Analysis of Image Inconsistency Based on Discrete Cosine Transform (DCT)
Conference paper
First Online:
- 375 Downloads
Abstract
The popularity of Digital Image has widely increased in society. Nowadays, by the easy availability of image editing software people can manipulate the image for malicious intent. Our proposed method is to detect inconsistency in the exact area of an image. The paper involves different steps, i.e., preprocessing, feature extraction, and matching processes. In feature extraction, we apply Discrete Cosine Transform (DCT). Evaluate our system by calculating True Positive Rate (TPR), False Positive Rate (FPR), and Area Under the Curve (AUC) of 0.3372, 0.5278, and 0.949, respectively. The results show more efficiency.
Keywords
DCT FPR TPR AUC Feature extractionReferences
- 1.Fridrich, A.J., Soukal, B.D., Lukáš, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)Google Scholar
- 2.Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)CrossRefGoogle Scholar
- 3.Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 6, 218932 (2002)CrossRefGoogle Scholar
- 4.Yeung, M.M.: Digital watermarking: marking the valuable while probing the invisible. Commun. ACM 41(7), 31–35 (1998)CrossRefGoogle Scholar
- 5.Lee, J.C., Chang, C.P., Chen, W.K.: Detection of copy–move image forgery using histogram of orientated gradients. Inf. Sci. 321, 250–262 (2015)CrossRefGoogle Scholar
- 6.Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3(3), 529–538 (2008)CrossRefGoogle Scholar
- 7.Zhang, Z., Ren, Y., Ping, X.J., He, Z.Y., Zhang, S.Z.: A survey on passive-blind image forgery by doctor method detection. Int. Conf. Mach. Learn. Cybern. 6, 3463–3467 (2008)Google Scholar
- 8.Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)CrossRefGoogle Scholar
- 9.Mushtaq, S., Mir, A.H.: Digital image forgeries and passive image authentication techniques: a survey. Int. J. Adv. Sci. Technol. 73, 15–32 (2014)CrossRefGoogle Scholar
- 10.Lin, S.D., et al.: An integrated technique for splicing and copy move forgery image detection. IEEE 4th International Congress on Image and Signal Processing (CISP) 2, 1086–1090 (2011)Google Scholar
- 11.Lin, Z., et al.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn. 42, 2492–2501 (2009)CrossRefGoogle Scholar
- 12.Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. Forensic. Sci. Int. 206, 178–184 (2011)CrossRefGoogle Scholar
- 13.Cao, Y., Gao, T., Yang, Q.: A robust detection algorithm for copy-move forgery in digital images. Forensic. Int. 214, 33–43 (2012)Google Scholar
- 14.Mahale, V.H., Ali, M.M.H., Yannawar, P.L., Gaikwad, A.T.: Image inconsistency detection using local binary pattern (LBP). Procedia Comput. Sci. 115, 501–508 (2017)CrossRefGoogle Scholar
- 15.Hilal, M.V., Yannawar, P., Gaikwad, A.T.: Image inconsistency detection using histogram of orientated gradient (HOG). In: 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), pp. 22–25. IEEE (2017)Google Scholar
- 16.Fadl, S.M., Semary, N.A.: A proposed accelerated image copy-move forgery detection. In: Visual Communications and Image Processing Conference, 2014 IEEE, pp. 253–257. IEEE (2014)Google Scholar
- 17.Elkan, C.: Using the triangle inequality to accelerate k-means. In: ICML. pp. 147–153 (2003)Google Scholar
- 18.CoMoFoD database. http://www.vcl.fer.hr/comofod
Copyright information
© Springer Nature Singapore Pte Ltd. 2019