Utilization of edge operators for localization of copy-move image forgery using WLD-HOG features with connected componen

  • PDF / 7,666,299 Bytes
  • 37 Pages / 439.642 x 666.49 pts Page_size
  • 110 Downloads / 145 Views

DOWNLOAD

REPORT


Utilization of edge operators for localization of copy-move image forgery using WLD-HOG features with connected component labeling Anuja Dixit1 · Soumen Bag1 Received: 16 July 2019 / Revised: 28 March 2020 / Accepted: 15 June 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract One of the most popular image forgery technique is copy-move forgery. In this technique, one or more segments are copied and affixed at different positions within the image. This forgery technique is highly grievous as it can manipulate an image in various ways (such as by presenting additional information or by concealing the genuine information of image). We propose a novel blind forensic technique for copy-move image forgery detection. Our approach utilize different edge detection operators to extract high frequency features. Histogram of Oriented Gradients (HOG) and Weber Local Descriptor (WLD) are used to extract image block features. Radix and lexicographical sorting is enforced over feature vector matrix followed by correlation computation between feature vectors to detect similar feature vectors. Shift vectors are computed to locate similar group of blocks within image. Connected component labeling is applied as morphological operation to remove false matches. Proposed approach is robust to detect plain as well as multiple copy-move forgery in images with post-processing attacks such as contrast adjustment, image blurring, color reduction, and brightness change. Proposed approach achieve highest F-Measure(%) in comparision to other existing forgery detection methods. Keywords Block-based approach · Copy-move image forgery · Digital image forensics · Feature extraction · Passive authentication

1 Introduction Digital revolution has provided the facility to access, process, and share data with little effort. Such progression in technology gave rise to security challenges. These circumstances  Anuja Dixit

[email protected] Soumen Bag [email protected] 1

Department of Computer Science and Engineering, Indian Institute of Technology (Indian School of Mines), Dhanbad, India

Multimedia Tools and Applications

are creating suspicions related to authenticity of digital content. Images are powerful and effective means of conveying complex information (scenes) which is otherwise very arduous to verbalize in words. Ocular evidences are more believable than verbal clues. The trust on visual evidences can be exploited for manipulating the truth. With rapid furtherance in technology, several image processing packages like GIMP, Corel draw, and Photoshop are easily accessible as well as used at large scale to manipulate images. Such situations made discrimination between original and tampered version of images very hard. The trouble is increasing day after day as millions of images are uploaded every day to the web. Tampered images can cause defamation, rivalry, fun-making, harassment, etc. at political, business, and social level. Copy-move forgery [38] is one of the widely known image forgery technique.