Cluster Computing

, Volume 22, Supplement 1, pp 647–660 | Cite as

Splicing image forgery identification based on artificial neural network approach and texture features

  • Araz Rajab AbrahimEmail author
  • Mohd Shafry Mohd Rahim
  • Ghazali Bin Sulong


Splicing Image Forgery Identification controls and picture tampering with no proof being left behind has turned out to be exceptionally moderate and exceedingly utilized, because of presence of to a great degree intense altering apparatuses, for example, Adobe Photoshop. Along these lines, there has been a quick expansion of the digitally adjusted pictures on the Internet and prevailing press. The genuineness of a digital image experiences extreme dangers because of the ascent of capable digital image altering devices that effectively adjust the image substance without leaving any obvious hints of such changes. The splicing forgery should be possible by replicated a one/more area from source image and pasted into an objective picture to create a composite image called spliced image. In this manner, this sort of forgery is viewed as challenge issue difficult from tamper identification perspective. To influence the issue most exceedingly awful some to post preparing impacts, for example, blurring, JPEG compression, rotation and scaling perhaps presented in the spliced image. This study aims to perform quantification and data analysis following feature extraction using computational techniques to detect interesting textural and anatomical changes, these extracted features then can be used as a key to distinguish between different classes (Splicing Image and non-Splicing image). This paper presents a new framework to identify the spliced image by exploiting the image texture features, and to automatically identification of spliced images. To accurately identify the spliced image, the proposed solution uses different texture features to capture deferent texture related to the edge of the object and the colour features. We have combine these features to produce a good vector to describe the splice object. Two models have been proposed in this paper first combine the vectors of the three features and feed them to the ANN classifier. Second, use the majority voting of the result of three features to take the decision. This is followed by a ANN classifier; in this model we have trained the system with 30 training 20% validation 50% testing. We evaluated the effectiveness of the classification framework for identifying spliced images by compare the result with the manual label which is done by the people who have created the data sets. In this approach we have combine different features to capture different information and feed them to the neural network to identify the splicing image. The findings outcome from this study have shown an improved approach that automatically splicing image forgery identification. We have evaluated the splicing image forgery identification using the texture features. The identification accuracy in the technique used is about 98.06%., with 99.03% sensitivity and 96.07% specificity.


Splicing image forgery splicing image forgery identification Splicing image forgery detection Texture features Artificial neural network 


  1. 1.
    Sridevi, M., Mala, C., Sanyam, S.: Comparative study of image forgery and copy-move techniques. Adv. Comput. Sci. Eng. Appl. 715–723 (2012)Google Scholar
  2. 2.
    Redi, J.A., Taktak, W., Dugelay, J.L.: Digital image forensics: a booklet for beginners. Multimed. Tools Appl. 51(1), 133–162 (2011)CrossRefGoogle Scholar
  3. 3.
    Hashem, F.S., Sulong, G.: Passive aproaches for detecting image tampering: a review. J. Teknologi 73(2), 31–36 (2015)Google Scholar
  4. 4.
    Man, M., Zaki, F.A.M., Zakaria, M.Z., Rakhmadi, A., Othman, N.Z.S., Rahim, M.S.M.: FishDTecTools: fish detection solution using neural network approach. J. Commun. Comput. 8(2), 96–102 (2011)Google Scholar
  5. 5.
    Ghorbani, M., Firouzmand, M., Faraahi, A.: DWT-DCT (QCD) based copy-move image forgery detection. In: 2011 18th International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 1–4. IEEE (2011 June)Google Scholar
  6. 6.
    Zhao, X., Li, J., Li, S., Wang, S.: Detecting digital image splicing in chroma spaces. In: International Workshop on Digital Watermarking, pp. 12–22. Springer, Berlin (2010 October)Google Scholar
  7. 7.
    Alahmadi, A.A., Hussain, M., Aboalsamh, H., Muhammad, G., Bebis, G.: Splicing image forgery detection based on DCT and local binary pattern. In: Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE, pp. 253–256. IEEE (2013 December)Google Scholar
  8. 8.
    Johnson, M.K., Farid, H.: Detecting photographic composites of people. In: International Workshop on Digital Watermarking, pp. 19–33. Springer, Berlin (2007 December)Google Scholar
  9. 9.
    Johnson, M.K., Farid, H.: Exposing digital forgeries through chromatic aberration. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 48–55. ACM (2006 September)Google Scholar
  10. 10.
    Mohammed, M.A., Ghani, M.K.A., Hamed, R.I., Abdullah, M.K., Ibrahim, D.A.: Automatic segmentation and automatic seed point selection of nasopharyngeal carcinoma from microscopy images using region growing based approach. J. Comput. Sci. 20, 61–69 (2017)Google Scholar
  11. 11.
    Mohammed, M.A., Ghani, M.K.A., Hamed, R.I., Ibrahim, D.A., Abdullah, M.K.: Artificial neural networks for automatic segmentation and identification of nasopharyngeal carcinoma. J. Comput. Sci. 21, 263–274 (2017)CrossRefGoogle Scholar
  12. 12.
    Mohammed, M.A., Ghani, M.K.A., Hamed, R.I., Mostafa, S.A., Ibrahim, D.A., Jameel, H.K., Alallah, A.H.: Solving vehicle routing problem by using improved K-nearest neighbor algorithm for best solution. J. Comput. Sci. 21, 232–240 (2017)CrossRefGoogle Scholar
  13. 13.
    Mohammed, M.A., Ghani, M.K.A., Hamed, R.I., Mostafa, S.A., Ahmad, M.S., Ibrahim, D.A.: Solving vehicle routing problem by using improved genetic algorithm for optimal solution. J. Comput. Sci. 21, 255–262 (2017)CrossRefGoogle Scholar
  14. 14.
    Nikias, C.L.: Higher-order spectral analysis. In: Engineering in Medicine and Biology Society, 1993. Proceedings of the 15th Annual International Conference of the IEEE, pp. 319–319. IEEE (1993)Google Scholar
  15. 15.
    Andrew, J.P., Kaisha, C.K.: Two dimensional discrete wavelet transforms. U.S. Patent 7,277,489 (2007)Google Scholar
  16. 16.
    Banerji, S., Verma, A., Liu, C.: Novel color LBP descriptors for scene and image texture classification. In: 15th International Conference on Image Processing, Computer Vision, and Pattern Recognition, Las Vegas, Nevada, pp. 537–543 (2011 July)Google Scholar
  17. 17.
    Bratkova, M., Boulos, S., Shirley, P.: oRGB: a practical opponent color space for computer graphics. IEEE Comput. Graph. Appl. 29(1) (2009)Google Scholar
  18. 18.
    Heikkilä, M., Pietikäinen, M., Schmid, C.: Description of interest regions with center-symmetric local binary patterns. In: ICVGIP, vol. 6, pp. 58–69 (2006 December)Google Scholar
  19. 19.
    Bai, Y., Guo, L., Jin, L., Huang, Q.: A novel feature extraction method using pyramid histogram of orientation gradients for smile recognition. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp. 3305–3308. IEEE (2009 November)Google Scholar
  20. 20.
    Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: Computer Vision and Pattern Recognition, 2005. IEEE Computer Society Conference on CVPR 2005, vol. 1, pp. 886–893. IEEE (2005 June)Google Scholar
  21. 21.
    Wang, X., Han, T.X., Yan, S.: An HOG-LBP human detector with partial occlusion handling. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 32–39. IEEE (2009 September)Google Scholar
  22. 22.
    Zhu, Q., Yeh, M.C., Cheng, K.T., Avidan, S.: Fast human detection using a cascade of histograms of oriented gradients. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2, pp. 1491–1498. IEEE (2006)Google Scholar
  23. 23.
    Mohammed, M.A., Ghani, M.K.A., Hamed, R.I., Ibrahim, D.A.: Review on Nasopharyngeal Carcinoma: concepts, methods of analysis, segmentation, classification, prediction and impact: a review of the research literature. J. Comput. Sci. 21, 283–298 (2017)CrossRefGoogle Scholar
  24. 24.
    Mohammed, M.A., Ghani, M.K.A., Hamed, R.I., Ibrahim, D.A.: Analysis of an electronic methods for nasopharyngeal carcinoma: prevalence, diagnosis, challenges and technologies. J. Comput. Sci. 21, 241–254 (2017)Google Scholar
  25. 25.
    Wang, S.C.: Artificial neural network. In: Interdisciplinary Computing in Java Programming, pp. 81–100. Springer, New York (2003)Google Scholar
  26. 26.
    Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Sig. Process. Image Commun. 25(6), 389–399 (2010)CrossRefGoogle Scholar
  27. 27.
    Wu, T.K., Meng, Y.R., Huang, S.C.: Application of artificial neural network to the identification of students with learning disabilities. In: IC-AI, pp. 162–168 (2006)Google Scholar
  28. 28.
    Kong, A., Zhang, D., Kamel, M.: Palmprint identification using feature-level fusion. Pattern Recogn. 39(3), 478–487 (2006)CrossRefzbMATHGoogle Scholar
  29. 29.
    Rattani, A., Kisku, D.R., Bicego, M., Tistarelli, M.: September. Feature level fusion of face and fingerprint biometrics. In: First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007, pp. 1–6. IEEE (2007)Google Scholar
  30. 30.
    Zou, K.H., O’Malley, A.J., Mauri, L.: Receiver-operating characteristic analysis for evaluating diagnostic tests and predictive models. Circulation 115(5), 654–657 (2007)CrossRefGoogle Scholar
  31. 31.
    Zweig, M.H., Campbell, G.: Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine. Clin. Chem. 39(4), 561–577 (1993)Google Scholar
  32. 32.
    Agarwal, S., Chand, S.: Image forgery detection using multi scale entropy filter and local phase quantization. Int. J. Image Graph. Signal Process. 7(10), 78 (2015)Google Scholar
  33. 33.
    Muhammad, G., Al-Hammadi, M.H., Hussain, M., Bebis, G.: Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25(4), 985–995 (2014)CrossRefGoogle Scholar
  34. 34.
    He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45(12), 4292–4299 (2012)CrossRefGoogle Scholar
  35. 35.
    Liao, X., Yin, J., Guo, S., Li, X., Sangaiah, A.K.: Medical JPEG image steganography based on preserving inter-block dependencies. Comput. Electr. Eng. (2017).
  36. 36.
    Samuel, O.W., Asogbon, G.M., Sangaiah, A.K., Fang, P., Li, G.: An integrated decision support system based on ANN and Fuzzy_AHP for heart failure risk prediction. Expert Syst. Appl. 68, 163–172 (2017)CrossRefGoogle Scholar
  37. 37.
    Zhang, R., Shen, J., Wei, F., Li, X., Sangaiah, A.K.: Medical image classification based on multi-scale non-negative sparse coding. Artif. Intell. Med. (2017). Google Scholar
  38. 38.
    Liang, W., Tang, M., Jing, L., Sangaiah, A.K., Huang, Y.: SIRSE: a secure identity recognition scheme based on electroencephalogram data with multi-factor feature. Comput. Electr. Eng. (2017).
  39. 39.
    Samuel, O.W., Zhou, H., Li, X., Wang, H., Zhang, H., Sangaiah, A.K., Li, G.: Pattern recognition of electromyography signals based on novel time domain features for amputees’ limb motion classification. Comput. Electr. Eng. (2017).
  40. 40.
    Arunkumar, N., Ramkumar, K., Venkatraman, V., Abdulhay, E., Fernandes, S.L., Kadry, S., Segal, S.: Classification of focal and non focal EEG using entropies. Pattern Recogn. Lett. 94, 112–117 (2017)CrossRefGoogle Scholar
  41. 41.
    Arunkumar, N., Kumar, K.R., Venkataraman, V.: Automatic detection of epileptic seizures using new entropy measures. J. Med. Imaging Health Inf. 6(3), pp. 724-730 (2016)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Araz Rajab Abrahim
    • 1
    Email author
  • Mohd Shafry Mohd Rahim
    • 1
    • 2
  • Ghazali Bin Sulong
    • 3
  1. 1.Faculty of ComputingUniversitiTeknologi Malaysia (UTM)Johor BahruMalaysia
  2. 2.IRDA Digital Media CenterUniversiti Teknologi Malaysia (UTM)Johor BahruMalaysia
  3. 3.School Informatics and Applied MathematicsUniversiti Malaysia Terengganu (UMT)TerengganuMalaysia

Personalised recommendations