODO. 2017. Available online: https://bit.ly/3bL6PQo (accessed on 7 July 2020).
- Johnson, M.K.; Farid, H. Exposing digital forgeries in complex lighting environments. IEEE Trans. Inf. Forensics Secur. 2007, 2, 450–461. [Google Scholar] [CrossRef]
- He, Z.; Sun, W.; Lu, W.; Lu, H. Digital image splicing detection based on approximate run length. Pattern Recognit. Lett. 2011, 32, 1591–1597. [Google Scholar] [CrossRef]
- Alahmadi, A.; Hussain, M.; Aboalsamh, H.; Muhammad, G.; Bebis, G.; Mathkour, H. Passive detection of image forgery using DCT and local binary pattern. Signal Image Video Process. 2017, 11, 81–88. [Google Scholar] [CrossRef]
- Islam, M.M.; Kamruzzaman, J.; Karmakar, G.; Murshed, M.; Kahandawa, G. Passive Detection of Splicing and Copy–Move Attacks in Image Forgery. In Proceedings of the International Conference on Neural Information Processing, Siem Reap, Cambodia, 13–16 December 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 555–567. [Google Scholar]
- Shi, Y.Q.; Chen, C.; Chen, W. A natural image model approach to splicing detection. In Proceedings of the 9th workshop on Multimedia & Security, Dallas, TX, USA, 20–21 September 2007; ACM: New York, NY, USA, 2007; pp. 51–62. [Google Scholar]
- He, Z.; Lu, W.; Sun, W.; Huang, J. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit. 2012, 45, 4292–4299. [Google Scholar] [CrossRef]
- Islam, M.M.; Karmakar, G.; Kamruzzaman, J.; Murshed, M.; Kahandawa, G.; Parvin, N. Detecting Splicing and Copy–Move Attacks in Color Images. In Proceedings of the 2018 Digital Image Computing: Techniques and Applications (DICTA), Canberra, Australia, 10–13 December 2018; pp. 1–7. [Google Scholar]
- Hakimi, F.; Hariri, M.; GharehBaghi, F. Image splicing forgery detection using local binary pattern and discrete wavelet transform. In Proceedings of the 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran, 5–6 November 2015; pp. 1074–1077. [Google Scholar]
- Yu, F.; Xian, W.; Chen, Y.; Liu, F.; Liao, M.; Madhavan, V.; Darrell, T. Bdd100k: A diverse driving video database with scalable annotation tooling. arXiv 2018, arXiv:1805.04687. [Google Scholar]
- Hsu, Y.F.; Chang, S.F. Detecting image splicing using geometry invariants and camera characteristics consistency. In Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, ON, Canada, 9–12 July 2006; pp. 549–552. [Google Scholar]
- Hsu, Y.-F.; Chang, S.-F. Image splicing detection using camera response function consistency and automatic segmentation. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, 2–5 July 2007; pp. 28–31. [Google Scholar]
- Wang, W.; Dong, J.; Tan, T. Image tampering detection based on stationary distribution of Markov chain. In Proceedings of the 2010 IEEE International Conference on Image Processing, Hong Kong, China, 25 January 2010; pp. 2101–2104. [Google Scholar]
- Dong, J.; Wang, W.; Tan, T. CASIA image tampering detection evaluation database. In Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China, 6–10 July 2013; pp. 422–426. [Google Scholar]
- Dong, J.; Wang, W.; Tan, T.; Shi, Y.Q. Run-length and edge statistics based approach for image splicing detection. In Proceedings of the International Workshop on Digital Watermarking, Jeju Island, Korea, 8–10 November 2008; Springer: Berlin/Heidelberg, Germany; pp. 76–87. [Google Scholar]
- Zhao, X.; Li, J.; Li, S.; Wang, S. Detecting digital image splicing in chroma spaces. In Proceedings of the International Workshop on Digital Watermarking, Atlantic City, NJ, USA, 23–26 October 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 12–22. [Google Scholar]
- Hussain, M.; Muhammad, G.; Saleh, S.Q.; Mirza, A.M.; Bebis, G. Image forgery detection using multi-resolution Weber local descriptors. In Proceedings of the Eurocon 2013, Zagreb, Croatia, 1–4 July 2013; pp. 1570–1577. [Google Scholar]
- Hussain, M.; Saleh, S.Q.; Aboalsamh, H.; Muhammad, G.; Bebis, G. Comparison between WLD and LBP descriptors for non-intrusive image forgery detection. In Proceedings of the 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA), Alberobello, Italy, 23–25 June 2014. [Google Scholar]
- Friedman, J.H. On bias, variance, 0/1—Loss, and the curse-of-dimensionality. Data Min. Knowl. Discov. 1997, 1, 55–77. [Google Scholar] [CrossRef]
- Alahmadi, A.A.; Hussain, M.; Aboalsamh, H.; Muhammad, G.; Bebis, G. Splicing image forgery detection based on DCT and Local Binary Pattern. In Proceedings of the 2013 IEEE Global Conference on Signal and Information Processing, Austin, TX, USA, 3–5 December 2013; pp. 253–256. [Google Scholar]
- Johnson, M.K.; Farid, H. Exposing digital forgeries through chromatic aberration. In Proceedings of the 8th Workshop on Multimedia and Security, Geneva, Switzerland, 26–27 September 2006; ACM: New York, NY, USA, 2006; pp. 48–55. [Google Scholar]
- Wang, W.; Dong, J.; Tan, T. Effective image splicing detection based on image chroma. In Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 7–10 November 2009; pp. 1257–1260. [Google Scholar]
- Kanwal, N.; Girdhar, A.; Kaur, L.; Bhullar, J.S. Detection of Digital Image Forgery using Fast Fourier Transform and Local Features. In Proceedings of the 2019 International Conference on Automation, Computational and Technology Management (ICACTM), London, UK, 24–26 April 2019; pp. 262–267. [Google Scholar]
- Muhammad, G.; Al-Hammadi, M.H.; Hussain, M.; Bebis, G. Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 2014, 25, 985–995. [Google Scholar] [CrossRef]
- Khayam, S.A. The discrete cosine transform (DCT): Theory and application. Mich. State Univ. 2003, 114, 1–31. [Google Scholar]
- Karmakar, G.C. An Integrated Fuzzy Rule-Based Image Segmentation Framework. Ph.D. Thesis, Monash University, Melbourne, Australia, 2002. [Google Scholar]
- Ng, T.T.; Chang, S.F. A model for image splicing. In Proceedings of the 2004 International Conference on Image Processing, ICIP’04, Singapore, 24–27 October 2004; Volume 2, pp. 1169–1172. [Google Scholar]
- Chang, C.C.; Lin, C.J. LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2011, 2, 27. [Google Scholar] [CrossRef]
- Martinez-Cantin, R. Bayesopt: A bayesian optimization library for nonlinear optimization, experimental design and bandits. J. Mach. Learn. Res. 2014, 15, 3735–3739. [Google Scholar]
- Kohavi, R. A Study of Cross-Validation and Bootstrap for Accuracy Estimation And Model Selection; Ijcai: Montreal, QC, Canada, 1995; Volume 14, pp. 1137–1145. [Google Scholar]
- Buurman, B.; Kamruzzaman, J.; Karmakar, G.; Islam, S. Low-Power Wide-Area Networks: Design Goals, Architecture, Suitability to Use Cases and Research Challenges. IEEE Access 2020, 8, 17179–17220. [Google Scholar] [CrossRef]
- RYS, R. Smart Sensors Increasingly Important in the Industrial IoT Age. ARC Advisory Group. 2018. Available online: https://bit.ly/2W0et3f (accessed on 22 June 2020).
- MATLAB. Version 9.6.0.1072779 (R2019a); The MathWorks Inc.: Natick, MA, USA, 2019. [Google Scholar]
- Wikipedia contributors. Image Scaling. Wikipedia. 2020. Available online: https://bit.ly/3fivvkO (accessed on 19 August 2020).
Dataset | Image Size | Image Type | No. of Images | Tampering | ||
---|---|---|---|---|---|---|
Authentic | Tampered | Total | ||||
Columbia Gray | 128 × 128 | BMP | 933 | 912 | 1845 | Simple crop-and-paste in small block of gray image, no post processing or color image |
Columbia Color | 757 × 568–1152 × 768 | TIFF | 183 | 180 | 363 | Simple crop-and-paste using Photoshop, high resolution uncompressed images |
CASIA 1 | 384 × 256, 256 × 384 | JPEG | 800 | 921 | 1721 | Photoshop with pre-processing, no post-processing |
CASIA 2 | 240 × 160–900 × 600 | JPEG, TIFF, BMP | 7491 | 5123 | 12,614 | Photoshop with pre-processing and/or post-processing |
FBDDF (New) | 1280 × 720 | JPEG, TIFF | 200 | 200 | 400 | Uncompressed Splicing and copy–move using Photoshop, suitable for self driving vision forensics |
Datasets | Block Size | Accuracy | FNR | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Gray | Color Components | Gray | Color Components | ||||||||
Y | Cb | Cr | CbCr | Y | Cb | Cr | CbCr | ||||
Columbia Gray | 4 × 4 | - | - | - | - | - | - | - | - | ||
8 × 8 | - | - | - | - | - | - | - | - | |||
16 × 16 | - | - | - | - | - | - | - | - | |||
Combined | - | - | - | - | - | - | - | - | |||
Columbia Color | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined | |||||||||||
CASIA 1 | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined | |||||||||||
CASIA 2 | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined | |||||||||||
FBDDF | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined |
Datasets | Block Size | Sensitivity | Specificity | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Gray | Color Components | Gray | Color Components | ||||||||
Y | Cb | Cr | CbCr | Y | Cb | Cr | CbCr | ||||
Columbia Gray | 4 × 4 | - | - | - | - | - | - | - | - | ||
8 × 8 | - | - | - | - | - | - | - | - | |||
16 × 16 | - | - | - | - | - | - | - | - | |||
Combined | - | - | - | - | - | - | - | - | |||
Columbia Color | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined | |||||||||||
CASIA 1 | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined | |||||||||||
CASIA 2 | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined | |||||||||||
FBDDF | 4 × 4 | ||||||||||
8 × 8 | |||||||||||
16 × 16 | |||||||||||
Combined |
Train Set | Block Size | CASIA 1 | |||
---|---|---|---|---|---|
Proposed Method | Method in [10] | ||||
Accuracy | FNR | Accuracy | FNR | ||
3% Forgery | 4 × 4 | 19.83 | 80.17 | 00.50 | 99.50 |
8 × 8 | 72.88 | 27.12 | 52.18 | 47.82 | |
16 × 16 | 77.01 | 22.99 | 61.17 | 38.83 | |
5% Forgery | 4 × 4 | 20.51 | 79.49 | 01.10 | 98.90 |
8 × 8 | 85.54 | 14.46 | 53.20 | 46.80 | |
16 × 16 | 80.53 | 19.47 | 63.17 | 36.83 | |
7% Forgery | 4 × 4 | 46.35 | 53.65 | 03.94 | 96.06 |
8 × 8 | 86.41 | 13.59 | 58.00 | 42.00 | |
16 × 16 | 79.92 | 20.08 | 65.63 | 34.37 | |
9% Forgery | 4 × 4 | 46.66 | 53.34 | 13.34 | 86.66 |
8 × 8 | 89.12 | 10.88 | 62.17 | 37.83 | |
16 × 16 | 82.06 | 17.94 | 66.12 | 33.88 | |
10% Forgery | 4 × 4 | 54.35 | 45.65 | 05.49 | 94.51 |
8 × 8 | 89.95 | 10.05 | 63.50 | 36.50 | |
16 × 16 | 82.43 | 17.57 | 62.30 | 37.70 | |
20% Forgery | 4 × 4 | 69.48 | 30.52 | 38.87 | 61.13 |
8 × 8 | 91.79 | 08.21 | 70.55 | 29.45 | |
16 × 16 | 83.88 | 16.12 | 68.16 | 31.84 | |
30% Forgery | 4 × 4 | 69.60 | 30.40 | 48.19 | 51.81 |
8 × 8 | 93.90 | 06.10 | 77.66 | 22.34 | |
16 × 16 | 85.14 | 14.86 | 78.99 | 21.01 |
Dataset | Block | Proposed Method | Rotation | Scaling | |
---|---|---|---|---|---|
Accuracy | Accuracy | Accuracy | |||
Compressed | CASIA 1 (JPEG) | 4 × 4 | 87.33 | 87.94 | 77.68 |
8 × 8 | 98.24 | 97.55 | 79.88 | ||
16 × 16 | 96.14 | 97.48 | 84.85 | ||
Combined | 98.61 | 97.59 | 84.02 | ||
FBDDF (JPEG) | 4 × 4 | 94.25 | 86.79 | 65.48 | |
8 × 8 | 99.44 | 97.91 | 71.75 | ||
16 × 16 | 99.63 | 99.31 | 82.35 | ||
Combined | 99.58 | 99.45 | 80.73 | ||
Average (compressed image datasets) | 96.65 | 95.50 | 78.34 | ||
Uncompressed | FBDDF (TIFF) | 4 × 4 | 89.58 | 96.74 | 98.64 |
8 × 8 | 95.84 | 99.45 | 99.50 | ||
16 × 16 | 85.60 | 98.95 | 99.50 | ||
Combined | 94.45 | 99.50 | 99.51 | ||
Columbia Gray (BMP) | 4 × 4 | 78.82 | 77.44 | 75.25 | |
8 × 8 | 85.56 | 84.66 | 79.23 | ||
16 × 16 | 81.44 | 80.76 | 85.30 | ||
Combined | 85.54 | 85.18 | 85.46 | ||
Columbia Color (TIFF) | 4 × 4 | 92.51 | 90.14 | 95.10 | |
8 × 8 | 96.10 | 93.65 | 96.98 | ||
16 × 16 | 95.22 | 95.70 | 97.15 | ||
Combined | 95.99 | 94.52 | 97.38 | ||
Average (uncompressed image datasets) | 89.72 | 91.39 | 92.42 | ||
Mixed | CASIA 2 (JPEG, TIFF, BMP) | 4 × 4 | 93.86 | 96.78 | 96.68 |
8 × 8 | 97.70 | 99.26 | 99.69 | ||
16 × 16 | 99.06 | 99.72 | 99.91 | ||
Combined | 99.29 | 99.61 | 99.89 | ||
Average (mixed compression image datasets) | 97.48 | 98.84 | 99.04 |
Evaluation | Proposed Method | Alahmadi’s Method [10] |
---|---|---|
Accuracy | 95.84 | 88.50 |
FNR | 4.85 | 11.50 |
Sensitivity | 95.15 | 88.50 |
Specificity | 96.53 | 88.50 |
Methods | Columbia Gray | Columbia Color | CASIA 1 | CASIA 2 |
---|---|---|---|---|
Proposed | 85.56 | 98.20 | 99.55 | 99.88 |
Alahmadi et al. [10] | - | 97.77 | 97.00 | 97.50 |
Muhammad et al. [30] | - | 96.39 | 94.89 | 97.33 |
Hakimi et al. [15] | - | 95.13 | 97.21 | - |
Hussain et al. [24] | - | 94.29 | - | - |
Hsu and Chang [17] | - | 87.00 | - | - |
Zhao et al. [22] | - | 85.00 | 94.70 | - |
Wang et al. [19] | - | - | - | 95.60 |
He et al. [13] | - | - | - | 89.76 |
He et al. [9] | 80.58 | - | - | - |
Dong et al. [21] | 76.52 | - | - | - |
Kanwal et al. [29] | - | - | 88.62 | - |
Dataset (Gray) | Block Size | Mean CPU Time (in second) for a Single Image | ||
---|---|---|---|---|
Alahmadi’s Method | Proposed Method | Percentage Decrease | ||
FBDDF | 4 × 4 | 1.157 | 0.862 | 34.23 |
8 × 8 | 0.385 | 0.309 | 24.49 | |
16 × 16 | 0.183 | 0.159 | 15.25 | |
Columbia Gray | 4 × 4 | 0.027 | 0.017 | 62.29 |
8 × 8 | 0.009 | 0.007 | 27.55 | |
16 × 16 | 0.005 | 0.004 | 21.48 | |
Columbia Color | 4 × 4 | 0.870 | 0.651 | 33.57 |
8 × 8 | 0.288 | 0.229 | 25.72 | |
16 × 16 | 0.137 | 0.119 | 14.54 | |
CAISA 1 | 4 × 4 | 0.130 | 0.092 | 40.82 |
8 × 8 | 0.043 | 0.034 | 28.94 | |
16 × 16 | 0.022 | 0.018 | 19.41 | |
CASIA 2 | 4 × 4 | 0.179 | 0.138 | 29.99 |
8 × 8 | 0.062 | 0.048 | 28.33 | |
16 × 16 | 0.031 | 0.025 | 22.47 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Islam, M.M.; Karmakar, G.; Kamruzzaman, J.; Murshed, M. A Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images. Electronics 2020, 9, 1500. https://doi.org/10.3390/electronics9091500
Islam MM, Karmakar G, Kamruzzaman J, Murshed M. A Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images. Electronics. 2020; 9(9):1500. https://doi.org/10.3390/electronics9091500
Chicago/Turabian StyleIslam, Mohammad Manzurul, Gour Karmakar, Joarder Kamruzzaman, and Manzur Murshed. 2020. "A Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images" Electronics 9, no. 9: 1500. https://doi.org/10.3390/electronics9091500
APA StyleIslam, M. M., Karmakar, G., Kamruzzaman, J., & Murshed, M. (2020). A Robust Forgery Detection Method for Copy–Move and Splicing Attacks in Images. Electronics, 9(9), 1500. https://doi.org/10.3390/electronics9091500