Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform

Similar documents
Advanced Digital Image Forgery Detection by Using SIFT

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

Copy-Move Forgery Detection using DCT and SIFT

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University

A Review on Copy-Move Forgery Detection Techniques Based on DCT and DWT

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Robust Image Watermarking based on DCT-DWT- SVD Method

Copy-Move Image Forgery Detection Based on Center-Symmetric Local Binary Pattern

Gabor Filter HOG Based Copy Move Forgery Detection

Digital Watermarking with Copyright Authentication for Image Communication

Keywords Digital Image Forgery, Forgery Detection, Transform Domain, Phase Correlation, Noise Variation

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Fingerprint Image Compression

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Image Copy Move Forgery Detection using Block Representing Method

A Key-Point Based Robust Algorithm for Detecting Cloning Forgery

Invisible Watermarking Using Eludician Distance and DWT Technique

Passive Approach for Copy-Move Forgery Detection for Digital Image

Detecting Forgery in Duplicated Region using Keypoint Matching

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

DWT-SVD based Multiple Watermarking Techniques

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Copy-Move Image Forgery Detection using Ring Projection and Modi_ed Fast Discrete Haar Wavelet Transform. Mohd Dilshad Ansari and Satya Prakash Ghrera

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

IMAGE PROCESSING USING DISCRETE WAVELET TRANSFORM

Digital watermarking techniques for JPEG2000 scalable image coding

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

TEXT DETECTION AND RECOGNITION IN CAMERA BASED IMAGES

Digital Image Forensics in Multimedia Security: A Review

Detection of Region Duplication in Digital Images: A Digital Forensic Approach Jatin Wadhwa (111CS0165) Talib Ahemad (111cs0511)

Implementation and Comparison of Watermarking Algorithms using DWT

Robust biometric image watermarking for fingerprint and face template protection

Anushree U. Tembe 1, Supriya S. Thombre 2 ABSTRACT I. INTRODUCTION. Department of Computer Science & Engineering, YCCE, Nagpur, Maharashtra, India

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Digital Image Watermarking Using DWT Based DCT Technique

HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION

Generation of Digital Watermarked Anaglyph 3D Image Using DWT

Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery

An Improved Performance of Watermarking In DWT Domain Using SVD

International Journal of Advanced Research in Computer Science and Software Engineering

Copyright Detection System for Videos Using TIRI-DCT Algorithm

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Redundant Data Elimination for Image Compression and Internet Transmission using MATLAB

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Comparison of wavelet based watermarking techniques Using SVD

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Using Shift Number Coding with Wavelet Transform for Image Compression

IMAGE COMPRESSION USING HYBRID TRANSFORM TECHNIQUE

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

CORRELATION BASED CAR NUMBER PLATE EXTRACTION SYSTEM

FEATURE EXTRACTION TECHNIQUES FOR IMAGE RETRIEVAL USING HAAR AND GLCM

Adaptive Quantization for Video Compression in Frequency Domain

Simulative Comparison of Copy- Move Forgery Detection Methods for Digital Images

Document Text Extraction from Document Images Using Haar Discrete Wavelet Transform

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology

FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M.

Implementation of ContourLet Transform For Copyright Protection of Color Images

APPM 2360 Project 2 Due Nov. 3 at 5:00 PM in D2L

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

An Improved Blind Watermarking Scheme in Wavelet Domain

QR Code Watermarking Algorithm based on Wavelet Transform

A Modified SVD-DCT Method for Enhancement of Low Contrast Satellite Images

Attack Detection in Watermarked Images with PSNR and RGB Intensity

Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture

Image Manipulation in MATLAB Due Monday, July 17 at 5:00 PM

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

HYBRID IMAGE COMPRESSION TECHNIQUE

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

DWT-SVD Based Digital Image Watermarking Using GA

Copy Move Forgery Detection through Graph Neighborhood Degree

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

PRINCIPAL COMPONENT ANALYSIS IMAGE DENOISING USING LOCAL PIXEL GROUPING

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Improved Qualitative Color Image Steganography Based on DWT

Metamorphosis of High Capacity Steganography Schemes

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique

A combined fractal and wavelet image compression approach

EDGE DETECTION IN MEDICAL IMAGES USING THE WAVELET TRANSFORM

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.


DESIGNING A REAL TIME SYSTEM FOR CAR NUMBER DETECTION USING DISCRETE HOPFIELD NETWORK

Texture Analysis of Painted Strokes 1) Martin Lettner, Paul Kammerer, Robert Sablatnig

Handwritten Script Recognition at Block Level

Transcription:

Reduced Time Complexity for of Copy-Move Forgery Using Discrete Wavelet Transform Saiqa Khan Computer Engineering Dept., M.H Saboo Siddik College Of Engg., Mumbai, India Arun Kulkarni Information Technology Dept., Thadomal Shahani Engineering College., Mumbai, India ABSTRACT As result of powerful image processing tools, digital image forgeries have already become a serious social problem. In this paper we describe an effective method to detect Copy-Move forgery in digital images. Our technique works by first applying DWT (Discrete Wavelet Transform) to the input image to yield a reduced dimensional representation [1]. Then the compressed image is divided into overlapping blocks. These blocks are then sorted and duplicated blocks are identified using Phase Correlation as similarity criterion. Due to DWT usage, detection is first carried out on lowest level image representation. This approach drastically reduces the time needed for the detection process and increases accuracy of detection process. General Terms Image processing, Digital image forgery Keywords Copy-Move forgery, digital tampering, digital image forensics, DWT, phase correlation 1. INTRODUCTION Sophisticated digital cameras and photo-editing software packages are becoming ubiquitous. As a result, it has become relatively easy to manipulate digital images and to create forgeries that are difficult to distinguish from authentic photographs. There has been some effort in the digital signature and watermarking communities to detect and locate image manipulation. But the limitation in digital signature or watermarking technology is that the media data must be preprocessed when it is established, such as calculating hash values, or embedding watermark in the images. This makes the scope of their application greatly constrained. A special type of forgery is Copy-Move forgery, in which part of images is copied and pasted to conceal a person or object in the scene or sometimes to clone an object. Because the copied part come from the same image, its important properties, such as noise, color palette and texture, will be compatible with the rest of the image and thus will be more difficult to distinguish and detect these parts. In Figure1, an example of copy-move forgery can be seen; where the original image (Figure 1(a)) has one bird flying in the sky whereas in forged one (Figure (b)), Cloning tool of Photoshop has been used to show that there are two birds flying (a) Figure 1. Example of Copy-Move forgery (a) original image (b) tampered image in the sky. Here, one of the bird flying in the sky has been cloned with the help of Adobe Photoshop Cloning tool. Several researchers have developed techniques for detecting this form of image forgery. Since the key characteristics of Copy-Move forgery is that the copied part and the pasted part are in the same image, method to detect this forgery is exhaustive search, but it is computationally complex and more time is needed for detection. Therefore many researchers use blocking approaches to increase the speed of operation process [2]. Fridrich proposes an effective way to detect copy-move forgery blocks in a single image. The image blocks are represented by quantized DCT (Discrete Cosine Transform) coefficients, and a lexicographic sort is adopted to detect the duplicated image blocks [3]. A similar detection method is proposed in [4], in which the image blocks are reduced in dimension by using Principal Component Analysis (PCA). But in their algorithms, blocks are directly extracted from the original image, resulting in a large number of blocks, thus affecting the efficiency of detection algorithm. Li developed a sorted neighborhood method based on DWT (Discrete Wavelet Transform) and SVD (Singular Value Decomposition) [5].The DWT and SVD method suffers from the drawback that the computation of SVD takes lot of time and it is computationally complex. To further reduce the amount of computation, this paper proposes wavelet based approach where the usage of wavelet transform for compression of tampered images have been tested and phase correlation is used as similarity checking criterion for identifying duplicity of overlapping blocks formed from the tampered images. The multiresolution analysis feature of DWT has been explored. (b) 31

2. PROPOSED ALGORITHM The work on of Copy-Move forgery in digital images is implemented in two phases as described below. 2.1 of Reference and Match Blocks This phase deals with detection of reference and matching blocks on the lowest level of wavelet transform compressed image as shown in Figure 2 [1]. RGB image Gray scale conversion Wavelet Transform 2.3 Discrete Wavelet Transform Wavelet decomposition of the images is used due to its inherent multiresolution characteristics. The basic idea of using Discrete Wavelet Transform is to reduce the size of the image at each level, e.g., a square image of size 2 j 2 j pixels at level L reduces to size 2 j/2 2 j/2 pixels at level L+1. Methods can differ in the type of the wavelet applied. At each level, the image is decomposed into four sub images. The sub images are labeled LL, LH, HL and HH. LL corresponds to the coarse level coefficients or the approximation image. This image is used for further decomposition. LH, HL and HH correspond to the vertical, horizontal and diagonal components of the image respectively. An example image along with its wavelet transform applied up to level 3 is shown in Figure 4. Overlapping block pixels into a matrix conversion Maximum contrast blocks selection contrast blocks selection Matrix sorting Phase correlation calculation between rows Candidate block co-ordinates into a new matrix Candidate detected blocks Figure 2. of Reference and Match Blocks 2.2 Comparison of Reference and Match blocks This phase deals with checking on different DWT levels to produce more robust output as shown in Figure 3. Candidate blocks Figure 4. An image and its Wavelet Transform These sub images can be combined together to restore the previous image which was decomposed. Due to this, DWTs are used for iterative comparison of matching blocks. If the number of levels used for decomposition is L, then the matching performed on the LL image at level L is denoted by LL L. Figure 5 shows the image pyramid. At each iteration, the images used for matching of overlapping blocks are LL L, LL L-1,..LL 1..LL L image is the image at the lowest (coarse) resolution.ll L image is used for matching of blocks and then these matched blocks are carried to the next higher level. Final match is performed on the original image itself. Candidate blocks as regions in LL L-1 image LL image Region dividing into blocks and comparison Region comparison directly on LL L-2 image Figure 5. Image pyramid Region comparison directly on original image and duplicated blocks detection Figure 3. Comparison of reference and matching blocks at all pyramid level 2.4 Phase Correlation This is an elegant method used for template matching applications [5]. Figure 6 shows phase correlation between two blocks. 32

Figure 6. Phase correlation between two blocks The ratio R between two images img1 and img2 is calculated as follows: R = F (img1) conj (F (img2)) F (img1) conj (F (img2)) (1) where F is the Fourier Transform, and conj is the complex conjugate. The inverse Fourier Transform of R is the phase correlation ρ. Figure 6 shows phase correlation between two blocks. 2.5 Algorithm for of Region Duplication Forgery In our approach, detection of Copy Move forgery is done in two phases. In the first phase, the exhaustive search for identical blocks is done only on the reduced dimension representation of the image and in the second phase detected blocks of the first phase are compared at different DWT levels. 2.5.1 Algorithm for of Reference and Match Blocks 1. Read the image selected by the user as input. 2. If the input image is not a gray scale image then convert it into a gray scale image. 3. Apply wavelet transform up to specified level L to the gray image. 4. For each overlapping b b block in the LL L image 4.1. Form a matrix A of dimension b 2 columns and (Mb+1) (N-b+1) rows by extracting the resulting pixel values by rows into a row of A. 4.2. Form another matrix B same as A with two additional columns for storing top-left co-ordinates. 5. End 6. Ignore blocks where contrast is minimum. 7. Sort matrix A lexicographically. 8. For each row of A 8.1.Compute the phase correlation for the block corresponding to the current row with the blocks corresponding to p rows above and below the current row. 8.2. If the computed maximum phase correlation value exceeds a preset threshold value t, then store the top left coordinates of the corresponding reference block and the matching block from B matrix in a new row of a matrix. 9. End 2.5.2 Algorithm for Comparison of Reference and Match Blocks 1. For LL L-1 level in the image pyramid 1.1. For each row of the matrix 1.1.1. Form a reference region by padding m pixels on all the sides of the b b reference block. 1.1.2. Form a matching region by padding m pixels on all the sides of the b b matching block. 1.1.3. For each b b overlapping of the reference region. 1.1.3.1. Find corresponding match in matching region based on Phase correlation but search process has to be opted for selected part of matching region. 1.1.3.2. If the computed maximum phase correlation value exceeds a preset threshold value, then the top left coordinates of the corresponding reference block and the matching block are stored in a new row of a matrix. 1.2. End 2. End 3. For LL L-2 level to original image in the image pyramid 3.1. For each row of the matrix 3.1.1. Form a reference region by padding m pixels on all the sides of the b b reference block. 3.1.2. Form a matching region by padding m pixels on all the sides of the b b matching block. 3.1.3. Compare them using Phase Correlation. 3.1.4. If the computed maximum phase correlation value exceeds a preset threshold value, then store the top left coordinates of the corresponding reference block and the matching block in a new row of a matrix. 3.2. End 4. End 5. Plot the blocks as copied and pasted regions on the given input image. 3. EXPERIMENTAL RESULTS AND EVALUATION In our experiments, we have tampered several internet downloaded images by copying and pasting one image block over another, in the same image. Our data set consists of data set I which has 55 forged images, data set II having 10 noisy images, data set III which has 10 images saved with low JPEG levels and data set IV having 25 original images with natural duplication in them. The detected results over tampered bird image for all DWT levels are shown in Figure 7. 33

To examine how this method performs under the blurring modification performed after the forgery is shown in Figure 10. (d) (e) (f) Figure 7.Forgery detection result (a) tampered image (b) detection result on LL L level image (c) detection result onll L-1 level image (d) detection result on LL L-2 level image (e) detection result on tampered image(f)duplication map of detected result The Figure 7(f) shows the duplication map for the detected result. The duplication map gives clue about the number of pixels which are been copied and pasted to perform forgery. The white and gray colors have been used to show copied and its corresponding pasted regions. This can be used to assess the applicability of the proposed method when many pixels have been cloned in an image. To see how this method performs under the noise modifications, we have used US currency note image to illustrate detection as shown in Figure 8. (d) (e) (f) Figure 8. Forgery detection result (a) original image (b) tampered image(c) detection result with 15% normal noise(d) detection result with 25% normal noise(e) detection result with 35% normal noise (f) detection result with 45% normal noise The Figure 9 shows the performance of the algorithm for the image having more than one duplicated regions. Figure 10. Forgery detection result (a) original image (b) tampered blurred image (c) detection result 3.1 Comparison with Existing Approaches In this section, we shall compare our approach with other existing one. The image used for the comparison is of size 128 128. Table 1 lists the comparison results. Table 1. Comparison Results of the Two Approaches Algorithm Image representation Block size Block number Feature dimension Popescu[4] PCA 16 16 12769 128 Proposed DWT 8 8 3249 64 As is well known, the sort matrix scale is the major factor affecting the computation complexity. The total amount of its rows denotes block number, and the total amount of columns denote feature dimension. In our approach selected block size for 128 128 size image is 8 8 on DWT first level. Then, it will become 16 16 on original image but sorted matrix size is less because of region comparisons. From Table I, it is obvious that the sort matrix in our approach is smaller in size than those in other two approaches under the same experimental condition. 3.2 Effect of the normal noise values on the detection time The first comparative test evaluates the performance of the algorithm under different normal noise values. The test image is saved in JPEG format. The original test image with forged image and its corresponding results for PCA and our method is shown in Figure 11. For this testing, the block size, b, was set dynamically based on image size. The value of block size is doubled in the next level of DWT and this process of block value continues until final image (highest resolution) is reached for final detection. The normal noise (Nn) values added after forgery in Adobe Photoshop varied from 0 <= Nn <= 12 measured in percentage. The Time for detection (Td) under different normal noise values are computed and plotted in Figure 12. Figure 9. Forgery detection result (a) original image (b) tampered image having more than one duplicated result 34

Time (seconds) Time(seconds) International Journal of Computer Applications (0975 8887) (a) (b) Time Comparison for Birds Image 500 400 300 200 100 0 2 4 6 8 JPEG quality levels(%) Time for PCA Time for DWT (c) (d) Figure 13. time comparison under different JPEG quality (Jq) levels Figure 11. Forgery detection result (a) original bird image (b) tampered image (c) detection result for PCA method (d) detection result for DWT based method Time Comparison for Birds image 400 300 200 100 0 0 4 8 12 Normal noise levels(%) Time for PCA Time for DWT From the results of Figure 12 and Figure 13, we can find that the proposed method works soundly for different retouching scenarios like JPEG quality level changes and normal noise change values. It has been observed that when the amount of noise adding increases its corresponding time for detection decreases whereas for increased JPEG quality levels it s time for detection also increases. 3.4 on an image having natural duplication The applicability of any copy-move forgery algorithm depends highly upon the requirement that it should detect forged duplicated regions in an image but it should not detect regions which have natural or original duplication in them. The Figure 14 shows the result of detection using PCA and DWT based proposed method for twin tower image where the image has original duplicated region in it. Figure 12. time comparison under different normal noise (Nn) levels 3.3 Effect of the JPEG quality levels on the detection time The second comparative test evaluates the performance of the algorithm for tampered images saved under different JPEG quality levels (Jq). The JPEG quality levels varied from 2<= Jq <= 8 measured in percentage. The Time for detection (Td) under different JPEG quality level values are computed and plotted in Figure 13. The JPEG quality level variation is one form of retouching applied after forgery is performed. It is significantly important to check applicability of the proposed method for these kind of retouching techniques. Figure 14. Forgery detection result (a) original twin tower image (b) detection result for PCA method (d) detection result for DWT based method 3.5. Qualitative samples based on realistic forgeries The following three credible forgeries have been created to qualitatively test the algorithm. Figure 15 shows the duplicate 35

regions identified where first row shows the result for normal noise corrupted image. 6. CONCLUSIONS In this paper an algorithm for detecting copy move forgery using wavelet transforms is proposed. Our algorithm has lower computational complexity that means this is optimized version of the algorithm proposed in [1] since exhaustive search for identical blocks is performed only on the image at the lowest resolution. This algorithm works even for the images where the attacker has made detection more difficult by applying noise and JPEG quality level changes. Experiments and analysis prove that the proposed method have nice robustness to common post processing operations. Although duplicated regions with rotation through angles and scaled regions cannot be detected. In the future, we would like to search for some mechanism to deal with these problems. In addition to this, the same can be extended to work on videos where search for duplicated blocks has to perform on multiple image frames. With the development of digital forgery technology, digital detection keeping place with digital tampering is difficult only depending on single digital forensic tool. The future digital forensic direction would be multiplex forensic tools in conjunction with awareness and sensible policy and law to create convincing digital forgeries. 7. REFERENCES [1] Myna.A.N., M.G.Venkateshmurthy, C.G.Patil of Region Duplication Forgery In Digital Images Using Wavelets and Log-polar Mapping, in Proc. of International Conference on Computational Intelligence and Multimedia Applications,Volume 3, 13-15,pp.371 377, July 2-6, 2007. Sarah A. Summers, Sarah C. Wahl Multimedia Security [2] and Forensics Authentication of Digital Images http://cs.uccs.edu/~cs525/studentproj/proj52006/sasumme r/doc/cs525projsummerswahl.doc [3] J. Fridrich, D. Soukal, and J. Lukas, of copymove forgery in digital images, Proceedings of the Digital Forensic Research Workshop. Cleveland OH, USA, 2003. [4] A.C.Popescu and H.Farid, Exposing digital forgeries by detecting duplicated image regions, Dartmouth College, Hanover, New Hampshire, USA: TR2004-515, 2004. [5] G.Li, Q.Wu, D.Tu, and Shaojie Sun, A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD, IEEE International Conference on Multimedia & Expo, 2007. [6] Talbert, D. A. and Fisher, D., An empirical analysis of techniques for constructing and searching k-dimensional trees, in ACM SIGKD international conference on Knowledge discovery and data mining, pp 26-33, 2000. [7] Jung, I-K. and Lacroix, S., A Robust Interest Point Matching Algorithm, in International Conference on Computer Vision. 2001. [8] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, Digital Image Processing using MATLAB,Second Edition, Pearson Publications, 2004. [9] (2010, April.). Phase correlation [online].available: http //en.wikipedia.org/wiki/phase correlation (a) Original Image (b) Forged Image (c) Result for DWT method (d) Result for PCA method Figure 15. Credible Forgeries Created for Qualitative Analysis of the proposed algorithm 36