[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Nowadays, the development of refined image processing and software editing tools has finish the exploitation of digital images easily and invisible the image to the normal eyes and this process known as image fakery. Image security is one of the key issues in any field that makes use of digital images. Copy-move forgery (CMF) is the most effective and simple scheme to create forged digital images. In general, the methodologies based on Scale Invariant Feature Transform (SIFT) are widely used to detect CMF. Unfortunately, the detection performance of all SIFT based CMF detection approaches are extremely dependent on the selection of feature vectors. The values of these parameters are often determined through experience or some experiments on a number of forgery images. However, these experience parameter values are not applicable to every image thereby offers a limited usefulness. This paper deals the CMF problem using improved Relevance Vector Machine technique. The key idea of the IVRM is to apply Biorthogonal Wavelet Transform based scheme on image for feature extraction. The feature vectors are then stored lexicographically and similarity of vectors is decided using Minkowski distance and threshold value. The simulation results of proposed technique show a significant improvement in accuracy, sensitivity, and specificity rates over others existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Elwin, J. G. R., Aditya, T. S., & Madhu Shankar, S. (2010). Survey on passive methods of image tampering detection. In Proceedings of the international conference on communication and computational intelligence (INCOCCI’10) (pp. 431–436).

  2. Redi, J. A., Taktak, W., & Dugelay, J.-L. (2011). Digital image forensics: A booklet for beginners. Multimedia Tools and Applications, 51(1), 133–162.

    Article  Google Scholar 

  3. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099–1110.

    Article  Google Scholar 

  4. Pan, X., & Lyu, S. (2010). Detecting image region duplication using sift features. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP’10) (pp.1706–1709).

  5. Chauhana, D., Kasatb, D., Jainc, S., Thakared, V. (2016) Survey on keypoint based copy-move forgery detection methods on image. In ElsevierInternational Conference on Computational Modeling and Security (CMS 2016) (pp. 206–212).

  6. Malviya, A., & Ladhake, S. (2016). An image forensic technique for detection of copy-move forgery in digital image. In International symposium on security in computing and communication (pp. 328–335). Springer Singapore.

  7. Al-Qershi, O. M., & Khoo, B. E. (2016). Copy-move forgery detection using on locality sensitive hashing and k-means clustering. In Information science and applications (ICISA) 2016 (pp. 663–672). Springer Singapore.

  8. Ustubioglu, B., Ulutas, G., Ulutas, M., & Nabiyev, V. V. (2016). A new copy move forgery detection technique with automatic threshold determination. International Journal of Electronics and Communications, 70(8), 1076–1087.

    Article  Google Scholar 

  9. Kaushik, R., Bajaj, R. K., & Mathew, J. (2015). On image forgery detection using two dimensional discrete cosine transform and statistical moments. Procedia Computer Science, 70, 130–136.

    Article  Google Scholar 

  10. Isaac, M. M., & Wilscy, M. (2015). Image forgery detection based on Gabor Wavelets and Local Phase Quantization. Procedia Computer Science, Elsevier, 58, 76–83.

    Article  Google Scholar 

  11. Pun, C.-M., Yuanand, X.-C., & Bi, X.-L. (2015). Image forgery detection using adaptive over-segmentation and feature point matching. IEEE Transactions on Information Forensics and Security, 10(8), 1705–1716.

    Article  Google Scholar 

  12. Ardizzone, E., Bruno, A., & Mazzola, G. (2015). Copy-move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensisics and Security, 10(10), 2084–2094.

    Article  Google Scholar 

  13. Anand, V., Hashmi, M. F. & Keskar, A. G. (2014). A copy move forgery detection to overcome sustained attacks using dyadic wavelet transform and SIFT methods. In Proceedings of the 6th Asian conference on intelligent information and database systems (ACIIDS 2014). Springer International Publishing, pp. 530–542.

  14. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., & Serra, G. (2013). Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Processing: Image Communication, 28(6), 659–669.

    Google Scholar 

  15. Hashmi, M. F., A. R. Hambarde, & A. G. Keskar (2013). Copy move forgery detection using DWT and SIFT features. In Proceedings of 13th IEEE international conference on intelligent systems design and applications (ISDA-2013) (pp. 188–193).

  16. Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231(1), 284–295.

    Article  Google Scholar 

  17. Christlein, V., & Jordan, J. (2012). An evaluation of popular copy-move forgery detection approaches. In IEEE transactions on information forensics and security (pp. 1–26).

  18. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transaction on Information Forensics and Security, 6(3), 1099–1110.

    Article  Google Scholar 

  19. Muhammad, G., Hussain, M., Khawaji, K., & Bebis, G. (2011). Blind copy move image forgery detection using dyadic undecimated wavelet transform. In: Proceedings of IEEE 17th international conference on digital signal processing (DSP-2011) (pp. 1–6).

  20. Rathore, N. (2018). Performance of hybrid load balancing algorithm in distributed web server system. Wireless Personal Communication. https://doi.org/10.1007/s11277-018-5758-6.

  21. Jain, N., Rathore, N., & Mishra, A. (2017). An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks. Interciencia Journal, 42(11), 95–120.

    Google Scholar 

  22. Rathore, N. (2016). Dynamic threshold based load balancing algorithms. Wireless Personal Communications, 91(1), 151–185.

    Article  MathSciNet  Google Scholar 

  23. Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.

    Article  Google Scholar 

  24. Sharma, V., Kumar, R., & Rathore, N. (2015). Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 6(3), 54–72.

    Google Scholar 

  25. Rathore, N., & Chana, I. (2014). Load balancing and job migration techniques in grid: A survey of recent trends. Wireless Personal Communications, 79(3), 2089–2125.

    Article  Google Scholar 

  26. Rathore, N., & Chana, I. (2014). Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing. Journal of Intelligent & Fuzzy Systems, 27(6), 2821–2833.

    Google Scholar 

  27. Rathore, N., & Singh, P. K. (2017). Comparative analysis of fuzzy based load balancing algorithms. i-manager’s Journal on Computer Science, 5(2), 23.

    Google Scholar 

  28. Rathore, N. K., & Singh, H. (2017). Analysis of grid simulators architecture. i-manager’s Journal on Mobile Applications and Technologies, 4(2), 32.

    Article  Google Scholar 

  29. Rathore, N. K. (2016). Checkpointing: Fault tolerance mechanism. Journal on Cloud Computing (JCC), 3(4), 27–34.

    Google Scholar 

  30. Rathore, N. (2017). A review towards: Load balancing techniques. i-manager’s Journal on Power Systems Engineering, 4(4):47.

    Article  Google Scholar 

  31. Rathore, N. K. (2016). Faults in grid. International Journal of Software and Computer Science Engineering, 1(1), 1–19.

    MathSciNet  Google Scholar 

  32. Rathore, N. K. (2016). Installation of Alchemi.NET in Computational Grid. Journal on Computer Science (JCOM), 4(2), 1–5.

    MathSciNet  Google Scholar 

  33. Rathore, N. K. (2016). Ethical hacking & security against cyber crime. Journal on Information Technology (JIT), 5(1), 7–11.

    MathSciNet  Google Scholar 

  34. Rathore, N. K. (2015). Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. Journal on Computer Science (JCOM), 3(3), 11–22.

    Google Scholar 

  35. Rathore, N. K. (2015). Map reduce architecture for grid. Journal on Software Engineering (JSE), 10(1), 21–30.

    Google Scholar 

  36. Rathore, N. K. (2015). GridSim installation and implementation process. Journal on Cloud Computing (JCC), 2(4), 29–40.

    Google Scholar 

  37. Rathore, N. K., & Chana, I. (2013). Report on hierarchal load balancing technique in grid environment. Journal on Information Technology (JIT), 2(4), 21–35.

    Google Scholar 

  38. Rathore, N. K., & Chana, I. (2010). Checkpointing algorithm in alchemi.NET. Pragyaan: Journal of Information Technology, 8(1), 32–38.

    Google Scholar 

  39. Rathore, N. K., & Chana, I. (2013). A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In International conference IEEE-ISPC (pp. 1–6).

    Google Scholar 

  40. Prakash, O., Srivastava, R., Khare, A. (2013). Biorthogonal wavelet transform based image fusion using absolute maximum fusion rule. In Proceedings of IEEE conference on information and communication technologies (ICT 2013).

  41. Rathore, N. K., & Chana, I. (2011). A cognitative analysis of load balancing technique with job migration in grid environment. In World congress on information and communication technology (WICT), Mumbai, IEEE proceedings paper (pp. 77–82).

    Google Scholar 

  42. Rathore, N. K. (2015). Efficient load balancing algorithm in grid. In 30th M.P. Young Scientist congress, Bhopal, M.P. (pp. 56).

    Google Scholar 

  43. Rathore, N., & Chana, I. (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31(3), 597–615.

    Article  Google Scholar 

  44. Chouhan, R., & Rathore, N. K. (2012). Comparision of load balancing technique in grid. In 17th annual conference of Gwalior academy of mathematical science and national symposium on computational mathamatics & information technology, JUET, Guna, M.P. (pp. 7–9).

    Google Scholar 

  45. Kaur, S., & Dadhwal, H. S. (2015). Biorthogonal wavelet transform using bilateral filter and adaptive histogram equalization. International Journal of Intelligent Systems and Applications, 7(3), 37.

    Article  Google Scholar 

  46. Li, N., Liu, C., He, C., Li, Y., & Zha, X. F. (2011). Gear fault detection based on adaptive wavelet packet feature extraction and relevance vector machine. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 225(11), 2727–2738.

    Google Scholar 

  47. Rathore, N. K., & Chana, I. (2010). Fault tolerance algorithm in Alchemi.NET Middleware. In National conference on education & research (ConFR10), third CSI national conference of CSI division V, Bhopal Chapter, IEEE Bombay, and MPCST Bhopal, organized by JUIT, India, 6–7th Mar 2010.

  48. Rathore, N. K., & Chana, I. (2009). Checkpointing algorithm in Alchemi.NET. In Annual conference of Vijnana Parishad of India and national symposium recent development in applied mathematics & information technology, JUET, Guna, M.P.

  49. Rathore, N. K., & Chana, I. (2008). Comparative analysis of Checkpointing. In PIMR third national IT conference, IT enabled practices and emerging management paradigm book and category is communication technologies and security issues (pp. 32–35) Topic No/Name-46, Prestige Management and Research, Indore, (MP) India.

  50. Rathore, N. K., & Chana, I. (2018). An efficient load balancing technique for grid. In Scholar’s press, Mauritius.

  51. He, L., Tong, X., & Huang, S. (2012). A glowworm swarm optimization algorithm with improved movement rule.” In 2012 fifth international conference on intelligent networks and intelligent systems (ICINIS) (pp. 109–112). IEEE.

  52. Rathore, N. K., & Singh, P. (2016). An efficient load balancing algorithm in distributed networks, Lambert Academic Publication House (LBA), Germany.

  53. Rathore, N. K., & Chana, I. (2016). An enhancement of gridsim architecture with load balancing. In Scholar’s press.

  54. Rathore, N. K., & Sharma, A. (2015). Efficient dynamic distributed load balancing technique. In Lambert Academic Publication House, Germany.

  55. Rathore, N. K., & Chana, I. (2010). Checkpointing Algorithm in Alchemi.NET. In Lambert Academic Publication House (LBA), Germany.

  56. Hashmi, M. F., & Keskar, A. G. (2015). Image forgery authentication and classification using hybridization of HMM and SVM classifier. International Journal of Security & Its Applications, 9, 125–140.

    Article  Google Scholar 

  57. Tralic, D., Zupancic, I., Grgic, S., & Grgic, M. (2013). CoMoFoD—New database for copy-move forgery detection. In Proceedings of 55th international symposium ELMAR-2013 (pp. 49–54).

  58. Cozzolino, D., Gargiulo, F., Sansone, C., & Verdoliva, L. (2013). Multiple classifier systems for image forgery detection. In Proceedings of the image analysis and processing (ICIAP).

  59. Rathore, N. (2016). Efficient load balancing algorithm. Wireless Personal Communication. https://doi.org/10.1007/s11277-016-3452-0.

    Google Scholar 

  60. Rathore, N., & Chana, I. (2016). Job migration policies for grid environment. Wireless Personal Communication, 89(1), 241–269.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neeraj Kumar Rathore.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jain, N.K., Rathore, N.K. & Mishra, A. An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine. Wireless Pers Commun 101, 1983–2008 (2018). https://doi.org/10.1007/s11277-018-5802-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5802-6

Keywords

Navigation