Image Forgery Detection
Image Forgery Detection
Department of Information
Technology
Project stage II presentation on :
08/04/2017
Content
2
• Introduction
• Motivation
• Types of image forgery
• Literature Survey
• Problem Statement
• Goals
• Proposed Methodology
• Analysis of results and implementation
• Conclusion and Future Direction
• Applications
• Papers Publication / Submission
• References
Image forgery
Active Passive
Discrete Wavelet Transform 1) DWT is detect the noisy 1)Detects many false matches
(DWT) image, retouching images.
2) It captures both frequency,
location information.
Locally Linear Embedding 1) Detects copy move region as 1) It need some times to
(LLE) well as fused edges. detect forgery.
2) Its ability to deal with large
amounts of high dimensional
data.
Scale Invariant Feature 1)Detects JPEG compression, 1)Detects many false matches
Transformation (SIFT) added noise and geometrical
Transformation.
12
Goals
To briefly introduce what is image forgery
To give overview of different techniques that is used to detect forged
area
To improve the performance of copy-move forgery
Investigate the effectiveness of integrating LBP, DWT, PCA and SVM
Pre-processing Pre-processing
Classification (SVM)
Result
08/04/2017 Image forgery detection using LBP and transformation methods
Proposed Methodology
14
Feature extraction
Feature matching
Classification
15
Register as a user
Name, phone number, email and password are require to register
Unlimited users
Type of security
R.G.B color
Each pixel have 3 bytes of data (one for red, one for green and one
for blue)
1 byte can store a value from 0 to 255
(28)3 = 16.777.216 colors in one pixel
YCbCr
Y (luminance)
CbCr (chrominance)
RGB
(Red, Green and Blue)
Cb and Cr
(Chrominance)
08/04/2017 Image forgery detection using LBP and transformation methods
3. Apply DWT
18
DWT
S (Pi-Pc) =
13 137 55 0 1 0
75 70 80 1 1
LBP
200 45 110 1 0 1
0 1 0 1 1 0 1 1
= 64+16+8+2+1=91
08/04/2017 Image forgery detection using LBP and transformation methods
Cont.…
20
Apply
LBP
126 65 110
90 45 200
80 60 94
The given
LBP PCA target image
is forgery
g () = T + w0
Z2 > z1
08/04/2017
Cont.…
24
SVM
Hardware Requirements
Processor Intel core i3
RAM 256MB (min)
Hard Disk 20 GB
Software Requirements
Operating System Windows7, Windows8,
Windows10
Coding language JAVA (JDK 7.0)
IDE Eclipse Luna
Database MySQL 5.0
26
The Data Base used in proposed method called Copy Move Forgery
Detection(CoMoFoD)
contains 260 forgery images
The maximum size of image in the proposed system is (285X220)
pixels
The proposed system tested for 40 forged images
JPEG, PNG and BMP
CoMoFoD database is available at http://www.vcl.fer.hr/comofod.
08/04/2017 Image forgery detection using LBP and transformation methods
implementation
27
DA = X 100
False Match Rate (FMR) is the Parts of images which does not
involve any forgery but still they are displayed as forged parts
FMR = X 100
31
Detection accuracy
95.2
95.091
95
94.8
94
93.851
93.8
93.6
93.4
93.2 08/04/2017
8x8 block size
Cont.…
39
4.7 4.609
Large size
3.2
2.7
2.2
8x8 block size 08/04/2017
Comparison table of Proposed and other
methods
40
Forensic investigation
Criminal investigation
Insurance processing
Surveillance systems
Intelligence services
Medical imaging
Journalism
43
1. Mohanad F. Jwaid, prof. Trupti N. Baraskar “Study and Analysis of Copy-Move & Splicing
Image Forgery Detection Techniques “, at
IEEE International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-
SMAC 2017)./ presented.
2. Mohanad F Jwaid, prof. Trupti N. Baraskar “ Detection of copy-move image forgery using Local
Binary Pattern with Discrete wavelet transform and Principle Component Analysis” accepted at 3rd
International Conference On Computing, Communication, Control And Automation 17th - 18th Aug 2017/
[1] Fahime hakimi, Mahdi Hariri, farhad GharehBaghi, “Image Splicing Forgery Detection using Local
binary pattern and Discrete Wavelet transform”, 2015 2nd International Conference on Knowledge-
Based Engineering and Innovation.
[2] Diaa M. Uliyan, Hamid A. Jalab, Ainuddin W. Abdul Wahab, “Copy Move Image Forgery
Detection Using Hessian and Center Symmetric Local Binary Pattern”, 2015 IEEE Conference on
Open Systems (ICOS), August 24-26, 2015, Melaka, Malaysia
[3] Amani Alahmadi, Muhammad Hussain, Hatim Aboalsamh, Ghulam Muhamma, George Bebis,
Hassan Mathkour, “Passive Detection of Image Forgery using DCT and Local Binary Pattern”IEEE,
2016
[4] Chi-Man Pun, Xiao-Chen Yuan, Xiu-Li Bi, “Image Forgery Detection Using Adaptive Over-
Segmentation and Feature Point Matching”, IEEE Transactions on Information Forensics and Security,
2015
[5] Khosro Bahrami, Alex C. Kot, Li, and Haoliang Li, “Blurred Image Splicing Localization by Exposing
Blur Type Inconsistency’, IEEE Transactions on Information Forensics and Security, 2015.
[6] Mohsen Zandi, Ahmad Mahmoudi-Aznaveh, and Alireza Talebpour, “Iterative Copy-Move Forgery
Detection based on a New Interest Point Detector”, IEEE Transactions on Information Forensics and
Security, 2016.
[7] Anselmo Ferreira, Siovani C. Felipussi, Carlos Alfaro, “Behavior Knowledge Space-Based Fusion for
Copy-Move Forgery Detection”, TRANSACTIONS ON IMAGE PROCESSING, 2016.
[8] E. Ardizzone, A. Bruno, and G. Mazzola, “Copy-Move Forgery Detection by Matching Triangles of
Keypoints”, IEEE Transactions on Information Forensics and Security, 2015.
[9] Rani Susan Oommen, Jayamohan M., Sruthy S., “A Survey of Copy-Move Forgery Detection
Techniques for Digital Images”, International Journal of Innovations in Engineering and technology.
[10] Charmil Nitin Bharti, Purvi Tandel, “A Survey of Image Forgery Detection Techniques”, IEEE
WiSPNET 2016 conference
08/04/2017 Image forgery detection using LBP and transformation methods
References
46
[11] Jaberi, M., Bebis, G., Hussain, M., Muhammad, G., “Accurate and robust localization of duplicated
region in copy-move image forgery”, Machine Vision and Applications, 25(2), 451-475 (2014).
Thank You.