SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. I (July – Aug. 2015), PP 66-70
www.iosrjournals.org
DOI: 10.9790/0661-17416670 www.iosrjournals.org 66 | Page
Copy-Move Image Forgery Detection Based on Center-Symmetric
Local Binary Pattern
1
Vandana Sangwan, 2
Madan Lal
1, 2
Department of Computer Engineering Punjabi University Patiala-147002, (India)
Abstract: This paper presents a method to detect copy-move image forgery using CS-LBP (centre symmetric
local binary pattern), an extension of basic local binary pattern. In the proposed method, firstly gray level
conversion is performed on the given image. Later, the image will be decomposed into fixed sized non-
overlapping blocks. Feature extraction can be done using CS- LBP, as this technique is invariant to illumination
and rotation. Then distance between the extracted feature vectors is calculated and are sorted
lexicographically, and retained only those pairs of blocks that have minimal distances between them. Those
minimal distances compared with predefined threshold value serve as the purpose of the copied regions. In the
end, post-processing is done using morphological operation and mask is generated for the region detected as
forged region.
Keywords: Copy-move forgery detection, CS-LBP, feature extraction, Image Tampering.
I. Introduction
In today’s technological era, digital images are the basic form of conveying information. But the
authenticity of these images is a big question for the society. As digital images are used in every field, for
example medical imaging, satellite imaging, forensic labs, and journalism for easy visualization, so preserving
their originality is a major issue. The popularity of digital images leads to the research in this area. With the help
of easy availability of photo editing software, an image can be tampered easily. This image tampering is
basically image forgery which is carried out to present false information or modify the real content of the image.
There are three main classes of image forgery, namely image retouching, copy-move forgery and image
splicing. Image re-touching involves rotation, scaling, contrast enhancement and resizing. In copy-move
forgery, an object or portion of the image is copied and pasted on to the other location in the same image so as
to hide some information or alter the original content of the image. Here, the basic characteristics of the image
remain same such as color, texture. Thirdly, the image splicing is a forgery that is a combination of two or more
than two images and results into a new image. Image splicing sources are heterogeneous as contents can be
picked from anywhere. The approaches to detect the digital image forgery are classified into two categories,
active and passive. In active forgery, some form of watermarking information is present in the image. In passive
or blind forgery, there is no such information is hidden in the image. Copy move forgery is an example of
passive (blind) forgery which will be detected using center-symmetric local binary pattern scheme.
In this paper, a passive method to detect copy move forgery in digital images is proposed. Firstly, we
divide the image into overlapping blocks after converting it into gray scale. Then using CS-LBP, feature vectors
are to be extracted. This technique overcomes with the drawbacks of basic local binary pattern, such as variant
to illumination and it is not too robust on flat image areas i.e. variance of intensity values within the uniform
region is very low. CS-LBP preserves better gradient information while preserving distinctiveness, reduce
dimensions also. Then lexicographical sorting is done on the feature vectors so as to bring the similar pairs of
vectors together for easy recognition. Finally the distance between those vectors is calculated and compared
with a threshold value to detect the duplicated region. The rest of the paper is as follows. In section 2, some
previously related work has being discussed, section 3 introduces CS-LBP operation. In section 4, proposed
algorithm is presented, followed with the results and conclusion in section 6.
II. Related Works
In this section, we have reviewed the passive methods for detection of copy-move forgery. Among the
initial attempts J. Fridrich, D. Soukal and J. Lukas [1] proposed methods to detect copy-move forgery. Discrete
cosine transform (DCT) of the image blocks was used and their lexicographical sorting is taken to avoid the
computational burden. Once sorted the adjacent identical pair of blocks are considered to be copy-moved
blocks. Block matching algorithm was used for balance between performance and complexity. This method
suffers from the drawback that it cannot detect small duplicate regions. Mohammad Farukh Hashmi, Vijay
Anand, Avinas G Keskar [2] proposed method using un-decimated wavelet transform along with SIFT operator
to extract more number of key-points that are matched to detect the copied blocks efficiently. This method gives
better results than DWT.
Copy-Move Image Forgery Detection Based on Center-Symmetric…
DOI: 10.9790/0661-17416670 www.iosrjournals.org 67 | Page
Mohammad Hussain et al, [3] showed a method based upon multi-resolution Weber law descriptors
(WLD. The suggested multi-resolution WLD extracts the features from chrominance components. An SVM is
used for classification and the experimental results showed that the accuracy rate can reach up to 91%.
Ning Zheng, Yixing Wang and Ming Xu [4] used a block based method to describe the components
extracted using LBP operator which is rotationally invariant. This method gives better results to post-processing
and rotation effects. Later on, technique presented by B.L. Shiva kumar et al, [5] using SURF and KD-tree for
data matching step results in minimal false matches if images of high resolution being taken.
Reza Davarzani, Khashayar Yaghmie et al, [6] presented a method based on multi-resolution local
binary pattern. This method is robust to geometric changes and illumination variations of the copied portions.
They proposed this method against after various variations such as rotation, blurring, noise addition, and JPEG
compression.
Motasem Alsawadi et al, [7] introduced a method based on basic local binary pattern with
neighborhood clustering to refine the features. This method shows the reduction in matching false regions.
Various techniques have been proposed and research is still going on. We tried to put our novel method
using variation of LBP, which is CS-LBP, so as to overcome the problems faced with local binary pattern.
III. Proposed Algorithm
The proposed step-wise methodology is as shown in fig.1.
Fig. 1 Block diagram of proposed method
Copy-Move Image Forgery Detection Based on Center-Symmetric…
DOI: 10.9790/0661-17416670 www.iosrjournals.org 68 | Page
Step-1: Gray Scale Conversion
Firstly, the given input image is converted to gray scale according to the following equation.
Y = 0.299R + 0.587G + 0.114B (1)
Where, Y is luminance component. Also a gray scale image is simple to work with.
Step-2: Division of image into overlapping blocks
The next step is to decompose the image (gray scale image) into fixed sized overlapping blocks. The block size
is chosen to be the minimal size of image tampering portion. For an image of size M*N, the total number of
blocks formed are given as per the following equation.
TB = (M-B+1)(N-B+1) (2)
Step-3: Feature extraction using CS-LBP
In this phase, features are extracted from the blocks using center-symmetric local binary pattern. CS-LBP is a
variant of local binary pattern, which is free from illumination variances and rotation effects. CS-LBP also
yields less number of feature vectors as compared to LBP so to make this technique less time consuming, as
shown in fig.2. For an image of M*N dimensions, local binary pattern produces 256 different binary patterns,
whereas for CS-LBP this number is only 16. Furthermore, robustness on flat image regions is obtained by
thresholding the gray-level differences with a small value T.
Fig. 2 Extraction of CS-LBP feature vectors The value of the threshold T is 1% of the pixel value
CSLBPR,N,T x, y = s ni − ni+(N 2)
N 2 −1
i=0
2i
,
Where s x =
1 x > T
0 otherwise
(3)
Range in our experiments. Since the region data lies between 0 and 1, T is set to 0.01. The radius is set to 2 and the
size of the neighborhood is 8. It should be noted that the gain of CS-LBP over LBP is not only due to the
dimensionality reduction, but also to the fact that the CS-LBP captures better the gradient information than the
basic LBP.
A texture descriptor used in passive forgery detection of copy move forgery should be rotationally
invariant, so that if the copied region is rotated before pasting into the same image, it can still be detected.
Rotational invariant CSLBP can be express by the Eq. (2):
CSLBPN,R
ri
= min⁡{ROR(CSLBPN, R, i ) | i==0,1…N} Eq. (2)
Where, function ROR (z, i) represents circular bitwise rotation of sequence z by i steps.
Step-4: Calculation of distance & Lexicographical sorting
dij = xi − xj ^2 + yi − yj ^2 where (xi, yi) is the top-left corner’s coordinate of the i-th block.
This type of sorting is applied on the rows of the matrix. In the organized list, homogeneous rows are proximate
to each other.
Step-5: Post-Processing
Morphologic operations are applied to fill the holes in the marked regions and remove the isolated points, then
output the final result.
IV. Results
The experiments were carried on Dell laptop having Core2 Duo processor with 2GB RAM using
MATLAB 2012a.The database on which we conducted our test contains a total of 220 images, in which 110
images are original images and remaining 110 images are forged images.
Copy-Move Image Forgery Detection Based on Center-Symmetric…
DOI: 10.9790/0661-17416670 www.iosrjournals.org 69 | Page
Also, true positive rate and false positive rate is being calculated to analyze the performance of the
proposed system quantitatively. TPR is the percentage of correctly identified forged images while FPR is the
percentage of original images falsely identified as forged.
Fig. 3: (a) Original image, (b) CS-LBP extracted feature representation,(c) forged image,(d) shows the generation of mask of
forged area in the image.
Fig. 4: (a) Original image, (b) Feature extraction using CS-LBP, (c) forged image, (d) shows mask generation of
the forged portion in image.
Copy-Move Image Forgery Detection Based on Center-Symmetric…
DOI: 10.9790/0661-17416670 www.iosrjournals.org 70 | Page
V. Conclusion
A novel CS-LBP interest region descriptor which combines the strengths of the well known SIFT
descriptor and the LBP texture operator was proposed. SIFT operator reduces the length of feature vector, so
analyzing feature vectors will take less time. This method gives better result than using LBP alone, TPR ratio
value is more, while the false positives are decreased using morphological operation. Overall accuracy of the
proposed system outperforms simple LBP technique. There can be a scope for future work on this technique
such as verifying this technique on other image formats and also different post-processing effects.
References
[1]. J. Fridrich, B. D. Soukal, and A. J. Lukas, “Detection of copy move forgery in digital images,” in Proceedings of the Digital
Forensic Research Workshop, Cleveland, Ohio, USA,August 2003.
[2]. Mohammad Farukh Hashmia et al, “Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-
decimated Wavelet Transform and Scale Invariant Feature Transform” 2014 AASRI Conference on Circuit and Signal Processing
(CSP 2014).
[3]. G. Muhammad, M. Hussain, G. Bebis, “Passive copy move image forgery detection using undecimated dyadic wavelet transform,”
Digital Investigation, vol. 9 (1), pp. 49-57, 2012.
[4]. Ning Zheng, Yixing Wang and Ming Xu, “A LBP Based Method for Detecting Copy-Move Forgery with Rotation,” Springer
Science, pp. 261-267,2013.
[5]. B. L. Shivakumar and Lt. Dr. Santhosh. "Detecting copy-move forgery in Digital images: A survey and analysis of current
methods," Global Journal of Computer Science and Technology, vol. 10, no. 7, 2010.
[6]. R. Davarzani, K. Yaghmaie, S. Mozaffari, and M. Tapak, “Copymove forgery detection using multiresolution local binary
patterns”, Forensics Science International, vol. 231, pp. 61-72, 2013.
[7]. Motasem Alsawadi et al, “Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering,” IEEE,
pp. 249-254, 2013.

More Related Content

What's hot

Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniquesgmidhubala
 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalIDES Editor
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Habibur Rahman
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIRZahra Mansoori
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationHabibur Rahman
 
Text-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter DetectionText-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter DetectionIDES Editor
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALsipij
 
Image segmentation ajal
Image segmentation ajalImage segmentation ajal
Image segmentation ajalAJAL A J
 
Marker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationMarker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationRushin Shah
 
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...IOSR Journals
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
A Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBPA Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBPEditor IJMTER
 

What's hot (19)

Comparative study on image segmentation techniques
Comparative study on image segmentation techniquesComparative study on image segmentation techniques
Comparative study on image segmentation techniques
 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image Retrieval
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIR
 
Image Segmentation
 Image Segmentation Image Segmentation
Image Segmentation
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentation
 
Text-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter DetectionText-Image Separation in Document Images using Boundary/Perimeter Detection
Text-Image Separation in Document Images using Boundary/Perimeter Detection
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
I07015261
I07015261I07015261
I07015261
 
Image segmentation ajal
Image segmentation ajalImage segmentation ajal
Image segmentation ajal
 
Cj36511514
Cj36511514Cj36511514
Cj36511514
 
Marker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationMarker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical application
 
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
 
Watershed
WatershedWatershed
Watershed
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Ad04603175180
Ad04603175180Ad04603175180
Ad04603175180
 
A Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBPA Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBP
 

Viewers also liked

Intolerance and Oppression in Ivano-Frankivsk
Intolerance and Oppression in Ivano-FrankivskIntolerance and Oppression in Ivano-Frankivsk
Intolerance and Oppression in Ivano-FrankivskLiterature group STAN
 
ASPTUIT infos #Hors série – Juin 2016
ASPTUIT infos #Hors série – Juin 2016ASPTUIT infos #Hors série – Juin 2016
ASPTUIT infos #Hors série – Juin 2016MidiMobilités
 
หอเกียรติยศ
หอเกียรติยศหอเกียรติยศ
หอเกียรติยศleemeanxun
 
หักลดหย่อนภาษี แบบใหม่ 2560
หักลดหย่อนภาษี แบบใหม่ 2560หักลดหย่อนภาษี แบบใหม่ 2560
หักลดหย่อนภาษี แบบใหม่ 2560Titaree Taweepongsapat
 
ประวัติการสังเคราะห์ด้วยแสง
ประวัติการสังเคราะห์ด้วยแสงประวัติการสังเคราะห์ด้วยแสง
ประวัติการสังเคราะห์ด้วยแสงThanyamon Chat.
 
วางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษี
วางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษีวางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษี
วางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษีTitaree Taweepongsapat
 
3класс, мелодии донбасса
3класс, мелодии донбасса3класс, мелодии донбасса
3класс, мелодии донбассаАня Иванова
 
1 августа 2016 Еженедельная встреча Dodo Pizza
1 августа 2016 Еженедельная встреча Dodo Pizza1 августа 2016 Еженедельная встреча Dodo Pizza
1 августа 2016 Еженедельная встреча Dodo PizzaFedor Ovchinnikov
 
Hormone and response plant
Hormone and response plantHormone and response plant
Hormone and response plantThanyamon Chat.
 
как привлечь гостей в ресторан 2 или где моя прибыль карл
как привлечь гостей в ресторан 2 или где моя прибыль карлкак привлечь гостей в ресторан 2 или где моя прибыль карл
как привлечь гостей в ресторан 2 или где моя прибыль карлFoodRussiaSchool
 
Couples for-christ-co-talk-no-3-strengthening-family-life
Couples for-christ-co-talk-no-3-strengthening-family-lifeCouples for-christ-co-talk-no-3-strengthening-family-life
Couples for-christ-co-talk-no-3-strengthening-family-lifeNova Starr
 
Ebook เทรด binary option
Ebook เทรด binary optionEbook เทรด binary option
Ebook เทรด binary optionNarudol Pechsook
 
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...IOSR Journals
 
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure  CommunicationVehicle Obstacles Avoidance Using Vehicle- To Infrastructure  Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure CommunicationIOSR Journals
 
Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...
Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...
Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...IOSR Journals
 

Viewers also liked (20)

Dance
DanceDance
Dance
 
Intolerance and Oppression in Ivano-Frankivsk
Intolerance and Oppression in Ivano-FrankivskIntolerance and Oppression in Ivano-Frankivsk
Intolerance and Oppression in Ivano-Frankivsk
 
ASPTUIT infos #Hors série – Juin 2016
ASPTUIT infos #Hors série – Juin 2016ASPTUIT infos #Hors série – Juin 2016
ASPTUIT infos #Hors série – Juin 2016
 
Slide Design
Slide DesignSlide Design
Slide Design
 
หอเกียรติยศ
หอเกียรติยศหอเกียรติยศ
หอเกียรติยศ
 
ชาดก
ชาดกชาดก
ชาดก
 
ละครไทย
ละครไทยละครไทย
ละครไทย
 
หักลดหย่อนภาษี แบบใหม่ 2560
หักลดหย่อนภาษี แบบใหม่ 2560หักลดหย่อนภาษี แบบใหม่ 2560
หักลดหย่อนภาษี แบบใหม่ 2560
 
ประวัติการสังเคราะห์ด้วยแสง
ประวัติการสังเคราะห์ด้วยแสงประวัติการสังเคราะห์ด้วยแสง
ประวัติการสังเคราะห์ด้วยแสง
 
วางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษี
วางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษีวางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษี
วางแผนการเงินด้วย 4D Link ลงทุน ออมเงิน ประกันชีวิต ลดหย่อนภาษี
 
3класс, мелодии донбасса
3класс, мелодии донбасса3класс, мелодии донбасса
3класс, мелодии донбасса
 
1 августа 2016 Еженедельная встреча Dodo Pizza
1 августа 2016 Еженедельная встреча Dodo Pizza1 августа 2016 Еженедельная встреча Dodo Pizza
1 августа 2016 Еженедельная встреча Dodo Pizza
 
Hormone and response plant
Hormone and response plantHormone and response plant
Hormone and response plant
 
как привлечь гостей в ресторан 2 или где моя прибыль карл
как привлечь гостей в ресторан 2 или где моя прибыль карлкак привлечь гостей в ресторан 2 или где моя прибыль карл
как привлечь гостей в ресторан 2 или где моя прибыль карл
 
Couples for-christ-co-talk-no-3-strengthening-family-life
Couples for-christ-co-talk-no-3-strengthening-family-lifeCouples for-christ-co-talk-no-3-strengthening-family-life
Couples for-christ-co-talk-no-3-strengthening-family-life
 
Ebook เทรด binary option
Ebook เทรด binary optionEbook เทรด binary option
Ebook เทรด binary option
 
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Tec...
 
L010137986
L010137986L010137986
L010137986
 
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure  CommunicationVehicle Obstacles Avoidance Using Vehicle- To Infrastructure  Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
 
Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...
Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...
Interfacing of Java 3D objects for Virtual Physics Lab (VPLab) Setup for enco...
 

Similar to H017416670

IRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET Journal
 
A Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesA Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesIJERA Editor
 
A survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationA survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationIRJET Journal
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageIOSRjournaljce
 
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and  Color QuerysMulti Wavelet for Image Retrival Based On Using Texture and  Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and Color QuerysIOSR Journals
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
 
Orientation Spectral Resolution Coding for Pattern Recognition
Orientation Spectral Resolution Coding for Pattern RecognitionOrientation Spectral Resolution Coding for Pattern Recognition
Orientation Spectral Resolution Coding for Pattern RecognitionIOSRjournaljce
 
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...iosrjce
 
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM ClusteringAn Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM ClusteringEditor IJCATR
 
Multiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo MatchingMultiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo MatchingCSCJournals
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...idescitation
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1KARTHIKEYAN V
 
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...cscpconf
 

Similar to H017416670 (20)

I010634450
I010634450I010634450
I010634450
 
IRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A Review
 
A Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray ImagesA Novel Feature Extraction Scheme for Medical X-Ray Images
A Novel Feature Extraction Scheme for Medical X-Ray Images
 
Ijetr011917
Ijetr011917Ijetr011917
Ijetr011917
 
A survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationA survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classification
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri Image
 
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and  Color QuerysMulti Wavelet for Image Retrival Based On Using Texture and  Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
Orientation Spectral Resolution Coding for Pattern Recognition
Orientation Spectral Resolution Coding for Pattern RecognitionOrientation Spectral Resolution Coding for Pattern Recognition
Orientation Spectral Resolution Coding for Pattern Recognition
 
B017360516
B017360516B017360516
B017360516
 
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
 
B42020710
B42020710B42020710
B42020710
 
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM ClusteringAn Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
 
Multiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo MatchingMultiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo Matching
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
 
557 480-486
557 480-486557 480-486
557 480-486
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
 
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
Content Based Image Retrieval Approach Based on Top-Hat Transform And Modifie...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

H017416670

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. I (July – Aug. 2015), PP 66-70 www.iosrjournals.org DOI: 10.9790/0661-17416670 www.iosrjournals.org 66 | Page Copy-Move Image Forgery Detection Based on Center-Symmetric Local Binary Pattern 1 Vandana Sangwan, 2 Madan Lal 1, 2 Department of Computer Engineering Punjabi University Patiala-147002, (India) Abstract: This paper presents a method to detect copy-move image forgery using CS-LBP (centre symmetric local binary pattern), an extension of basic local binary pattern. In the proposed method, firstly gray level conversion is performed on the given image. Later, the image will be decomposed into fixed sized non- overlapping blocks. Feature extraction can be done using CS- LBP, as this technique is invariant to illumination and rotation. Then distance between the extracted feature vectors is calculated and are sorted lexicographically, and retained only those pairs of blocks that have minimal distances between them. Those minimal distances compared with predefined threshold value serve as the purpose of the copied regions. In the end, post-processing is done using morphological operation and mask is generated for the region detected as forged region. Keywords: Copy-move forgery detection, CS-LBP, feature extraction, Image Tampering. I. Introduction In today’s technological era, digital images are the basic form of conveying information. But the authenticity of these images is a big question for the society. As digital images are used in every field, for example medical imaging, satellite imaging, forensic labs, and journalism for easy visualization, so preserving their originality is a major issue. The popularity of digital images leads to the research in this area. With the help of easy availability of photo editing software, an image can be tampered easily. This image tampering is basically image forgery which is carried out to present false information or modify the real content of the image. There are three main classes of image forgery, namely image retouching, copy-move forgery and image splicing. Image re-touching involves rotation, scaling, contrast enhancement and resizing. In copy-move forgery, an object or portion of the image is copied and pasted on to the other location in the same image so as to hide some information or alter the original content of the image. Here, the basic characteristics of the image remain same such as color, texture. Thirdly, the image splicing is a forgery that is a combination of two or more than two images and results into a new image. Image splicing sources are heterogeneous as contents can be picked from anywhere. The approaches to detect the digital image forgery are classified into two categories, active and passive. In active forgery, some form of watermarking information is present in the image. In passive or blind forgery, there is no such information is hidden in the image. Copy move forgery is an example of passive (blind) forgery which will be detected using center-symmetric local binary pattern scheme. In this paper, a passive method to detect copy move forgery in digital images is proposed. Firstly, we divide the image into overlapping blocks after converting it into gray scale. Then using CS-LBP, feature vectors are to be extracted. This technique overcomes with the drawbacks of basic local binary pattern, such as variant to illumination and it is not too robust on flat image areas i.e. variance of intensity values within the uniform region is very low. CS-LBP preserves better gradient information while preserving distinctiveness, reduce dimensions also. Then lexicographical sorting is done on the feature vectors so as to bring the similar pairs of vectors together for easy recognition. Finally the distance between those vectors is calculated and compared with a threshold value to detect the duplicated region. The rest of the paper is as follows. In section 2, some previously related work has being discussed, section 3 introduces CS-LBP operation. In section 4, proposed algorithm is presented, followed with the results and conclusion in section 6. II. Related Works In this section, we have reviewed the passive methods for detection of copy-move forgery. Among the initial attempts J. Fridrich, D. Soukal and J. Lukas [1] proposed methods to detect copy-move forgery. Discrete cosine transform (DCT) of the image blocks was used and their lexicographical sorting is taken to avoid the computational burden. Once sorted the adjacent identical pair of blocks are considered to be copy-moved blocks. Block matching algorithm was used for balance between performance and complexity. This method suffers from the drawback that it cannot detect small duplicate regions. Mohammad Farukh Hashmi, Vijay Anand, Avinas G Keskar [2] proposed method using un-decimated wavelet transform along with SIFT operator to extract more number of key-points that are matched to detect the copied blocks efficiently. This method gives better results than DWT.
  • 2. Copy-Move Image Forgery Detection Based on Center-Symmetric… DOI: 10.9790/0661-17416670 www.iosrjournals.org 67 | Page Mohammad Hussain et al, [3] showed a method based upon multi-resolution Weber law descriptors (WLD. The suggested multi-resolution WLD extracts the features from chrominance components. An SVM is used for classification and the experimental results showed that the accuracy rate can reach up to 91%. Ning Zheng, Yixing Wang and Ming Xu [4] used a block based method to describe the components extracted using LBP operator which is rotationally invariant. This method gives better results to post-processing and rotation effects. Later on, technique presented by B.L. Shiva kumar et al, [5] using SURF and KD-tree for data matching step results in minimal false matches if images of high resolution being taken. Reza Davarzani, Khashayar Yaghmie et al, [6] presented a method based on multi-resolution local binary pattern. This method is robust to geometric changes and illumination variations of the copied portions. They proposed this method against after various variations such as rotation, blurring, noise addition, and JPEG compression. Motasem Alsawadi et al, [7] introduced a method based on basic local binary pattern with neighborhood clustering to refine the features. This method shows the reduction in matching false regions. Various techniques have been proposed and research is still going on. We tried to put our novel method using variation of LBP, which is CS-LBP, so as to overcome the problems faced with local binary pattern. III. Proposed Algorithm The proposed step-wise methodology is as shown in fig.1. Fig. 1 Block diagram of proposed method
  • 3. Copy-Move Image Forgery Detection Based on Center-Symmetric… DOI: 10.9790/0661-17416670 www.iosrjournals.org 68 | Page Step-1: Gray Scale Conversion Firstly, the given input image is converted to gray scale according to the following equation. Y = 0.299R + 0.587G + 0.114B (1) Where, Y is luminance component. Also a gray scale image is simple to work with. Step-2: Division of image into overlapping blocks The next step is to decompose the image (gray scale image) into fixed sized overlapping blocks. The block size is chosen to be the minimal size of image tampering portion. For an image of size M*N, the total number of blocks formed are given as per the following equation. TB = (M-B+1)(N-B+1) (2) Step-3: Feature extraction using CS-LBP In this phase, features are extracted from the blocks using center-symmetric local binary pattern. CS-LBP is a variant of local binary pattern, which is free from illumination variances and rotation effects. CS-LBP also yields less number of feature vectors as compared to LBP so to make this technique less time consuming, as shown in fig.2. For an image of M*N dimensions, local binary pattern produces 256 different binary patterns, whereas for CS-LBP this number is only 16. Furthermore, robustness on flat image regions is obtained by thresholding the gray-level differences with a small value T. Fig. 2 Extraction of CS-LBP feature vectors The value of the threshold T is 1% of the pixel value CSLBPR,N,T x, y = s ni − ni+(N 2) N 2 −1 i=0 2i , Where s x = 1 x > T 0 otherwise (3) Range in our experiments. Since the region data lies between 0 and 1, T is set to 0.01. The radius is set to 2 and the size of the neighborhood is 8. It should be noted that the gain of CS-LBP over LBP is not only due to the dimensionality reduction, but also to the fact that the CS-LBP captures better the gradient information than the basic LBP. A texture descriptor used in passive forgery detection of copy move forgery should be rotationally invariant, so that if the copied region is rotated before pasting into the same image, it can still be detected. Rotational invariant CSLBP can be express by the Eq. (2): CSLBPN,R ri = min⁡{ROR(CSLBPN, R, i ) | i==0,1…N} Eq. (2) Where, function ROR (z, i) represents circular bitwise rotation of sequence z by i steps. Step-4: Calculation of distance & Lexicographical sorting dij = xi − xj ^2 + yi − yj ^2 where (xi, yi) is the top-left corner’s coordinate of the i-th block. This type of sorting is applied on the rows of the matrix. In the organized list, homogeneous rows are proximate to each other. Step-5: Post-Processing Morphologic operations are applied to fill the holes in the marked regions and remove the isolated points, then output the final result. IV. Results The experiments were carried on Dell laptop having Core2 Duo processor with 2GB RAM using MATLAB 2012a.The database on which we conducted our test contains a total of 220 images, in which 110 images are original images and remaining 110 images are forged images.
  • 4. Copy-Move Image Forgery Detection Based on Center-Symmetric… DOI: 10.9790/0661-17416670 www.iosrjournals.org 69 | Page Also, true positive rate and false positive rate is being calculated to analyze the performance of the proposed system quantitatively. TPR is the percentage of correctly identified forged images while FPR is the percentage of original images falsely identified as forged. Fig. 3: (a) Original image, (b) CS-LBP extracted feature representation,(c) forged image,(d) shows the generation of mask of forged area in the image. Fig. 4: (a) Original image, (b) Feature extraction using CS-LBP, (c) forged image, (d) shows mask generation of the forged portion in image.
  • 5. Copy-Move Image Forgery Detection Based on Center-Symmetric… DOI: 10.9790/0661-17416670 www.iosrjournals.org 70 | Page V. Conclusion A novel CS-LBP interest region descriptor which combines the strengths of the well known SIFT descriptor and the LBP texture operator was proposed. SIFT operator reduces the length of feature vector, so analyzing feature vectors will take less time. This method gives better result than using LBP alone, TPR ratio value is more, while the false positives are decreased using morphological operation. Overall accuracy of the proposed system outperforms simple LBP technique. There can be a scope for future work on this technique such as verifying this technique on other image formats and also different post-processing effects. References [1]. J. Fridrich, B. D. Soukal, and A. J. Lukas, “Detection of copy move forgery in digital images,” in Proceedings of the Digital Forensic Research Workshop, Cleveland, Ohio, USA,August 2003. [2]. Mohammad Farukh Hashmia et al, “Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un- decimated Wavelet Transform and Scale Invariant Feature Transform” 2014 AASRI Conference on Circuit and Signal Processing (CSP 2014). [3]. G. Muhammad, M. Hussain, G. Bebis, “Passive copy move image forgery detection using undecimated dyadic wavelet transform,” Digital Investigation, vol. 9 (1), pp. 49-57, 2012. [4]. Ning Zheng, Yixing Wang and Ming Xu, “A LBP Based Method for Detecting Copy-Move Forgery with Rotation,” Springer Science, pp. 261-267,2013. [5]. B. L. Shivakumar and Lt. Dr. Santhosh. "Detecting copy-move forgery in Digital images: A survey and analysis of current methods," Global Journal of Computer Science and Technology, vol. 10, no. 7, 2010. [6]. R. Davarzani, K. Yaghmaie, S. Mozaffari, and M. Tapak, “Copymove forgery detection using multiresolution local binary patterns”, Forensics Science International, vol. 231, pp. 61-72, 2013. [7]. Motasem Alsawadi et al, “Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering,” IEEE, pp. 249-254, 2013.