Advertisement

DBFS: Dragonfly Bayes Fusion System to detect the tampered JPEG image for forensic analysis

  • Priya M. ShelkeEmail author
  • Rajesh S. Prasad
Special Issue
  • 18 Downloads

Abstract

Due to the advancement of a variety of photo editing and image processing software, image forensics analysis has become an important research topic in recent years. Numbers of research works are presented for image forensic analysis. Accordingly, this paper proposes a method named as Dragonfly Bayes Fusion System (DBFS) by integrating the Naive Bayes (NB) classifier and the Dragonfly optimization for detecting the tampered Joint Photographic Experts Group image. Initially, the input image is applied to the existing six forensic tools separately, and the classified binary map is generated. Then, the proposed DBFS fuses these decisions for generating the optimal decision. Here, the NB classifier creates the model by finding the mean and variance of every feature and this model is given as input to the Dragonfly optimization for optimally generating the probabilistic measures. Finally, the posterior probability of each feature is determined with respect to the tampered class, and the original class and the tampered image block is determined. The performance of the proposed system is evaluated with the existing methods, such as fuzzy theory based classification, rule-based classification, average method, and weighted average method for the evaluation metrics accuracy, False Positive Rate (FPR), and True Positive Rate (TPR). The experimental results show that the proposed system outperforms the existing methods by obtaining the maximum accuracy of 0.9519, minimum FPR of 0.0490, and maximum TPR of 0.8720 when compared to the existing methods.

Keywords

Naive Bayes classifier Dragonfly optimization Image forensics Classified binary map JPEG image 

Notes

References

  1. 1.
    Bianchi T, De Rosa A, Piva A (2011) Improved DCT coefficient analysis for forgery localization in JPEG images. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing (ICASSP)Google Scholar
  2. 2.
    Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf Forensics Secur 7(5):1566–1577CrossRefGoogle Scholar
  3. 3.
    Farid H (2009) A survey of image forgery detection. IEEE Signal Processing 2(26):16–25CrossRefGoogle Scholar
  4. 4.
    Popescu AC, Farid H (2004) Statistical tools for digital forensics. In: Proceedings of the 6th international workshop on information hiding, Berlin, Germany, pp 128–147Google Scholar
  5. 5.
    Fu D, Shi YQ, Su W (2007) A generalized Benford’s law for JPEG coefficients and its applications image forensics. In: Proceedings of the SPIE, the international society of optical engineering, vol 6505Google Scholar
  6. 6.
    Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensics Secur 7(3):1003–1017CrossRefGoogle Scholar
  7. 7.
    Luo W, Qu Z, Huang J, Qui G (2007) A novel method for detecting cropped and recompressed image block. In: Proceedings of the IEEE international conference on acoustics, speech and signal processingGoogle Scholar
  8. 8.
    Barni M, Costanzo A, Sabatini L (2010) Identification of cut and paste tampering by means of double-JPEG detection and image segmentation. In: Proceedings of the IEEE international symposium on circuits and systems (ISCAS), pp 1687–1690Google Scholar
  9. 9.
    Lie WN, Lin GS, Cheng SL (2006) Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. IEEE Trans Inf Forensics Secur 1(3):330–341CrossRefGoogle Scholar
  10. 10.
    Ng TT, Chang SF, Sun Q (2004) Blind detection of photo montage using higher order statistics. In: Proceedings of the IEEE international symposium on circuits and systems, Vancouver, Canada, pp 688–691Google Scholar
  11. 11.
    Li WH, Wang B (2007) A statistical analysis on differential signals for noise level estimation. In: Proceedings of the sixth international conference on machine learning and cybernetics, Hong Kong, China, pp 2150–2153Google Scholar
  12. 12.
    Popescu AC, Farid H (2004) Statistical tools for digital forensics. In: Proceedings of the 6th international workshop on information hiding, Toronto, Canada, pp 128–147Google Scholar
  13. 13.
    Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated image. IEEE Trans Signal Process 53(10):3948–3959MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214CrossRefGoogle Scholar
  15. 15.
    Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on multimedia and security, pp 1–10Google Scholar
  16. 16.
    Li W, Yuan Y, Yu N (2009) Passive detection of doctored JPEG image via block artefact grid extraction. Sig Process 89(9):1821–1829CrossRefzbMATHGoogle Scholar
  17. 17.
    Lin Z, He J, Tang X, Tang C-K (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit 42(11):2492–2501CrossRefzbMATHGoogle Scholar
  18. 18.
    Ye S, Sun Q, Chang E-C (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: Proceedings of the IEEE international conference on multimedia and expoGoogle Scholar
  19. 19.
    Barni M, Costanzo A (2012) A fuzzy approach to deal with uncertainty in image forensics. Sig Process Image Commun 27(9):998–1010CrossRefGoogle Scholar
  20. 20.
    Fontani M, Bianchi T, De Rosa A, Piva A, Barni M (2011) A dempster-shafer framework for decision fusion in image forensics. In: Proceedings of the IEEE international workshop on information forensics and security (WIFS)Google Scholar
  21. 21.
    Liu Q, Chen Z (2015) Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images. ACM Trans Intell Syst Technol 5(4):1–30Google Scholar
  22. 22.
    Hu W-C, Chen W-H, Huang D-Y, Yang C-Y (2016) Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimedia Tools Appl 75(6):3495–3516CrossRefGoogle Scholar
  23. 23.
    Yang B, Lei Y, Yan B (2016) Distributed multi-human location algorithm using Naive Bayes classifier for a binary pyroelectric infrared sensor tracking system. IEEE Sens J 16(1):216–223CrossRefGoogle Scholar
  24. 24.
    Mirjalili S (2016) Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput Appl 27(4):1053–1073CrossRefGoogle Scholar
  25. 25.
    UCID: an uncompressed color image database from http://adsabs.harvard.edu/abs/2003SPIE.5307..472S. Accessed 22 Apr 2018
  26. 26.
    Bianchi T, De Rosa A, Piva A (2011) Improved DCT coefficient analysis for forgery localization in JPEG images. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 2444–2447Google Scholar
  27. 27.
    Bianchi T, Piva A (2011) Detection of non-aligned double JPEG compression with estimation of primary compression parameters. In: Proceedings of 18th IEEE international conference on image processing (ICIP), pp 1929–1932Google Scholar
  28. 28.
    Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566–1577CrossRefGoogle Scholar
  29. 29.
    Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRefGoogle Scholar
  30. 30.
    Ramya M (2014) An efficient method for detecting forged images using fuzzy based framework theory. Int J Comput Trends Technol (IJCTT) 12(1):1–5CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Vishwakarma Institute of Information TechnologyKondhwa, PuneIndia
  2. 2.STES’s Sinhgad Institute of Technology and ScienceNarhe, PuneIndia

Personalised recommendations