Review on Local Binary Patterns Variants as Texture Descriptors for Copy-Move Forgery Detection

Rafidah Muhamad (1), Azurah Abu Samah (2), Hairudin Abdul Majid (3), Ghazali Sulong (4), Mohd Saberi Mohamad (5), Shahreen Kasim (6)
(1) Artificial Intelligence and Bioinformatics Research Group, Universiti Teknologi Malaysia, 81310, Johor Bahru, Johor, Malaysia.
(2) Artificial Intelligence and Bioinformatics Research Group, Universiti Teknologi Malaysia, 81310, Johor Bahru, Johor, Malaysia.
(3) Artificial Intelligence and Bioinformatics Research Group, Universiti Teknologi Malaysia, 81310, Johor Bahru, Johor, Malaysia.
(4) School of Informatics and Applied Mathematics, Universiti Malaysia Terengganu, 21030, Kuala Nerus, Terengganu, Malaysia.
(5) Faculty of Creative Technology and Heritage, Universiti Malaysia Kelantan, Karung Berkunci 01, 16300, Bachok, Kelantan, Malaysia.
(6) Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, 86400, Batu Pahat, Johor, Malaysia.
Fulltext View | Download
How to cite (IJASEIT) :
Muhamad, Rafidah, et al. “Review on Local Binary Patterns Variants As Texture Descriptors for Copy-Move Forgery Detection”. International Journal on Advanced Science, Engineering and Information Technology, vol. 7, no. 5, Oct. 2017, pp. 1678-84, doi:10.18517/ijaseit.7.5.3396.
Past decades had seen the concerned by researchers in authenticating the originality of an image as the result of advancement in computer technology. Many methods have been developed to detect image forgeries such as copy-move, splicing, resampling and et cetera. The most common type of image forgery is copy-move where the copied region is pasted on the same image. The existence of high similarity in colour and textures of both copied and pasted images caused the detection of the tampered region to be very difficult. Additionally, the existence of post-processing methods makes it more challenging. In this paper, Local Binary Pattern (LBP) variants as texture descriptors for copy-move forgery detection have been reviewed. These methods are discussed in terms of introduction and methodology in copy-move forgery detection. These methods are also compared in the discussion section. Finally, their strengths and weaknesses are summarised, and some future research directions were pointed out.
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).