Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns

With the advancement of the multimedia technology, the extensive accessibility of image editing applications makes it easier to tamper the contents of digital images. Furthermore, the distribution of digital images over the open channel using information and communication technology (ICT) makes it more vulnerable to forgery. The vulnerabilities in telecommunication infrastructure open the doors for intruders to introduce deceiving changes in image data, which is hard to detect. The forged images can create severe social and legal troubles if altered with malicious purpose. Image forgery detection necessitates the development of sophisticated techniques that can eﬃciently detect the alterations in the digital image. Splicing forgery is commonly used to conceal the reality in images. Splicing introduces high contrast in the corners, smooth regions, and edges. We proposed a novel image forgery detection technique based on image splicing using Discrete Wavelet Transform and histograms of discriminative robust local binary patterns. First, a given color image is transformed in YCbCr color space and then Discrete Wavelet Transform (DWT) is applied on Cb and Cr components of the digital image. Texture variation in each subband of DWTis described using the dominant rotated local binary patterns (DRLBP). The DRLBP from each subband are concatenated to produce the ﬁnal feature vector. Finally, a support vector machine is used to develop image forgery detection model. The performance and generalization of the proposed technique were evaluated on publicly available benchmark datasets. The proposed technique outperformed the state-of-the-art forgery detection techniques with 98.95% detection accuracy.


Introduction
Digital imaging is applicable in many fields such as World Wide Web (WWW), print media, insurance industry, and surveillance security [1]. All these applications leverage information and communication technology (ICT) to disseminate the digital contents including digital images [2]. e vulnerabilities in telecommunication infrastructure open the doors for intruders to access or change the transmitted data. e change in image data is hard to detect because contents of an image can be easily manipulated with the help of sophisticated image editing tools. e society is facing problems like false propaganda, fraud, counterfeiting, black mailing, etc., due to image tampering. Image authentication is required to use images as source of information or evidence in real life. In most of the cases, especially with malicious designs, image forgery is performed using copymove and splicing procedures. During forgery process, images can be altered with the help of the same image contents or by combining contents of different images. If the tampering procedure involves the copy and paste operation of image content/s within the image, then this forgery is called copy-move; otherwise, it is referred to as splicing. Different types of postprocessing operations such as scaling, blurring, noise adding, compression, and rotation are applied on the forged regions to hide the cues of forgery [3].
Forensic analysis of images was initiated in 2000. Many techniques [4][5][6][7][8] were developed to detect splicing forgery and can be categorized as active and passive (or blind) on the basis of splicing detection mechanism. Active techniques work on the phenomena that given image contains the information such as watermark or signature at the time of acquisition to ensure its authenticity. Active techniques extract this watermark or signature with the original to ensure its authenticity. e use of these techniques is very limited due the nonavailability of information about the watermark or signature in most of the cases. Due to this limitation passive techniques for splicing forgery detection are being developed, which do not depend on prior information. In image splicing the contents of host images are modified by copying and pasting the contents from other images. Splicing is a fundamental and famous image forgery technique. To gain the public trust in digital image authentication, image splicing detection has become an important research area for digital image forgery detection. e image splicing operation disturbs the contents consistency, smoothness, and regularity. ese factors play a very important role in detecting the forgery regions in the host image. e state-of-the-art image splicing techniques consider the variations in global statistical characteristics introduced by sudden inconsistency in spliced images [6][7][8][9]. Example of splicing image forgery is shown in Figure 1.
To detect the discontinuities that occurred in image due to splicing, first a given image is partitioned into subbands using DWT. e strong decorrelation ability of DWT represents the coefficients of four wavelet subbands at the same level. Our proposed technique measures the discontinuities that occurred in images due to splicing using the DWT subbands coefficients. e proposed scheme uses a robust technique for coding, which encodes the DWT subbands coefficients. Based on the proposed scheme which measures discontinuities and their coding, we introduce a new technique to detect splicing forgery by decomposing chroma components of a test image using DWT into subbands for measuring local discontinuities. For coding, we applied the DRLBP to determine the local discontinuities. We call the descriptor based on these methods as the DWT-DRLBP, which represents an image and is used for detecting splicing forgery as shown in Figure 2. Finally, the SVM is used to detect the image forgery in digital images.

Related Work
Most of the splicing forgery detection techniques are blind/ passive [7]. Alahmadi et al. [9] and Min and Dong [10] used DCT coefficients and minimum and maximum filters to extract features from image blocks to detect splicing forgery. Multiresolution approaches, like DWT, are used in many algorithms [5,11]. SIFT features are used as an alternative to block matching for detecting splicing forgery [12]. Most of the splicing forgery detection methods are evaluated on Columbia Color DVMM [13] and CASIA v1.0 and CASIA v2.0 [14] datasets. Ng et al. [15] proposed image splicing detection approach based on 3D moments of image spectrum, while features based on camera response function were passed to SVM in [16] to detect splicing forgery. Shi et al. [17] used 1D and 2D moments, Markov chain probabilities, and DCT coefficients for image splicing detection.
e algorithm was evaluated on CASIA v2.0 dataset and reported accuracy is 84.86%. Xunyu et al. [5] enhanced the accuracy to 89.76% of Wang et al. method by concatenating Markov chain moments and DCT and DWT coefficients together with SVM. Markov probabilities were extracted from Cb channel in [18], for image splicing detection. e algorithm achieved 89.23% and 95.5% accuracy, respectively, when evaluated on Columbia Color DVMM and a subset of CASIA v2.0 datasets. Zaho et al. in [19] designed a chrominance channel to detect splicing forgery and improved the performance of the Wang et al. scheme proposed in [18].
With the recent development in ubiquitous computing and digital media, especially digital images, the image forgery detection has become most essential task for secure and authentic multimedia contents transmission. Alahmadi et al. [20] used DCT and LBP features for image splicing detection. Pham et al. [21] extracted Markov features to identify irregularities in images due to splicing. SVM was used for classification. Jalab et al. [22] extracted fractional entropy from DWT [23] coefficients and SVM was used for classification. Xunyu in [5] developed an efficient technique to detect the duplicate regions from forged image. e proposed technique detects the key points using geometric transforms to find the identical transformed regions. Similarly, Mahmoud and Hongli in [6] developed a two-level key point detection technique to highlight the image tampering effects in smooth regions. At first level the combination of scale invariant feature operator and Harris corner detector was applied to detect the key point features from smooth regions. Finally, the gradient histogram of multisupport region order descriptor was computed to efficiently detect the tampers regions in a forged image.
Min and Dong in [10] developed a novel forgery detection technique based on minimum and maximum filter. e combination of minimum filter and maximum filter highlights the pixel wise minimum and maximum variations between authentic and forged images. e investigation of interpolation and noninterpolation improved the performance of forgery detection technique in composite regions. Recently, Jinwei et al. in [11] proposed a novel deep learning technique for image splicing detection. e proposed convolutional neural network learns the weighted combination of three types of featured extraction techniques. Convolutional neural network model learns the optimal combination of parameters for feature extraction techniques. Figure 3 demonstrates that sample image is transformed to YCbCr color space, where Cb and Cr are the chroma components and Y is the luminance component. Actually, the contents of image are described by luminance channel, which is capable of hiding the content tampering traces.
In [24], authors proposed a solution to localize image splicing using Multitask Fully Convolutional Network (MFCN). e proposed scheme achieves better performance than the single task FCN scheme. In the proposed scheme, authors used FCN VGG-16 with skip connection as the base network, in order to improve the learning way of CNN through recall and consolidation mechanism of human brain. Bi et al. in [25] proposed a CNN-based method called Ringed Residual U-Net (RRU-Net). e proposed scheme is end-to-end image segmentation network for image splicing detection. In this scheme, residual propagation is used to recall the input feature information to solve the degradation problem in the deeper network. e RRU-Net was tested on CASIA and Columbia datasets which were also used by Wang et al. in [26] to detect and locate image forgeries. In order to detect copy-move forgery, a two-branch DNN based architecture called BusterNet is proposed in [27]. In the proposed scheme, one layer is used for the detection of cloned regions which takes input image and uses CNN to extract features, self-correlation module to compute feature similarity, percentile pooling to collect useful statistics, mask decoder for upsampling of feature map, and binary classifier to generate binary copy-move mask, while the other layer is used for detection of tampered regions which takes input image, extracts features using CNN, upsamples feature map using mask decoder, and generates mask using binary classifier.

Proposed Image Forgery Detection Scheme Using the DWT-DRLBP Descriptor
In this section, we will discuss our proposed image forgery detection scheme using the DWT and the DRLBP descriptors. Splicing distorts the texture patterns that define the sharp changes such as corners, lines, and edges. Such inconsistencies in image texture can be easily detected with chroma components, because the chroma components describe the weak signals (corners, lines, and edges) [7,18,19]. Splicing highlights the discontinuities in the form of edges in images which change the local structure of spliced images and are well exposed using DWT coefficients, because the changes that occurred due to splicing are present in high frequency wavelet bands. To analyze these changes we propose an efficient, simple, and robust descriptor, called DWT-DRLBP descriptor, which first decomposes chroma components of a given image into subbands using Discrete Wavelet Transform (DWT) and then encodes these subbands using DRLBP [28] texture descriptor, which is a robust texture descriptor. e DWT-DRLBP descriptor of an image is passed to SVM for taking the decision whether it is authentic or spliced. We applied SVM two-class classifier to classify a sample image as forged or authentic [29]. Support vector machine is linear classifier, but the samples of image forgery dataset used in this research are not linearly separable. To overcome this issue a kernel trick is applied. e experiments were performed using LIBSVM kernel as presented in [30].

DWT-DRLBP Descriptor.
Discrete wavelet transformation decomposed the sample image into four frequency bands (LL, LH, HL, and HH]. ese frequency bands are called chroma components, which highlights the local inconsistencies in the forged. e proposed image splicing technique is the combination of DWT based chroma components and DRLBP features. For this purpose, first one-level DWT was applied in the image and then DRLBP descriptor was applied to highlight the splicing effects.

Wavelet Decomposition of Chroma Components.
e DWT provides unique and discriminatory representation to quantify image texture efficiently with high resolution and few numbers of wavelet coefficients. e wavelet coefficients effectively highlight the structural variations in image splicing. e low frequency coefficients provide high contrast that occurs due to image splicing. e low frequency features are directly used to represent the sample image. Due to describing energy compaction in few wavelet coefficients, the procedure of image representation becomes very simple. e low frequency components image approximations are done by highlighting the inconsistencies introduced in the forged image. e low frequency is the most suitable for localization of variations in image contents as illustrated in Figure 4. e introduction of wavelet transformation in image splicing detection allows analyzing the image at frequency domain with the help of low-pass filter and highpass filter. e splicing forgery produces high contrast in terms of corners, edges, and lines, which are better described with high frequency. e wavelet transformation describes these transitions with the help of local sharpness and smoothness in high frequency coefficients. Based on these assumptions, each chroma channel of a given image is partitioned into four frequency bands (LL, LH, HL, and HH) using 1-level wavelet transform to characterize the changes that occurred due to splicing (see Figure 5).

DRLBP Histograms.
After extracting the chroma channels from sample image, the next step is to extract the discriminate patterns and estimate their distribution. For this purpose, we adopt DRLBP descriptor, which extracts the histogram of local binary patterns such as edges, corners, spots, and lines in the form of LBP codes.
en we approximate the distribution of these patterns while considering the local gradient magnitude at subsequent locations. DRLBP descriptor highlights the changes in local regions while considering the amount of change. e overview of DRLBP descriptor is given in equations (1) to (4), whereas the detailed description of DRLBP is presented in [19]. e binary patterns of each pixel from a 3 × 3 window with 8 neighbors are computed from sample image; then the weighted histogram of binary patterns is computed from each region as defined in equation (3).
Here n � 2 8 the number of bins to represent the sample image in the form of histograms of 256 distinct patterns. G x, y is the gradient magnitude of central pixel (x, y) which demonstrates the contribution of the corresponding binary pattern with respect to the intensity of pixel wise local change. M × N represents resolution of each specific frequency band. To eliminate the reverse effect both in background and in foreground, we computed the weighted histogram W RLBP as follows: After calculating the RLBP, the histogram of weighted discriminative LBP was computed to enhance the discriminative effect of binary patterns as follows: Finally, DRLBP descriptor is computed by concatenating the histogram of weighted RLBP and weighted DLBP of each local region as follows: the histogram of all subbands is concatenated to form the DRLBP descriptor (fv). e whole process of the computation of fv is given in Algorithm 1. e descriptor fv computes the overall structural changes without considering the spatial locations of image contents. e integration of the discriminative information and localized spatial changes into fv further enhances its discriminative potential. For this purpose, each channel of sample image is partitioned into K blocks (subblocks), B 1 , B 2 , . . . , B K , each subblock with l × m dimension such that K(l × m) � M × N. e descriptor fvB i of each subblock B i is computed.

Computation of the DWT-DRLBP
At the end, the fvB i of all subblocks is concatenated to represent the fv Ch of a channel with respect to each subband Sb ∈ LL, LH, HL, HH { } as represented in equation (6). Finally, the DWT-DRLBP descriptor is obtained to represent the sample image as described in fv ch � fv LL ,fv LH ,fv HL ,fv HH , fv � fv Cb ,fv Cr .

Performance Measures and Evaluation Methodology
To evaluate the performance of proposed image forgery detection technique three image databases were used. e performance evaluation techniques and datasets are described in this section.

Dataset Description.
e performance of image forgery technique was evaluated using three datasets Columbia Color DVMM (DVMM) [11] and CASIA v1.

Evaluation Policy.
e parameters of SVM were tuned with respect the training dataset. We achieved the best performance with RBF kernel. e RBF filter depends on further two parameters which are regularized coefficient and gamma. e performance of RBF filter entirely depends on the optimal combination of these two parameters. e regularized coefficient performs an important role in balancing the complexity of the model by achieving highest forgery detection accuracy, whereas the gamma parameter in RBF kernel is used to define the nonlinear mapping between two points; in case of lower gamma value the far away points are considered as closest points. For image splicing detection we tuned the RBF kernel with 2 5 and 2 − 5 for regularized coefficient and gamma, respectively, using grid-search method [31,32]. We employed 10-fold cross validation in which the forged and authentic images are randomly divided into 10 folds of equal size. Ten performance measure values corresponding to the 10-folds are calculated and their average along with standard deviation (std) is reported as the performance of the system. e same procedure is repeated for each dataset.

Performance Measures.
For evaluation, the forged images are considered as positive class while the authentic images are considered as negative class. We adopted the following performance evaluation techniques: accuracy, sensitivity, specificity, and false positive rate. Accuracy is the percentage of samples accurately predicted as forged or authentic to the total number test images, computed as follows: Here the symbol TP characterizes the number of samples that are forged, and the classifier also predicted them as forged. e symbol TN represents the number of images that are authentic, and the classifier also predicted them as authentic. Moreover, the symbol FP represents the number of images that were authentic and classifier predicted them as forged, and FN represents the number of images that were forged and the classifier predicted them as authentic.

True Positive Rate.
e true positive rate is also called sensitivity, which represents the percentage of predicting a forged image as forged, calculated as True Negative Rate. e true negative rate is also called specificity, which represents the percentage of predicting a genuine image as genuine, computed as False Positive Rate. e false positive rate represents the percentage of predicting the sample images as forged which are actually misclassified as authentic.
Parameter Tuning. e proposed system involves many parameters. Figure 5 illustrates the participating parameters. Tuning the parameters in a thorough manner to find the optimal set is not an easy task, which is considered as an optimization problem. From a practical point of view parameter setting is important. We determined empirically various parameter settings in this paper. After parameters tuning, the best parameters values used by proposed method are shown in Table 1.

Experimental Results and Discussion
e performance of proposed method on different benchmark datasets is given in Table 2. e ROC curves are shown in Figure 6. To evaluate the performance of image splicing techniques developed in this research, we applied the proposed technique on DVMM dataset. e DVMM dataset contains 180 normal images and 183 forged color images. e forged images are produced by tampering the authentic images by applying the crop-paste method of the vertical and horizontal strips.

Robustness on Geometric
Transformations. Geometric transformations such as scaling (resizing), rotation, and deforming are applied normally in combination or individually on spliced regions to hide the cues of forgery. ese transformations are applied on spliced region(s) in CASIA v1.0 and CASIA v2.0 datasets. Figure 7 shows the accuracy of the method against these transformations. When geometric transformations are applied on spliced region(s), the changes along the boundary turn into sharp edges (splicing artifacts), which are needed to be modeled properly. In general, the method performs well with respect to different geometric transformation, because splicing artifacts are modeled properly by DWT-DRLBP descriptor.

Robustness on Spliced Region(s) Size.
Splicing regions are detected by exploring variations of intrinsic features, which are usually consistent in unaltered images. e method is explored on small, medium, and large spliced region(s). Figure 8 shows the results with these sizes. It is fact that local inconsistencies of spliced region(s) are useful in exposing forgery, which is exposed effectively using DTW-DRLBP descriptor.

Robustness on Spliced Region(s) Shape.
Splicing of different types of shapes is very common to gain illegal benefits.
is section explores the effect of spliced region shapes on the performance. CASIA v1.0 and CASIA v2.0 datasets contain the four region shapes of the spliced part(s) that are circular (CR), rectangular (RECT), triangular (TRI), and arbitrary (ARB). Figure 8 shows the results with theses shapes. e method is robust on different shapes of spliced region(s).

Robustness on JPEG Images.
e performance of proposed technique was evaluated on the JPEG images taken from CASIA v1.0 and CASIA v2.0 datasets and achieved 98% accuracy. JPEG compression is performed by applying DCT quantization. When splicing is performed in JPEG images the forgery occurs in the form of block mismatching and blocks are not aligned with their neighbors which causes extraneous edges. e proposed techniques achieved high forgery detection accuracy because it properly explored the inconsistencies in the spliced image using DWT-DRLBP descriptor.

Comparison with State-of-the-Art Methods.
In this section we compared the results achieved in this research with the state-of-the-art image splicing technique for image forgery detection. Table 3 demonstrates the performance of state-of-the-art methods only on the corresponding datasets, because they achieved best results either on CASIA v1.0 or CASIA v2.0 or DVMM. It demonstrates that the proposed technique outperforms the state-of-the-art techniques with respect to every performance evaluation criterion. It can also be noted that the proposed approach performed significantly on combined dataset, which witnessed the generalization of the proposed technique. Overall, the method has high accuracy and true positive rate, while maintaining low false positive rate as compared to other state-of-the-art methods.

Conclusion
To represent a test image for authentication, we employed DWT-DRLBP descriptor for feature extraction. Chroma components of a test image are decomposed into subbands     using single level DWT to exploit splicing inconsistencies. A robust texture descriptor DRLBP is employed to capture the detailed statistics from these subbands. DWT-DRLBP descriptor makes the proposed method capable enough to detect splicing image forgery even in the presence of postprocessing operations. Performance of DWT-DRLBP descriptor is obtained and examined by employing SVM classifier with 10fold cross validation. ree publicly available benchmark datasets were used for experiments and evaluation. Our proposed method achieved 98.95% accuracy on combined dataset and is robust as compared to other state-of-the-art methods.
ese results also endorsed the success and robustness of DWT-DRLBP descriptor, used to model inconsistencies in images caused by splicing forgery. Furthermore, SVM with RBF kernel classified any given image as authentic or spliced and finally ensured the excellent accuracy of results. e future work is to localize the spliced region(s) to boost the trust on results and to measure the degree of splicing.

Data Availability
Data used for this study and simulation will be provided upon request to the reviewer for validation.

Conflicts of Interest
e authors declare that they have no conflicts of interest regarding the present study.