Abstract
Nowadays, the development of refined image processing and software editing tools has finish the exploitation of digital images easily and invisible the image to the normal eyes and this process known as image fakery. Image security is one of the key issues in any field that makes use of digital images. Copy-move forgery (CMF) is the most effective and simple scheme to create forged digital images. In general, the methodologies based on Scale Invariant Feature Transform (SIFT) are widely used to detect CMF. Unfortunately, the detection performance of all SIFT based CMF detection approaches are extremely dependent on the selection of feature vectors. The values of these parameters are often determined through experience or some experiments on a number of forgery images. However, these experience parameter values are not applicable to every image thereby offers a limited usefulness. This paper deals the CMF problem using improved Relevance Vector Machine technique. The key idea of the IVRM is to apply Biorthogonal Wavelet Transform based scheme on image for feature extraction. The feature vectors are then stored lexicographically and similarity of vectors is decided using Minkowski distance and threshold value. The simulation results of proposed technique show a significant improvement in accuracy, sensitivity, and specificity rates over others existing schemes.
Similar content being viewed by others
References
Elwin, J. G. R., Aditya, T. S., & Madhu Shankar, S. (2010). Survey on passive methods of image tampering detection. In Proceedings of the international conference on communication and computational intelligence (INCOCCI’10) (pp. 431–436).
Redi, J. A., Taktak, W., & Dugelay, J.-L. (2011). Digital image forensics: A booklet for beginners. Multimedia Tools and Applications, 51(1), 133–162.
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099–1110.
Pan, X., & Lyu, S. (2010). Detecting image region duplication using sift features. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP’10) (pp.1706–1709).
Chauhana, D., Kasatb, D., Jainc, S., Thakared, V. (2016) Survey on keypoint based copy-move forgery detection methods on image. In Elsevier—International Conference on Computational Modeling and Security (CMS 2016) (pp. 206–212).
Malviya, A., & Ladhake, S. (2016). An image forensic technique for detection of copy-move forgery in digital image. In International symposium on security in computing and communication (pp. 328–335). Springer Singapore.
Al-Qershi, O. M., & Khoo, B. E. (2016). Copy-move forgery detection using on locality sensitive hashing and k-means clustering. In Information science and applications (ICISA) 2016 (pp. 663–672). Springer Singapore.
Ustubioglu, B., Ulutas, G., Ulutas, M., & Nabiyev, V. V. (2016). A new copy move forgery detection technique with automatic threshold determination. International Journal of Electronics and Communications, 70(8), 1076–1087.
Kaushik, R., Bajaj, R. K., & Mathew, J. (2015). On image forgery detection using two dimensional discrete cosine transform and statistical moments. Procedia Computer Science, 70, 130–136.
Isaac, M. M., & Wilscy, M. (2015). Image forgery detection based on Gabor Wavelets and Local Phase Quantization. Procedia Computer Science, Elsevier, 58, 76–83.
Pun, C.-M., Yuanand, X.-C., & Bi, X.-L. (2015). Image forgery detection using adaptive over-segmentation and feature point matching. IEEE Transactions on Information Forensics and Security, 10(8), 1705–1716.
Ardizzone, E., Bruno, A., & Mazzola, G. (2015). Copy-move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensisics and Security, 10(10), 2084–2094.
Anand, V., Hashmi, M. F. & Keskar, A. G. (2014). A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods. In Proceedings of the 6th Asian conference on intelligent information and database systems (ACIIDS 2014). Springer International Publishing, pp. 530–542.
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., & Serra, G. (2013). Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Processing: Image Communication, 28(6), 659–669.
Hashmi, M. F., A. R. Hambarde, & A. G. Keskar (2013). Copy move forgery detection using DWT and SIFT features. In Proceedings of 13th IEEE international conference on intelligent systems design and applications (ISDA-2013) (pp. 188–193).
Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231(1), 284–295.
Christlein, V., & Jordan, J. (2012). An evaluation of popular copy-move forgery detection approaches. In IEEE transactions on information forensics and security (pp. 1–26).
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transaction on Information Forensics and Security, 6(3), 1099–1110.
Muhammad, G., Hussain, M., Khawaji, K., & Bebis, G. (2011). Blind copy move image forgery detection using dyadic undecimated wavelet transform. In: Proceedings of IEEE 17th international conference on digital signal processing (DSP-2011) (pp. 1–6).
Rathore, N. (2018). Performance of hybrid load balancing algorithm in distributed web server system. Wireless Personal Communication. https://doi.org/10.1007/s11277-018-5758-6.
Jain, N., Rathore, N., & Mishra, A. (2017). An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks. Interciencia Journal, 42(11), 95–120.
Rathore, N. (2016). Dynamic threshold based load balancing algorithms. Wireless Personal Communications, 91(1), 151–185.
Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.
Sharma, V., Kumar, R., & Rathore, N. (2015). Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 6(3), 54–72.
Rathore, N., & Chana, I. (2014). Load balancing and job migration techniques in grid: A survey of recent trends. Wireless Personal Communications, 79(3), 2089–2125.
Rathore, N., & Chana, I. (2014). Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing. Journal of Intelligent & Fuzzy Systems, 27(6), 2821–2833.
Rathore, N., & Singh, P. K. (2017). Comparative analysis of fuzzy based load balancing algorithms. i-manager’s Journal on Computer Science, 5(2), 23.
Rathore, N. K., & Singh, H. (2017). Analysis of grid simulators architecture. i-manager’s Journal on Mobile Applications and Technologies, 4(2), 32.
Rathore, N. K. (2016). Checkpointing: Fault tolerance mechanism. Journal on Cloud Computing (JCC), 3(4), 27–34.
Rathore, N. (2017). A review towards: Load balancing techniques. i-manager’s Journal on Power Systems Engineering, 4(4):47.
Rathore, N. K. (2016). Faults in grid. International Journal of Software and Computer Science Engineering, 1(1), 1–19.
Rathore, N. K. (2016). Installation of Alchemi.NET in Computational Grid. Journal on Computer Science (JCOM), 4(2), 1–5.
Rathore, N. K. (2016). Ethical hacking & security against cyber crime. Journal on Information Technology (JIT), 5(1), 7–11.
Rathore, N. K. (2015). Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. Journal on Computer Science (JCOM), 3(3), 11–22.
Rathore, N. K. (2015). Map reduce architecture for grid. Journal on Software Engineering (JSE), 10(1), 21–30.
Rathore, N. K. (2015). GridSim installation and implementation process. Journal on Cloud Computing (JCC), 2(4), 29–40.
Rathore, N. K., & Chana, I. (2013). Report on hierarchal load balancing technique in grid environment. Journal on Information Technology (JIT), 2(4), 21–35.
Rathore, N. K., & Chana, I. (2010). Checkpointing algorithm in alchemi.NET. Pragyaan: Journal of Information Technology, 8(1), 32–38.
Rathore, N. K., & Chana, I. (2013). A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In International conference IEEE-ISPC (pp. 1–6).
Prakash, O., Srivastava, R., Khare, A. (2013). Biorthogonal wavelet transform based image fusion using absolute maximum fusion rule. In Proceedings of IEEE conference on information and communication technologies (ICT 2013).
Rathore, N. K., & Chana, I. (2011). A cognitative analysis of load balancing technique with job migration in grid environment. In World congress on information and communication technology (WICT), Mumbai, IEEE proceedings paper (pp. 77–82).
Rathore, N. K. (2015). Efficient load balancing algorithm in grid. In 30th M.P. Young Scientist congress, Bhopal, M.P. (pp. 56).
Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.
Chouhan, R., & Rathore, N. K. (2012). Comparision of load balancing technique in grid. In 17th annual conference of Gwalior academy of mathematical science and national symposium on computational mathamatics & information technology, JUET, Guna, M.P. (pp. 7–9).
Kaur, S., & Dadhwal, H. S. (2015). Biorthogonal wavelet transform using bilateral filter and adaptive histogram equalization. International Journal of Intelligent Systems and Applications, 7(3), 37.
Li, N., Liu, C., He, C., Li, Y., & Zha, X. F. (2011). Gear fault detection based on adaptive wavelet packet feature extraction and relevance vector machine. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 225(11), 2727–2738.
Rathore, N. K., & Chana, I. (2010). Fault tolerance algorithm in Alchemi.NET Middleware. In National conference on education & research (ConFR10), third CSI national conference of CSI division V, Bhopal Chapter, IEEE Bombay, and MPCST Bhopal, organized by JUIT, India, 6–7th Mar 2010.
Rathore, N. K., & Chana, I. (2009). Checkpointing algorithm in Alchemi.NET. In Annual conference of Vijnana Parishad of India and national symposium recent development in applied mathematics & information technology, JUET, Guna, M.P.
Rathore, N. K., & Chana, I. (2008). Comparative analysis of Checkpointing. In PIMR third national IT conference, IT enabled practices and emerging management paradigm book and category is communication technologies and security issues (pp. 32–35) Topic No/Name-46, Prestige Management and Research, Indore, (MP) India.
Rathore, N. K., & Chana, I. (2018). An efficient load balancing technique for grid. In Scholar’s press, Mauritius.
He, L., Tong, X., & Huang, S. (2012). A glowworm swarm optimization algorithm with improved movement rule.” In 2012 fifth international conference on intelligent networks and intelligent systems (ICINIS) (pp. 109–112). IEEE.
Rathore, N. K., & Singh, P. (2016). An efficient load balancing algorithm in distributed networks, Lambert Academic Publication House (LBA), Germany.
Rathore, N. K., & Chana, I. (2016). An enhancement of gridsim architecture with load balancing. In Scholar’s press.
Rathore, N. K., & Sharma, A. (2015). Efficient dynamic distributed load balancing technique. In Lambert Academic Publication House, Germany.
Rathore, N. K., & Chana, I. (2010). Checkpointing Algorithm in Alchemi.NET. In Lambert Academic Publication House (LBA), Germany.
Hashmi, M. F., & Keskar, A. G. (2015). Image forgery authentication and classification using hybridization of HMM and SVM classifier. International Journal of Security & Its Applications, 9, 125–140.
Tralic, D., Zupancic, I., Grgic, S., & Grgic, M. (2013). CoMoFoD—New database for copy-move forgery detection. In Proceedings of 55th international symposium ELMAR-2013 (pp. 49–54).
Cozzolino, D., Gargiulo, F., Sansone, C., & Verdoliva, L. (2013). Multiple classifier systems for image forgery detection. In Proceedings of the image analysis and processing (ICIAP).
Rathore, N. (2016). Efficient load balancing algorithm. Wireless Personal Communication. https://doi.org/10.1007/s11277-016-3452-0.
Rathore, N., & Chana, I. (2016). Job migration policies for grid environment. Wireless Personal Communication, 89(1), 241–269.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jain, N.K., Rathore, N.K. & Mishra, A. An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine. Wireless Pers Commun 101, 1983–2008 (2018). https://doi.org/10.1007/s11277-018-5802-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5802-6