CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Detection of Copy-Move Forgery Exploiting LBP Features with Discrete Wavelet Transform

by Anuja Dixit, Rahul Dixit, R. K. Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 153 - Number 3
Year of Publication: 2016
Authors: Anuja Dixit, Rahul Dixit, R. K. Gupta

Anuja Dixit, Rahul Dixit, R. K. Gupta . Detection of Copy-Move Forgery Exploiting LBP Features with Discrete Wavelet Transform. International Journal of Computer Applications. 153, 3 ( Nov 2016), 1-10. DOI=10.5120/ijca2016911979

@article{ 10.5120/ijca2016911979,
author = { Anuja Dixit, Rahul Dixit, R. K. Gupta },
title = { Detection of Copy-Move Forgery Exploiting LBP Features with Discrete Wavelet Transform },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 153 },
number = { 3 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-10 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016911979 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:58:06.456572+05:30
%A Anuja Dixit
%A Rahul Dixit
%A R. K. Gupta
%T Detection of Copy-Move Forgery Exploiting LBP Features with Discrete Wavelet Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 153
%N 3
%P 1-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Copy-move forgery is being used at various fields to hide significant information or to append additional information in image. Image forgery results in false interpretations. In this forgery, one section of image is copied and then it is pasted over the same image at different location. Although, various techniques are suggested by researchers but finding forged section of varying size and located at different locations on image is complicated. To resolve such problems we introduce a new hybrid approach for finding copy-move forgery based on Discrete Wavelet Transform with Local Binary Pattern. At First, image is moldered into three color components. Discrete Wavelet Transform is applied over the image which results in four sub bands. Approximation sub image contains low frequency components having maximum information. LL subimage is divided in overlapping blocks. Local Binary Pattern is calculated for blocks to generate descriptors to match similar blocks. Shift vectors are computed to find group of block pairs with similar shifting. It is observed by our experimental results that proposed method can efficiently detect manipulated images having different forgery size with high detection accuracy and low false positive rate as comparison to other state-of-the-art.

  1. J. Redi, W. Taktak and J. Dugelay, “Digital Image Forensics: A Booklet for Beginners,” Multimedia Tools and Applications, vol. 51, no. 1, pp. 133-162, January 2011.
  2. S. A. Alnesarawi and G. Sulong, “A Novel Approach for Detection of Copy Move Forgery using Completed Robust Local Binary Pattern,” Journal of Information Hiding and Multimedia Signal Processing, vol.6, no. 2, pp. 351-364, March 2015.
  3. S. Sadeghi, H.A. Jalab and S. Dadkhah, “Efficient Copy-Move Forgery Detection for Digital Images,” World Academy of Science, Engineering & Technology, vol. 71, pp. 543-546, November 2012.
  4. L. Jing and C. Shao, “Image Copy-Move Forgery Detecting Based on Local Invariant Feature,” Journal of Multimedia, vol. 7, no. 1, pp. 90-97, February 2012.
  5. V. Christlein, C. Riess and E. Angelopoulou, "A Study on Features for the Detection of Copy-Move Forgeries," Proc. Information Security Solution Europe (ISSE), vol. 2010, pp. 105-116, October 2010.
  6. J. A. Redi, W. Taktak, J. Dugelay, “Image splicing detection using 2-d phase congruency and statistical moments of characteristic function,” Society of photo optical instrumentation engineers (SPIE) conference, 2007.
  7. V. Savchenko, W. Kojekine, N. Unno, “A practical image retouching method,” Proceedings of First International Symposium on Cyber Worlds, pp. 480-487, 2002.
  8. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker "Digital Watermarking and Steganography, Morgan Kaufmann Publishers, 2008.
  9. L. Chun-Shien, H. Liao, "Structural digital signature for image authentication: an incidental distortionresistant scheme, IEEE Transactions on Multimedia, vol.5, no.2, pp. 161-173, 2003.
  10. A. J. Fridrich, B. D. Soukal and A. J. Lukas, ”Detection of Copy-Move Forgery in Digital Images,” in Proceedings of Digital Forensic Research Workshop, 2003.
  11. J. Zhang, Z. Feng and Y. Su, “A New Approach for Detecting Copy-Move Forgery in Digital Images,” Paper presented at the 11th IEEE Singapore International Conference on Communication Systems (ICCS), 2008.
  12. S. Bayram, H. T. Sencar and N. Memon, “An Efficient and Robust Method for Detecting Copy-Move Forgery,” Paper presented at the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2009.
  13. L. Li, S. Li and J. Wang, “Copy-Move Forgery Detection based on PHT,” Paper presented at the World Congress on Information and Communication Technologies (WICT), 2012.
  14. M. Ghorbani, M. Firouzmand and A. Faraahi, “DWT-DCT (QCD) based Copy-Move Image Forgery Detection,” Paper presented at the 18th International Conference on Systems, Signals and Image Processing (IWSSIP), June 2011.
  15. L. Li, S. Li, H. Zhu, S. C. Chu, J. F. Roddic and J. S. Pan, “An Efficient Scheme for Detecting Copy Move Forged Images by Local Binary Patterns,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 46-56, January 2013.
  16. V. Kumar, A. S. Rao, YK S. Krishna, “Dual Transition Uniform LBP Matrix for Efficient Image Retrieval,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 8, pp. 50-57, July 2015.
  17. G. Li, Q. Wu, D. Tu and S. Sun, “A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries based on DWT and SVD,” IEEE International Conference on Multimedia and Expo, pp. 1750–1753, July 2007.
  18. B. Mahdian and S. Saic, “Detection of Copy–Move Forgery using a Method based on Blur Moment Invariants,” Forensic Science International, vol. 171, no. 2, pp.180-189, September2 007.
  19. J. W. Wang, G. J. Liu, Z. Zhang, Y. Dai and Z. Wang, “Fast and Robust Forensics for Image Region Duplication Forgery,” Acta Automatica Sinica, vol. 35, no. 12, pp. 1488-1495, 2009.
  20. Z. Mohamadian and A. A. Pouyan, “Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions,” Paper presented at the UKSim, 2013.
  21. M. F. Hashmi1, A. Hambarde, V. Anand and A. Keskar, “Passive Detection of Copy-Move Forgery using Wavelet Transforms and SIFT Features,” Journal of Information Assurance and Security, vol. 9, pp. 197-204, 2014.
  22. S. Khan and A. Kulkarni, “Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform,” International Journal of Computer Applications, vol. 6, no. 7, pp. 31-36, 2010.
  23. D. Mustapha, R. Mohammed and T. Khadidja, “Multi-metric Based Face Identification with Multi Configuration LBP Descriptor,” International Journal of Image, Graphics and Signal processing, vol. 4, no. 1, pp. 57-63, February 2012.
  24. G. J. Liu, J. W. Wang, S. G. Lian and Z. Q. Wang, “A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation,” Journal of Network and Computer Applications, vol. 34, no. 5, pp.1557-1565, 2011.
  26. D. Tralic, I. Zupancic, S. Grgic and M. Grgic, “CoMoFoD- New database for Copy-Move Forgery Detection,” in Proc. 55th International Symposium ELMAR, pp. 49-54, September 2013.
  28. G. Muhammad, M. Hussain, and G. Bebis, “Passive copy move image forgery detection using undecimated dyadic wavelet transform”, Digital Investigation, vol. 9, no. 1, pp. 49–57, 2012.
  29. B. Mahdian, S. Saic, “Using noise inconsistencies for blind image forensics”, Image and Vision Computing, vol.27, no.10, pp. 1497–1503, 2009.
Index Terms

Computer Science
Information Sciences


Copy-move forgery Discrete Wavelet Transform Image forgery detection Local Binary Pattern Region duplication