Advertisement

Analysis of Image Inconsistency Based on Discrete Cosine Transform (DCT)

  • Vivek MahaleEmail author
  • Mouad M. H. Ali
  • Pravin L. Yannawar
  • Ashok Gaikwad
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 106)

Abstract

The popularity of Digital Image has widely increased in society. Nowadays, by the easy availability of image editing software people can manipulate the image for malicious intent. Our proposed method is to detect inconsistency in the exact area of an image. The paper involves different steps, i.e., preprocessing, feature extraction, and matching processes. In feature extraction, we apply Discrete Cosine Transform (DCT). Evaluate our system by calculating True Positive Rate (TPR), False Positive Rate (FPR), and Area Under the Curve (AUC) of 0.3372, 0.5278, and 0.949, respectively. The results show more efficiency.

Keywords

DCT FPR TPR AUC Feature extraction 

References

  1. 1.
    Fridrich, A.J., Soukal, B.D., Lukáš, A.J.: Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop (2003)Google Scholar
  2. 2.
    Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)CrossRefGoogle Scholar
  3. 3.
    Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 6, 218932 (2002)CrossRefGoogle Scholar
  4. 4.
    Yeung, M.M.: Digital watermarking: marking the valuable while probing the invisible. Commun. ACM 41(7), 31–35 (1998)CrossRefGoogle Scholar
  5. 5.
    Lee, J.C., Chang, C.P., Chen, W.K.: Detection of copy–move image forgery using histogram of orientated gradients. Inf. Sci. 321, 250–262 (2015)CrossRefGoogle Scholar
  6. 6.
    Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3(3), 529–538 (2008)CrossRefGoogle Scholar
  7. 7.
    Zhang, Z., Ren, Y., Ping, X.J., He, Z.Y., Zhang, S.Z.: A survey on passive-blind image forgery by doctor method detection. Int. Conf. Mach. Learn. Cybern. 6, 3463–3467 (2008)Google Scholar
  8. 8.
    Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)CrossRefGoogle Scholar
  9. 9.
    Mushtaq, S., Mir, A.H.: Digital image forgeries and passive image authentication techniques: a survey. Int. J. Adv. Sci. Technol. 73, 15–32 (2014)CrossRefGoogle Scholar
  10. 10.
    Lin, S.D., et al.: An integrated technique for splicing and copy move forgery image detection. IEEE 4th International Congress on Image and Signal Processing (CISP) 2, 1086–1090 (2011)Google Scholar
  11. 11.
    Lin, Z., et al.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn. 42, 2492–2501 (2009)CrossRefGoogle Scholar
  12. 12.
    Huang, Y., Lu, W., Sun, W., Long, D.: Improved DCT-based detection of copy-move forgery in images. Forensic. Sci. Int. 206, 178–184 (2011)CrossRefGoogle Scholar
  13. 13.
    Cao, Y., Gao, T., Yang, Q.: A robust detection algorithm for copy-move forgery in digital images. Forensic. Int. 214, 33–43 (2012)Google Scholar
  14. 14.
    Mahale, V.H., Ali, M.M.H., Yannawar, P.L., Gaikwad, A.T.: Image inconsistency detection using local binary pattern (LBP). Procedia Comput. Sci. 115, 501–508 (2017)CrossRefGoogle Scholar
  15. 15.
    Hilal, M.V., Yannawar, P., Gaikwad, A.T.: Image inconsistency detection using histogram of orientated gradient (HOG). In: 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), pp. 22–25. IEEE (2017)Google Scholar
  16. 16.
    Fadl, S.M., Semary, N.A.: A proposed accelerated image copy-move forgery detection. In: Visual Communications and Image Processing Conference, 2014 IEEE, pp. 253–257. IEEE (2014)Google Scholar
  17. 17.
    Elkan, C.: Using the triangle inequality to accelerate k-means. In: ICML. pp. 147–153 (2003)Google Scholar
  18. 18.

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Vivek Mahale
    • 1
    Email author
  • Mouad M. H. Ali
    • 1
  • Pravin L. Yannawar
    • 2
  • Ashok Gaikwad
    • 3
  1. 1.Department of CS & ITDr. Babasaheb Ambedkar Marathwada UniversityAurangabadIndia
  2. 2.Vison and Intelligent System Lab, Department of CS & ITDr. Babasaheb Ambedkar Marathwada UniversityAurangabadIndia
  3. 3.Institute of Management Studies and Information TechnologyAurangabadIndia

Personalised recommendations