s. sunitha 1 r. satish 2ijpres.com/pdf6/21.pdf · s. sunitha 1 pg , communication systems,...

5
INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume III/Issue 1/AUG 2014 IJPRES A NEW IMAGE FORGERY DETECTION FRAMEWORK BASED ON UNDECIMATED DYADIC WAVELET TRANSFORM TECHNIQUE S. SUNITHA 1 PG , Communication Systems, [email protected] SIR C.R.Reddy College Of Engineering R. SATISH 2 M.E. (Ph.D), Assistant Professor, [email protected] SIR C.R.Reddy College Of Engineering ABSTRACT We propose a novel method for copy move image forgery detection by using un-decimated dyadic wavelet transform (DyWT). It is a shift invariant so it is more suitable than discrete wavelet transform (DWT) for analysising data. In algorithm first, we have to decompose the image into approximation (LL), horizontal (LH), vertical (HL) diagonal (HH) sub bands. Then the LL and HH sub bands are divided into overlapping blocks and then calculated the similarity between blocks. The basic idea is that the similarity between the copied and moved blocks from the LL sub band should be high; due to the inconsistency noise the HH sub band should be low in the moved block. Then the pairs of blocks are sorted (ascending or descending) based on high similarity using the LL sub-band and high dissimilarity using the HH sub-band. By using the thresholding, matched pairs are obtained from the sorted list as copied and moved blocks. In experimental results show the effectiveness of the proposed method over competitive methods using DWT and the LL or HH sub-bands only. INTRODUCTION In this paper the main interest is to produce good quality forgeries detection. One of the specific types of forgeries is copy-move forgery, by using the Cloning in Photoshop these can be done very easily. The main aims of the forgery is to cover an unwanted scene in the image, by copying another scene from the same image generally a textured region, and pasting it onto the unwanted region. In Fig. 1, an example of copy-move forgery can be seen, in that the leaves of the trees are duplicated to remove a person from the image. Hence, the goal of copy-move forgery detection techniques is detecting the duplicated image regions. Fig.1.Left is the original, right is the tampered image. However, these regions might not be the exact duplicates, since the tamperer could use retouching tools, add noise, or compress the resulting forgery image. Furthermore, in real life copy-move forgeries, it is very likely for the copied and moved image part to be subjected to slight rotation, scaling, or blurring for better blending purposes. Hence, a copy-move forgery detection technique should be robust to such operations as well. One direct approach to this problem is proposed by Fridrich et al. [1], which essentially performs an exhaustive search by comparing the image to every cyclic-shifted versions of it. Since this approach requires (ܯ) steps for an image sized M ×N, it is not practical. The same authors also proposed to use the autocorrelation properties of the image to detect the duplicated regions. Although this method is more efficient as compared to exhaustive search, it requires the duplicated region to be impractically large to

Upload: others

Post on 03-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: S. SUNITHA 1 R. SATISH 2ijpres.com/pdf6/21.pdf · S. SUNITHA 1 PG , Communication Systems, sandipam.sunitha@gmail.com SIR C.R.Reddy College Of Engineering R. SATISH 2 M.E. (Ph.D),

INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume III/Issue 1/AUG 2014

IJPRES

A NEW IMAGE FORGERY DETECTION FRAMEWORK

BASED ON UNDECIMATED DYADIC WAVELET TRANSFORM TECHNIQUE

S. SUNITHA 1

PG , Communication Systems, [email protected]

SIR C.R.Reddy College Of Engineering

R. SATISH 2

M.E. (Ph.D), Assistant Professor, [email protected]

SIR C.R.Reddy College Of Engineering

ABSTRACT We propose a novel method for copy move image forgery detection by using un-decimated dyadic wavelet transform (DyWT). It is a shift invariant so it is more suitable than discrete wavelet transform (DWT) for analysising data. In algorithm first, we have to decompose the image into approximation (LL), horizontal (LH), vertical (HL) diagonal (HH) sub bands. Then the LL and HH sub bands are divided into overlapping blocks and then calculated the similarity between blocks. The basic idea is that the similarity between the copied and moved blocks from the LL sub band should be high; due to the inconsistency noise the HH sub band should be low in the moved block. Then the pairs of blocks are sorted (ascending or descending) based on high similarity using the LL sub-band and high dissimilarity using the HH sub-band. By using the thresholding, matched pairs are obtained from the sorted list as copied and moved blocks. In experimental results show the effectiveness of the proposed method over competitive methods using DWT and the LL or HH sub-bands only. INTRODUCTION In this paper the main interest is to produce good quality forgeries detection. One of the specific types of forgeries is copy-move forgery, by using the Cloning in Photoshop these can be done very easily. The main aims of the forgery is to cover an unwanted scene in the image, by copying another scene from the same image generally a textured region, and pasting it onto the unwanted region. In Fig. 1, an example of copy-move forgery can be seen, in that the leaves of the

trees are duplicated to remove a person from the image. Hence, the goal of copy-move forgery detection techniques is detecting the duplicated image regions.

Fig.1.Left is the original, right is the tampered image. However, these regions might not be the exact duplicates, since the tamperer could use retouching tools, add noise, or compress the resulting forgery image. Furthermore, in real life copy-move forgeries, it is very likely for the copied and moved image part to be subjected to slight rotation, scaling, or blurring for better blending purposes. Hence, a copy-move forgery detection technique should be robust to such operations as well. One direct approach to this problem is proposed by Fridrich et al.

[1], which essentially performs an exhaustive search by comparing the image to every cyclic-shifted versions of it. Since this approach requires (푀푁) steps for an image sized M ×N, it is not practical. The same authors also proposed to use the autocorrelation properties of the image to detect the duplicated regions. Although this method is more efficient as compared to exhaustive search, it requires the duplicated region to be impractically large to

WEB DESIGN
Typewritten Text
156
Page 2: S. SUNITHA 1 R. SATISH 2ijpres.com/pdf6/21.pdf · S. SUNITHA 1 PG , Communication Systems, sandipam.sunitha@gmail.com SIR C.R.Reddy College Of Engineering R. SATISH 2 M.E. (Ph.D),

INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume III/Issue 1/AUG 2014

IJPRES

perform reliably. In this paper, we propose a blind method for copy move image forgery detection using un-decimated dyadic wavelets. In image forgery Copy move is one of the most commonly used techniques. In this type of forgery, one or more objects in an image are hidden by copying a part and moving it to another place of the same image. Some sophisticated image editing tools make this type of forgery undetectable in the naked eye by applying a ‘soft’ touch at the edges of the moved part. As the color and texture of the moved part is compatible with those of the copied part, it is very difficult to distinguish between these two parts. Also, two or more identical objects in the same original image contribute to the level of difficulty of forgery detection. In Most of the existing copy move forgery detection methods either rely on similarity measurements or noise deviation measurements between the parts (blocks of an image). For detecting copy move forgery. The proposed forgery detection method utilizes two types of information (a) Similarity between copied and moved parts in the smoothed version of the image and (b) Noise inconsistency between these parts caused by the forgery. In this project, we use the dyadic wavelet transform, which is translation invariant. To obtain a smoothed version and noise estimation we use the scaling coefficients (LL1) and wavelet coefficients (HH1). Earlier method We had already seen in previous works on copy move forgery detection Quite a few works have been reported on copy move image forgery detection. A bibliography on blind image forgery detection methods can be found in [1]. a scale and rotation invariant Fourier-Mellin Transform (FMT) and the notion of bloom filters to detect copy move forgery. Their method is computationally efficient and can detect forgery in highly compressed images. We also mention Copy move forgery detection based on blur moment invariants has been proposed [1].In This method can detect duplicated regions degraded by blurring or corrupted with noise. a copy move forgery detection method based on Scale Invariant Feature Transform (SIFT) descriptors [2]. After extracting the descriptors of different regions, they match them with each other to find possible forgery in images. A sorted neighborhood approach based on DWT and Singular Value Decomposition (SVD) has been proposed [2]In this method, first DWT is applied to the image after that SVD is used on low-frequency components to reduce their dimension. SV vectors are then lexicographically sorted, where duplicated blocks will be close in the sorted list. In [4] we use log-polar coordinates to obtain a one dimensional

descriptor invariant to reflection, rotation, and scaling for detecting duplicated regions. The Discrete Cosine Transform (DCT) was used in [5]. They use lexicographic sorting after extracting DCT coefficients of each block in a forgery image. An another computationally efficient method based on Principal Component Analysis (PCA) was presented[3]. And also the DWT and phase correlation based method . Their algorithm is based on pixel matching to locate copy move regions. Sutcu et al proposed tamper detection based on the regularity of wavelet coefficients. In their method, they used un-decimated DWT. Regularity in blurriness or sharpness is measured in the decay of wavelet coefficients across scales. Most of the above methods suffer from false positives rate. Therefore, human interpretation is necessary to obtain the correct result. Present frame work, Wavelet transform is a multi-resolution technique that has been preferred over Fourier transform in the field of image processing. However, Fourier transform, wavelet transform not only can extract frequency (scale) information, but also can give location information. Wavelet transform decomposes an image into sub bands, which is refers as approximation, and different directional detail sub bands. In this pepper we propose a robust blind copy move image forgery detection method using un-decimated dyadic wavelet transform (DyWT).In that we extracting low frequency component (approximate) LL1 and high frequency component (detail) HH1 at scale one, a similarity measure is applied between the blocks in LL1 and HH1 separately. A decision is made based on the similarity between blocks in LL1 and dissimilarity between the blocks in HH1. A preliminary explanation of this method is given in our previous. 3.1. Dyadic wavelet transform (DyWT) Many previous methods on copy move forgery detection use the DWT method . For pattern recognition, signal representation (descriptors) must be shift-invariant, because when a pattern is shifted, the descriptors are also shifted not modified. Let us assume, in copy-move image forgery, the copied and the pasted parts may not be poisoned in the same place of two blocks (see Fig. 1). If the descriptors are not shift-invariant, they will produce two different representations for these two blocks and thereby miss the forgery detection. DWT is not shift-invariant because of,it involves down sampling. In DWT, during the convolutions in the decomposition stage only every second wavelet coefficients is considered. It is obtained by down-sampling by a factor of two (reduce the size by two in every direction) after the convolution. Due to this procedure, DWT is referred to as decimated. Because of its loss of shift-invariance, DWT exhibits pseudo-Gibbs phenomena which is proposed in around singularities and does not give optimal results for signal analysis applications like edge detection, denoising, texture analysis. To overcome this drawback of DWT, introduced the DyWT, which is shift invariant technique. In this case, the wavelet transform does not involve down sampling and the number of wavelet

WEB DESIGN
Typewritten Text
157
Page 3: S. SUNITHA 1 R. SATISH 2ijpres.com/pdf6/21.pdf · S. SUNITHA 1 PG , Communication Systems, sandipam.sunitha@gmail.com SIR C.R.Reddy College Of Engineering R. SATISH 2 M.E. (Ph.D),

INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume III/Issue 1/AUG 2014

IJPRES

푐 [푛] = ℎ[푘]푐 [푛 + 2 푘]

푑 [푛] = 푔[푘]푐 [푛 + 2 푘]

coefficients does not shrink between the scales like in DWT. Due to this characteristic, the DyWT is un-decimated. proved that DyWT has better texture analysis and detection performance than the DWT.

A small shift in input image may result in big difference in DWT coefficients at different scales, which may produce different feature vectors for copied and pasted objects with little spatial shift. Let I be the image to be decomposed, and h[k] and g[k] be the scaling (lowpass) and wavelet (high pass) filters. The DyWT of an image can be computed using the following atrous algorithm. Start at scale j ¼ 0, and take I0 ¼ I, and compute the scaling and wavelet coefficients at scales j ¼ 1, 2, ., J using Eqs. (1) and (2):

Let h[k] and g[k] be the filters obtained by inserting

2j zeros between the terms of h[k] and g[k]. Then we can perform DyWT using filtering as follows :

Start with I, which is assumed to be at scale zero, i.e., I0 ¼ I.

To obtain the scaling and wavelet coefficients scales j ¼ 1, 2, ., J filter 퐼 with ℎ [푘] filter 퐼 with 푔 [푘]

Fig .2. one level decomposition of DyWT The above figure (Fig. 2) illustrates this algorithm is one level decomposition. As mentioned, there is no down-sampling involved in DyWT. In the wavelet transform, I&J is called the low pass sub band (L) and Dj are called the high pass sub-bands (H) respectively. In the case of two dimensional signals like images, we find four sub-bands LL, LH, HL, and HH at each scale of the decomposition. The size of each of these sub-bands is the same as the original image .We can decompose a 2D image using DyWT along rows and columns which is show in Fig. 3.

Fig.3.Two level decomposition of DyWT Steps of the proposed method Fig. 4 shows the steps involved in the proposed copy move image forgery detection method. In the proposed method, first, the image in question is decomposed using DyWT up to scale one.We use only LL1 and HH1 for further processing. The LL1 subband is an approximation of the

ℎ [푘]

ℎ [푘]

푔 [푘]

푔 [푘]

ℎ [푘]

푔 [푘]

ℎ [푘]

푔 [푘]

DyWT

Divide into over lapping block

Divided into overlapping block

Calculate Euclidean distance between every pair of block

Calculate Euclidean distance between every pair of block

Sort in descending order(List 2)

Sort in ascending order(List 1)

Find match using threshold between the sorted List

Decision

LL HH

Input image

WEB DESIGN
Typewritten Text
158
Page 4: S. SUNITHA 1 R. SATISH 2ijpres.com/pdf6/21.pdf · S. SUNITHA 1 PG , Communication Systems, sandipam.sunitha@gmail.com SIR C.R.Reddy College Of Engineering R. SATISH 2 M.E. (Ph.D),

INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume III/Issue 1/AUG 2014

IJPRES

Fig. 4. Flowchart of the proposed copy move image forgery detection. image which is better for duplicate identification. LL1 is obtained by applying low pass filter both horizontally and vertically, and thereby represent low frequency component of the input image. The HH1 subband encodes noise present in the image, which is distorted while performing the forgery. HH1 actually contains high frequency information, which consists of mostly due to noise and sharp edges. HH1 is obtained after applying high pass filter both horizontally and vertically. Fig. 5. Flowchart of the proposed copy move image forgery detection using three color arrays (R, G, and B) (For interpretation of the references to color in this figure legend, the reader is referred to the web version of this article.).

푑(푝, 푞) = 1/푁 (푝 − 푞 )

The LL1 and HH1 sub-bands are then divided into 16 X16 pixel blocks with 8 pixel overlapping in both row and column .We assume that copy move forgery is performed in at least 16X 16 pixel. Copied and moved blocks in LL1 should exhibit similarity between them. However, while performing the image forgery, the noise pattern, which is an intrinsic fingerprint of an image, is distorted. This is true for most copy move forgery, where traces of forgery are tried to hide by smoothing the resulted edges or adding some noise around. Therefore, copied and moved blocks should exhibit high dissimilarity between them in the HH1 sub-band. We calculate the similarity using the Euclidean distance

RESULTS In the proposed method was evaluated on several test images that were forged using copy-move operation. We perform a series of tests using different types of forgery. In this project we are reported the results in three parameters, which are, (1) False positive: the system detects genuine image as forged image. (2) False negative: the system detects forged image as genuine image. (3) Accuracy: the ratio between correctly detected images and the total number of images. 4.1. Copy-move forgery without rotation and with JPEG Q factor of 100 There were 10 different image sources and the forgeries on these sources were done using Adobe Photoshop tool. The test images, both original and forged. All the image sizes are 256X256. The forged images are in JPEG format with Q (quality) factor of 100. Fig. 7 shows an example using the proposed method with a color copy move forged image. The image was forged by copying the right red flower and moving it to the middle position (i.e., middle red flower is a copy of right red flower). Fig. 7 (c) shows the output of the proposed method. We tested the proposed method on several test images with different copy move forgery. There were a total of 574 copied 16X16 blocks (i.e., a total of 574 þ 574 ¼1148 blocks of copy-move). We considered a block as forged if more than 50% of that block area was copied/moved. The effect of thresholds Th1 and Th2 on false positive rate is shown in Fig. 5. The false positive rates in this figure are obtained when the input image is converted into gray scale. From the figure, we can see that when the values of Th1 and Th2 are increased, false positive rate is also increased. The false positive rate is greater than 10% when the value of the pair <Th1, Th2> is higher than <0.5, 0.8> and <0.7, 0.7>. False positive rate has the similar behavior when the proposed method is applied on

Sort in ascending order(List 1)

Sort in ascending order(List 1)

Find match using threshold bet

Is the matched pairs are similar in all three same colour

R G B

DyWT

Divide into over lapping block

Divide into over lapping block

Calculate Euclidean distance between every pair of block

Calculate Euclidean distance between every pair of block

Input colour image

WEB DESIGN
Typewritten Text
159
Page 5: S. SUNITHA 1 R. SATISH 2ijpres.com/pdf6/21.pdf · S. SUNITHA 1 PG , Communication Systems, sandipam.sunitha@gmail.com SIR C.R.Reddy College Of Engineering R. SATISH 2 M.E. (Ph.D),

INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume III/Issue 1/AUG 2014

IJPRES

the three color arrays.

Fig. 6. False positive rates (%) for different threshold values of Th1 and Th2 with the proposed method.

(a)

(b) (c) Fig. 7. (a) The original image. (b) The forged image where the middle red flower is a copy of the right red flower. (c) The result of the proposed method.

Conclusion In this paper we are proposed a copy move image forgery detection method based on DyWT .in this we uses both the LL and HH Sub-bands to find similarities and dissimilarities between the blocks of an image for robust detection of copy move. The method was evaluated in three test cases: (1) Fixed size images and forgery without rotation, (2) Different size images and forgery with or without rotation, (3) Different Q factors JPEG images. In the experiments. The proposed method performed significantly better than some of the earlier methods in all the three cases. In features may include different order moments and transition probabilities between the coefficients of LL and HH. In a future study, we wish to extract some statistical features from each block in LL and HH, and compute the similarity. REFERENCES [1] Mahdian B, Saic S. Detection of copy-move forgery using a method based on blur moment invariants. Forensic Science International 2007; 171(2–3):180–9.. [2] Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm. In: Proc. IEEE Pacific-Asia workshop on computational Intell. Industrial app; 2008. p. 272–6. [3] Chen M, Fridrich J, Goljan M, Lukas J. Determining image Origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 2008;3(1):74–90. [4] Solario SB, Nandi AK. Passive forensic method for detecting duplicated regions affected by reflection, rotation, and scaling. In: Proc. EUSIPCO09; 2009. p. 824–8. [5] Farid H. Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security 009;4(1):154–60. [6] Farid H. Image forgery detection – a survey. IEEE Signal Processing Magazine March 2009;5:16–25. [7] Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images. In: Proc. digital forensic research workshop.IEEE Computer Society; August 2003. p. 55–61.

WEB DESIGN
Typewritten Text
160