Abstract
To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform with Singular Value Decomposition (BWT-SVD)-based feature extraction is applied to find the image forgery. The proposed method begins with dividing the test images into overlapping blocks, and then Biorthogonal Wavelet Transform (BWT) with Singular Value Decomposition (SVD) applies to extract the feature vector from the blocks. After that, the feature vectors are sorts and the duplicate vectors are identified by the similarity between two successive vectors. The occurrences of clone vectors are identified on the basis of Minkowski distance and the threshold value. Then, similarity criteria result in the existence of forgery in images. To classify images into the category of authentic images or forged images, improved version of Relevance Vector Machine (RVM) uses, which leads to efficiency and accuracy of forged image identification process. Performance of proposed scheme tests by performing experiments on CoMoFoD database. The simulation results show that the proposed IRVM scheme attained high performance when compared with existing Copy-Move based image Forgery Detection schemes in MATLAB environment.
References
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110
Rathore N, Chana I (2014) Load balancing and job migration techniques in grid: a survey of recent trends. Wirel Pers Commun 79(3):2089–2125
Kuznetsov AV, Myasnikov VV (2016) A copy-move detection algorithm based on binary gradient contours. Comput Opt 40:284–293
Ranjani MB, Poovendran R (2016) Image duplication copy move forgery detection using discrete cosine transforms method. Int J Appl Eng Res 11(4):2671–2674
Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. Int J Electron Commun 70(8):1076–1087
Puri M, Chopra V (2016) A survey: copy-move forgery detection methods. Int J Comput Syst 3(9):582–586
Rathore NK (2016) Ethical hacking & security against cyber Crime. J Inf Technol 5(1):7–11
Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. Int J Electron Commun 70:1076–1087
Rathore N, Chana I (2014) Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing. J Intell Fuzzy Syst 27(6):2821–2833
Goyal H, Gulati T (2014) Robust copy-move image forgery detection using SIFT. Int J Comput Sci Appl 97:14–19
Rathore NK, Chana I (2008) Comparative analysis of checkpointing. In: PIMR 3rd National IT conference, IT enabled practices and emerging management Paradigm book and category is communication technologies and security issues, Topic No/Name-46, Prestige Management and Research, Indore, pp 32–35
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Forensics Secur 6(3):1099–1110
Rathore NK, Chana I (2011) A cognitative analysis of load balancing technique with job migration in grid environment. In: World congress on information and communication technology (WICT), IEEE proceedings paper, Mumbai, ISBN 978-1-4673-0127-5, December 2011, pp 77–82
Zhang G, Wang H (2012) SURF based detection of copy-move forgery in flat region. Int J Adv Comput Technol. https://doi.org/10.4156/ijact
Rathore N, Chana I (2015) Variable threshold-based hierarchical load balancing technique in Grid. Eng Comput 31(3):597–615
Li L, Li S, Zhu H (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimed Signal Process 4:46–56
Rathore NK, Chana I (2013) A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In: International conference IEEE-ISPC, ISBN 978-1-4673-6188-0, 26–28 Sept 2013, pp 1–6
Ayumi V, Fanany MI (2015) Distribution-sensitive learning on relevance vector machine for pose-based human gesture recognition. Procedia Comput Sci 72:527–534
Rathore NK (2015) Map reduce architecture for grid. J Softw Eng 10(1):21–30
Zainal N, Zain AM, Radzi NHM, Othman MR (2016) Glowworm swarm optimization (GSO) for optimization of machining parameters. J Intell Manuf 27(4):797–804
Rathore NK (2014) Efficient hierarchical load balancing technique based on grid. In: 29th M. P. Young scientist congress, Bhopal, Feb 28, 2014, pp 55
Huynh-Kha T, Le-Tien T, Ha-Viet-Uyen S, Huynh-Van K, Luong M (2016) A robust algorithm of forgery detection in copy-move and spliced images. Int J Adv Comput Sci Appl 7(3):1–8
Rathore N (2018) Performance of hybrid load balancing algorithm in distributed web server system. Wirel Pers Commun 101(4):1233–1246
Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD-new database for copy-move forgery detection. In: Proceedings of the 55th international symposium ELMAR-2013, pp 49–54
Rathore NK (2015) Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. J Comput Sci 3(3):11–22
Jain N, Rathore N, Mishra A (2017) An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks. Interciencia J 42(11):95–120
Kaur Savroop, Dadhwal Hartej S (2015) Biorthogonal wavelet transform using bilateral filter and adaptive histogram equalization. Int J Intell Syst Appl 7(3):37
Rathore N (2016) Dynamic threshold based load balancing algorithms. Wirel Pers Commun 91(1):151–185
Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1):284–295
Rathore N, Rawat U, Kulhari SC (2019) Efficient hybrid load balancing algorithm. Natl Acad Sci Lett. https://doi.org/10.1007/s40009-019-00834-w
Jain N, Rathore N, Mishra A (2018) An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine. Wirel Pers Commun 101(4):1983–2008
Rathore N, Chana I (2016) Job migration policies for grid environment. Wirel Pers Commun 89(1):241–269
Sharma V, Kumar R, Rathore NK (2015) Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 6(3):54–72
Rathore NK, Chana I (2013) Report on hierarchal load balancing technique in grid environment. J Inf Technol 2(4):21–35
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rathore, N.K., Jain, N.K., Shukla, P.K. et al. Image Forgery Detection Using Singular Value Decomposition with Some Attacks. Natl. Acad. Sci. Lett. 44, 331–338 (2021). https://doi.org/10.1007/s40009-020-00998-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40009-020-00998-w