Open Access
ARTICLE
Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features
1 Department of Computer Science, University of Engineering and Technology, Taxila, 47050, Pakistan
2 Department of Computer Engineering, University of Engineering and Technology, Taxila, 47050, Pakistan
3 College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, 11942, Saudi Arabia
4 College of Computer Science and Engineering, University of Jeddah, Jeddah, 21577, Saudi Arabia
5 Department of Computer Engineering, Umm Al-Qura University, Makkah, 21421, Saudi Arabia
* Corresponding Author: Zahid Mehmood. Email:
Computers, Materials & Continua 2021, 69(2), 1927-1944. https://doi.org/10.32604/cmc.2021.018052
Received 23 February 2021; Accepted 19 April 2021; Issue published 21 July 2021
Abstract
Copy-move forgery is the most common type of digital image manipulation, in which the content from the same image is used to forge it. Such manipulations are performed to hide the desired information. Therefore, forgery detection methods are required to identify forged areas. We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern (LTrP) features to detect the single and multiple copy-move attacks from the images. The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations. It also uses discrete wavelet transform (DWT) for dimension reduction. The obtained approximate image is distributed into circular blocks on which the LTrP algorithm is employed to calculate the feature vector as the LTrP provides detailed information about the image content by utilizing the direction-based relation of central pixel to its neighborhoods. Finally, Jeffreys and Matusita distance is used for similarity measurement. For the evaluation of the results, three datasets are used, namely MICC-F220, MICC-F2000, and CoMoFoD. Both the qualitative and quantitative analysis shows that the proposed method exhibits state-of-the-art performance under the presence of post-processing operations and can accurately locate single and multiple copy-move forgery attacks on the images.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.