Advertisement

Wireless Personal Communications

, Volume 101, Issue 4, pp 1983–2008 | Cite as

An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine

  • Neelesh Kumar Jain
  • Neeraj Kumar Rathore
  • Amit Mishra
Article
  • 49 Downloads

Abstract

Nowadays, the development of refined image processing and software editing tools has finish the exploitation of digital images easily and invisible the image to the normal eyes and this process known as image fakery. Image security is one of the key issues in any field that makes use of digital images. Copy-move forgery (CMF) is the most effective and simple scheme to create forged digital images. In general, the methodologies based on Scale Invariant Feature Transform (SIFT) are widely used to detect CMF. Unfortunately, the detection performance of all SIFT based CMF detection approaches are extremely dependent on the selection of feature vectors. The values of these parameters are often determined through experience or some experiments on a number of forgery images. However, these experience parameter values are not applicable to every image thereby offers a limited usefulness. This paper deals the CMF problem using improved Relevance Vector Machine technique. The key idea of the IVRM is to apply Biorthogonal Wavelet Transform based scheme on image for feature extraction. The feature vectors are then stored lexicographically and similarity of vectors is decided using Minkowski distance and threshold value. The simulation results of proposed technique show a significant improvement in accuracy, sensitivity, and specificity rates over others existing schemes.

Keywords

Image forgery Copy-move forgery (CMF) Biorthogonal Wavelet Transform (BWT) Minkowski distance Improved Relevance Vector Machine (IRVM) Glowworm Swarm Optimization (GSO) Similarity measure 

Notes

References

  1. 1.
    Elwin, J. G. R., Aditya, T. S., & Madhu Shankar, S. (2010). Survey on passive methods of image tampering detection. In Proceedings of the international conference on communication and computational intelligence (INCOCCI’10) (pp. 431–436).Google Scholar
  2. 2.
    Redi, J. A., Taktak, W., & Dugelay, J.-L. (2011). Digital image forensics: A booklet for beginners. Multimedia Tools and Applications, 51(1), 133–162.CrossRefGoogle Scholar
  3. 3.
    Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099–1110.CrossRefGoogle Scholar
  4. 4.
    Pan, X., & Lyu, S. (2010). Detecting image region duplication using sift features. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP’10) (pp.1706–1709).Google Scholar
  5. 5.
    Chauhana, D., Kasatb, D., Jainc, S., Thakared, V. (2016) Survey on keypoint based copy-move forgery detection methods on image. In ElsevierInternational Conference on Computational Modeling and Security (CMS 2016) (pp. 206–212).Google Scholar
  6. 6.
    Malviya, A., & Ladhake, S. (2016). An image forensic technique for detection of copy-move forgery in digital image. In International symposium on security in computing and communication (pp. 328–335). Springer Singapore.Google Scholar
  7. 7.
    Al-Qershi, O. M., & Khoo, B. E. (2016). Copy-move forgery detection using on locality sensitive hashing and k-means clustering. In Information science and applications (ICISA) 2016 (pp. 663–672). Springer Singapore.Google Scholar
  8. 8.
    Ustubioglu, B., Ulutas, G., Ulutas, M., & Nabiyev, V. V. (2016). A new copy move forgery detection technique with automatic threshold determination. International Journal of Electronics and Communications, 70(8), 1076–1087.CrossRefGoogle Scholar
  9. 9.
    Kaushik, R., Bajaj, R. K., & Mathew, J. (2015). On image forgery detection using two dimensional discrete cosine transform and statistical moments. Procedia Computer Science, 70, 130–136.CrossRefGoogle Scholar
  10. 10.
    Isaac, M. M., & Wilscy, M. (2015). Image forgery detection based on Gabor Wavelets and Local Phase Quantization. Procedia Computer Science, Elsevier, 58, 76–83.CrossRefGoogle Scholar
  11. 11.
    Pun, C.-M., Yuanand, X.-C., & Bi, X.-L. (2015). Image forgery detection using adaptive over-segmentation and feature point matching. IEEE Transactions on Information Forensics and Security, 10(8), 1705–1716.CrossRefGoogle Scholar
  12. 12.
    Ardizzone, E., Bruno, A., & Mazzola, G. (2015). Copy-move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensisics and Security, 10(10), 2084–2094.CrossRefGoogle Scholar
  13. 13.
    Anand, V., Hashmi, M. F. & Keskar, A. G. (2014). A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods. In Proceedings of the 6th Asian conference on intelligent information and database systems (ACIIDS 2014). Springer International Publishing, pp. 530–542.Google Scholar
  14. 14.
    Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., & Serra, G. (2013). Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Processing: Image Communication, 28(6), 659–669.Google Scholar
  15. 15.
    Hashmi, M. F., A. R. Hambarde, & A. G. Keskar (2013). Copy move forgery detection using DWT and SIFT features. In Proceedings of 13th IEEE international conference on intelligent systems design and applications (ISDA-2013) (pp. 188–193).Google Scholar
  16. 16.
    Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231(1), 284–295.CrossRefGoogle Scholar
  17. 17.
    Christlein, V., & Jordan, J. (2012). An evaluation of popular copy-move forgery detection approaches. In IEEE transactions on information forensics and security (pp. 1–26).Google Scholar
  18. 18.
    Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transaction on Information Forensics and Security, 6(3), 1099–1110.CrossRefGoogle Scholar
  19. 19.
    Muhammad, G., Hussain, M., Khawaji, K., & Bebis, G. (2011). Blind copy move image forgery detection using dyadic undecimated wavelet transform. In: Proceedings of IEEE 17th international conference on digital signal processing (DSP-2011) (pp. 1–6).Google Scholar
  20. 20.
    Rathore, N. (2018). Performance of hybrid load balancing algorithm in distributed web server system. Wireless Personal Communication.  https://doi.org/10.1007/s11277-018-5758-6.
  21. 21.
    Jain, N., Rathore, N., & Mishra, A. (2017). An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks. Interciencia Journal, 42(11), 95–120.Google Scholar
  22. 22.
    Rathore, N. (2016). Dynamic threshold based load balancing algorithms. Wireless Personal Communications, 91(1), 151–185.MathSciNetCrossRefGoogle Scholar
  23. 23.
    Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.CrossRefGoogle Scholar
  24. 24.
    Sharma, V., Kumar, R., & Rathore, N. (2015). Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 6(3), 54–72.Google Scholar
  25. 25.
    Rathore, N., & Chana, I. (2014). Load balancing and job migration techniques in grid: A survey of recent trends. Wireless Personal Communications, 79(3), 2089–2125.CrossRefGoogle Scholar
  26. 26.
    Rathore, N., & Chana, I. (2014). Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing. Journal of Intelligent & Fuzzy Systems, 27(6), 2821–2833.Google Scholar
  27. 27.
    Rathore, N., & Singh, P. K. (2017). Comparative analysis of fuzzy based load balancing algorithms. i-manager’s Journal on Computer Science, 5(2), 23.Google Scholar
  28. 28.
    Rathore, N. K., & Singh, H. (2017). Analysis of grid simulators architecture. i-manager’s Journal on Mobile Applications and Technologies, 4(2), 32.CrossRefGoogle Scholar
  29. 29.
    Rathore, N. K. (2016). Checkpointing: Fault tolerance mechanism. Journal on Cloud Computing (JCC), 3(4), 27–34.Google Scholar
  30. 30.
    Rathore, N. (2017). A review towards: Load balancing techniques. i-manager’s Journal on Power Systems Engineering, 4(4):47.CrossRefGoogle Scholar
  31. 31.
    Rathore, N. K. (2016). Faults in grid. International Journal of Software and Computer Science Engineering, 1(1), 1–19.MathSciNetGoogle Scholar
  32. 32.
    Rathore, N. K. (2016). Installation of Alchemi.NET in Computational Grid. Journal on Computer Science (JCOM), 4(2), 1–5.MathSciNetGoogle Scholar
  33. 33.
    Rathore, N. K. (2016). Ethical hacking & security against cyber crime. Journal on Information Technology (JIT), 5(1), 7–11.MathSciNetGoogle Scholar
  34. 34.
    Rathore, N. K. (2015). Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. Journal on Computer Science (JCOM), 3(3), 11–22.Google Scholar
  35. 35.
    Rathore, N. K. (2015). Map reduce architecture for grid. Journal on Software Engineering (JSE), 10(1), 21–30.Google Scholar
  36. 36.
    Rathore, N. K. (2015). GridSim installation and implementation process. Journal on Cloud Computing (JCC), 2(4), 29–40.Google Scholar
  37. 37.
    Rathore, N. K., & Chana, I. (2013). Report on hierarchal load balancing technique in grid environment. Journal on Information Technology (JIT), 2(4), 21–35.Google Scholar
  38. 38.
    Rathore, N. K., & Chana, I. (2010). Checkpointing algorithm in alchemi.NET. Pragyaan: Journal of Information Technology, 8(1), 32–38.Google Scholar
  39. 39.
    Rathore, N. K., & Chana, I. (2013). A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In International conference IEEE-ISPC (pp. 1–6).Google Scholar
  40. 40.
    Prakash, O., Srivastava, R., Khare, A. (2013). Biorthogonal wavelet transform based image fusion using absolute maximum fusion rule. In Proceedings of IEEE conference on information and communication technologies (ICT 2013).Google Scholar
  41. 41.
    Rathore, N. K., & Chana, I. (2011). A cognitative analysis of load balancing technique with job migration in grid environment. In World congress on information and communication technology (WICT), Mumbai, IEEE proceedings paper (pp. 77–82).Google Scholar
  42. 42.
    Rathore, N. K. (2015). Efficient load balancing algorithm in grid. In 30th M.P. Young Scientist congress, Bhopal, M.P. (pp. 56).Google Scholar
  43. 43.
    Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.CrossRefGoogle Scholar
  44. 44.
    Chouhan, R., & Rathore, N. K. (2012). Comparision of load balancing technique in grid. In 17th annual conference of Gwalior academy of mathematical science and national symposium on computational mathamatics & information technology, JUET, Guna, M.P. (pp. 7–9).Google Scholar
  45. 45.
    Kaur, S., & Dadhwal, H. S. (2015). Biorthogonal wavelet transform using bilateral filter and adaptive histogram equalization. International Journal of Intelligent Systems and Applications, 7(3), 37.CrossRefGoogle Scholar
  46. 46.
    Li, N., Liu, C., He, C., Li, Y., & Zha, X. F. (2011). Gear fault detection based on adaptive wavelet packet feature extraction and relevance vector machine. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 225(11), 2727–2738.Google Scholar
  47. 47.
    Rathore, N. K., & Chana, I. (2010). Fault tolerance algorithm in Alchemi.NET Middleware. In National conference on education & research (ConFR10), third CSI national conference of CSI division V, Bhopal Chapter, IEEE Bombay, and MPCST Bhopal, organized by JUIT, India, 6–7th Mar 2010.Google Scholar
  48. 48.
    Rathore, N. K., & Chana, I. (2009). Checkpointing algorithm in Alchemi.NET. In Annual conference of Vijnana Parishad of India and national symposium recent development in applied mathematics & information technology, JUET, Guna, M.P.Google Scholar
  49. 49.
    Rathore, N. K., & Chana, I. (2008). Comparative analysis of Checkpointing. In PIMR third national IT conference, IT enabled practices and emerging management paradigm book and category is communication technologies and security issues (pp. 32–35) Topic No/Name-46, Prestige Management and Research, Indore, (MP) India.Google Scholar
  50. 50.
    Rathore, N. K., & Chana, I. (2018). An efficient load balancing technique for grid. In Scholar’s press, Mauritius.Google Scholar
  51. 51.
    He, L., Tong, X., & Huang, S. (2012). A glowworm swarm optimization algorithm with improved movement rule.” In 2012 fifth international conference on intelligent networks and intelligent systems (ICINIS) (pp. 109–112). IEEE.Google Scholar
  52. 52.
    Rathore, N. K., & Singh, P. (2016). An efficient load balancing algorithm in distributed networks, Lambert Academic Publication House (LBA), Germany.Google Scholar
  53. 53.
    Rathore, N. K., & Chana, I. (2016). An enhancement of gridsim architecture with load balancing. In Scholar’s press.Google Scholar
  54. 54.
    Rathore, N. K., & Sharma, A. (2015). Efficient dynamic distributed load balancing technique. In Lambert Academic Publication House, Germany.Google Scholar
  55. 55.
    Rathore, N. K., & Chana, I. (2010). Checkpointing Algorithm in Alchemi.NET. In Lambert Academic Publication House (LBA), Germany.Google Scholar
  56. 56.
    Hashmi, M. F., & Keskar, A. G. (2015). Image forgery authentication and classification using hybridization of HMM and SVM classifier. International Journal of Security & Its Applications, 9, 125–140.CrossRefGoogle Scholar
  57. 57.
    Tralic, D., Zupancic, I., Grgic, S., & Grgic, M. (2013). CoMoFoD—New database for copy-move forgery detection. In Proceedings of 55th international symposium ELMAR-2013 (pp. 49–54).Google Scholar
  58. 58.
    Cozzolino, D., Gargiulo, F., Sansone, C., & Verdoliva, L. (2013). Multiple classifier systems for image forgery detection. In Proceedings of the image analysis and processing (ICIAP).Google Scholar
  59. 59.
    Rathore, N. (2016). Efficient load balancing algorithm. Wireless Personal Communication.  https://doi.org/10.1007/s11277-016-3452-0.Google Scholar
  60. 60.
    Rathore, N., & Chana, I. (2016). Job migration policies for grid environment. Wireless Personal Communication, 89(1), 241–269.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Neelesh Kumar Jain
    • 1
  • Neeraj Kumar Rathore
    • 1
  • Amit Mishra
    • 2
  1. 1.Jaypee University of Engineering and TechnologyGunaIndia
  2. 2.Thapar UniversityPatialaIndia

Personalised recommendations