Professional Documents
Culture Documents
ABSTRACT
In this paper, a combination of the Wavelet
transform and the Zernike moments is presented for
detecting copymove regions in digital forged
images. Assuming that tested images have the JPEG
format on both before and after being tampered. The
proposed method uses the Wavelet transform to
remove unimportant details in the forged images by
using the approximate components only. After that,
the Zernike moments of each 16 x 16 image block
are calculated then compared the Euclidean
distances to get pairs of any similar blocks. In order
to support efficiently the proposed algorithm, a
morphological technique is applied to extract the
foreground first as a preprocessing. The evaluation
for the theory and effectiveness of the proposed
algorithm are demonstrated via experimental results
on various images with different properties.
KEYWORDS
1.
INTRODUCTION
(a)
(b)
(c)
(d)
Figure 1. Original Images and Forged Images by
Photoshop: (a), (c) Original; (b), (d) Forged Images
26
Proceedings of The Second International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Philippines 2016
27
Proceedings of The Second International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Philippines 2016
( x, y ) ( x) ( y )
(1)
H ( x, y ) ( x) ( y )
(2)
V ( x, y ) ( x) ( y )
(3)
D ( x, y ) ( x) ( y )
(4)
j ,m,n ( x, y ) 2 j / 2 (2 j x m, 2 j y n)
(5)
ij ,m,n ( x, y ) 2 j / 2 (2 j x m, 2 j y n)
6)
i = {H, V, D}
Therefore, the discrete wavelet transform
of function f(x, y) of size M x N is [11],
W ( j0 , m, n)
1
MN
M 1 N 1
f ( x, y)
x 0 y 0
j 0,m,n
( x, y) (7)
Wi ( j, m, n)
1
MN
M 1 N 1
f ( x, y)
x 0 y 0
i
j ,m,n
( x, y )
(8)
i = {H, V, D}
where j0 is an arbitrary starting scale and the
W(j0,m,n) coefficients define an approximation
of f(x, y)at scale j0. The Wi(J, m, n)
coefficients add horizontal, vertical, and
diagonal details for scales j j0. Normally we
let j0 = 0 and select N =M = 2J so that we can
get j = 0, 1, 2..,J 1 and m, n = 0, 1, 2,, 2J
1. Given the W and Wi of 2 equations (7) (8),
f(x, y) is obtained by inverse discrete wavelet
transform [11].
1
f ( x, y )
W ( j0 , m, n) j 0,m,n ( x, y)
MN m n
(9)
1
i
W ( j0 , m, n) ij,m,n ( x, y)
MN i H ,V , D j j 0 m n
3.
28
Proceedings of The Second International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Philippines 2016
A B z ( B ) z A
(10)
AB z ( B ) z AC
(11)
(a)
(b)
(c)
29
Proceedings of The Second International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Philippines 2016
Z nm
n 1
f ( x, y)V
*
nm
(12)
x 2 y 2 1
(13)
k 0
(n k )!
(14)
n 2k
n 2k m n 2k m
k!
!
!
2
2
30
Proceedings of The Second International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Philippines 2016
(Z
Z p 1 D1
(a)
(b)
(c)
(d)
(e)
(f)
(15)
i k 2 j l 2
D2
(16)
SIMULATION RESULTS
4.1. Results
This proposed algorithm is run in MATLAB
2013a. All tested images have 200x200 size and
in JPEG format. The original images are color
and before applying the algorithm, are
converted into gray scale. After that, the
foreground is extracted from the gray scale
image using some morphological structures and
(g)
(h)
Figure 8. Some simulation results (a), (c), (e), (g):
Tested images; (b), (d), (f), (h): copy-move detection.
31
Proceedings of The Second International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Philippines 2016
4.2. Comparison
An appropriate measure is needed to evaluate
the performance of copy-move image forgery
detection method. In this paper, precision p,
recall r and F are parameters used to evaluate
the efficiency of the proposed method [1]. This
method is often be used in the field. These
parameters are defined as
p T p /(T p F p )
(17)
r T p /(T p FN )
(18)
F 2 pr /( p r )
(19)
90.47
86.72
Recall
(r)
67.09
88.57
77.04
87.64
88.71
94.78
91.65
Method
Precision(p)
Zernike
DWT
Proposed
method
Method
Average calculation
time (sec.)
Running time
reduced (%)
5.
Zernike
only
Proposed
method
588.5
135.4
77%
CONCLUSION
32
Proceedings of The Second International Conference on Electrical and Electronic Engineering, Telecommunication Engineering, and Mechatronics, Philippines 2016
and
ACKNOWLEDGMENT
REFERENCES
33