Detection of copy-move image forgery using SVD and cuckoo search algorithm
-
2018-04-15 https://doi.org/10.14419/ijet.v7i2.13.11604 -
Image Forgery Detection, Copy-Move, SVD, Cuckoo Search Algorithm. -
Abstract
Copy-move Copy move forgery (CMF) is one of the straightforward strategies to create forged images. To detect this kind of forgery one of the widely used method is single value decomposition (SVD). Few methods based on SVD are most acceptable but some methods are less acceptable because these methods highly depend on those parameters value, which is manually selected depending upon the tampered images. For different images, we require different parameter values. In this paper, we have proposed a novel method, which uses both copy-move forgery detection using SVD and Cuckoo search (CS) algorithm. It utilizes Cuckoo search algorithm to generate customized parameter values for different tampered images, which are used in copy-move forgery detection (CMFD) under block based framework.
Â
-
References
[1] V. Christlein, C. Riess, J. Jordan, C. Riess and E. Angelopoulou, “An Evaluation of Popular Copy-Move Forgery Detection Approaches,†IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, Dec. 2012.
[2] S. Wenchang, Z. Fei, Q. Bo and L. Bin, “Improving image copy-move forgery detection with particle swarm optimization techniques,†in Proc. in China Communications, vol. 13, no. 1, pp. 139-149, Jan. 2016.
[3] Z. Moghaddasi, H. A. Jalab and R. M. Noor, “SVD-based image splicing detection,†in Proc. IEEE Int. Conf. Image Processing (ICIP), Singapore, Oct. 24-27, 2004, Vol.2, pp. 1169-1172.
[4] G. Gul and F. Kurugollu, “SVD-Based Universal Spatial Domain Image Steganalysis,†IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 349-353, June 2010.
[5] Baker, K., “Singular value decomposition tutorial,†The Ohio State University, 2005.
[6] Rahul Pandit; Nindhiya Khosla; Gurjeet Singh; Hiteshwari Sharma, “Image Compression and Quality Factor in case of JPEG Image
Format,†International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 7, July 2013.
[7] X. S. Yang and Suash Deb, “Cuckoo Search via Levy flights,†in World Congress on Nature and Biologically Inspired Computing, (NaBIC) 2009, Coimbatore, 2009, pp. 210-214.
[8] S. Tian et al., “Application of Cuckoo Search algorithm in power network planning,†in Proc. IEEE 5th Int. Conf. Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), 2015, Changsha, 2015, pp. 604-608.
[9] H. Rakhshani, A. Rahati and E. Dehghanian, “Cuckoo search algorithm and its application for secondary protein structure prediction,†in Proc. IEEE 2nd Int. Conf. Knowledge-Based Engineering and Innovation (KBEI), 2015, Tehran, 2015, pp. 412-417.
[10] Q. Liu , A. Sung, M. Qiao, Z. Chen and B. Ribeiro, “An Improved Approach to Steganalysis of JPEG Images,†in Information Sciences, 180 (9), pp. 1643-1655, 2010.
[11] H. Farid, “Image forgery detection,†IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, March 2009.
[12] Babak Mahdian; Stanislav Saic, “Detection of copy-move forgery using a method based on blur moment invariants,†in Forensic Science International, vol. 171, nos. 23, pp. 180-189, Sep. 2006.
[13] J. Fridrich, D. Soukal, and J. Lukas, “Detection of copy-move forgery in digital images,†in in Proc. Digit. Forensic Res. Workshop (DFRWS), Cleveland, OH, USA, 2003, pp. 134-137.
[14] J. Flusser and T. Suk, “Degraded image analysis: an invariant approach,†IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 6, pp. 590-603, Jun 1998.
[15] A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,†in Dept. Comput. Sci., Dartmouth College, Hanover, NH, USA, Tech. Rep. TR, 2004.
[16] Khodayari Bavil, A., Razavi, S.E., On the thermo-flow behavior in a rectangular channel with skewed circular ribs, Mechanics & Industry, 18 2 (2017) 225, https://doi.org/10.1051/meca/2016057.
[17] X. Kang and S. Wei, “Identifying tampered regions using singular value decomposition in digital image forensics,†in in Proc. Int. Conf. Comput. Sci. Softw. Eng., vol. 3. Dec. 2008, pp. 926-930.
[18] S. Bayram, H. T. Sencar, and N. Memon, “An efficient and robust method for detecting copy-move forgery,†in in Proc. IEEE Int. Conf.
Acoust, Speech Signal Process. (ICASSP), Apr. 2009, pp. 1053-1056.
[19] A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,†IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758-767, Feb. 2005.
[20] H.J. Lin, C.W. Wang, and Y.T. Kao, “Fast copy-move forgery detection,†in WSEAS Trans. Signal Process., vol. 5, no. 5, pp. 188-197, May 2009.
[21] Khan, S.; Kulkarni, A., “Robust method for detection of copy-move forgery in digital images,†in Proc. IEEE Int. Conf. Signal and Image Processing (ICSIP), 15-17 Dec. 2010, pp.69-73.
[22] Barni, M.; Costanzo, A.; Sabatini, L., “Identification of cut and paste tampering by means of double-JPEG detection and image segmentation,†in Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS), May 30 2010-June 2 2010, pp. 1687-1690.
[23] Li, Weihai, Yuan Yuan, and Nenghai Yu.,“Detecting copy-paste forgery of jpeg image via block artifact grid extraction,†in International Workshop on Local and Non-Local Approximation in Image Processing, 2008.
[24] Ardizzone, Edoardo, Alessandro Bruno, and Giuseppe Mazzola. “Copy-move forgery detection via texture description,†in Proceedings.
Of the second ACM workshop on Multimedia in forensics, security and intelligence, ACM, 2010.
[25] Mo Chen; Fridrich, J.; Goljan, M.; Lukas, J., “Determining Image Origin and Integrity Using Sensor Noise,†IEEE Trans. Information Forensics and Security,, vol.3, no.1, pp.74,90, March 2008.
[26] Huang, Y., Lu, W., Sun, W., et al., “Improved DCT-based detection of copy-move forgery in images,†in Forensic Sci. Int., 2011, 206, (1), pp. 178-184.
[27] Zhang, J., Feng, Z., Su, Y., “A new approach for detecting copy-move forgery in digital images,†in 11th IEEE Singapore Int. Conf. on.
Communication Systems, 2008, pp. 362-366.
[28] H. Farid, “Photo Fakery and Forensics,†in In Advances in Computers, Volume 77, 2009.
[29] Kashyap, Abhishek; Joshi, Shiv Dutt, “Detection of copy-move forgery using wavelet decomposition,†in Proc. IEEE Int. Cof. Signal Processing and Communication (ICSC), Noida, Dec.12-14, 2013, pp.396-400.
[30] Jiwani, L.K.; Joshi, S.D.; Visweswaran, G.S., “Spectral Density Driven Wavelet Representation of 2-D Images,†in Proc. IEEE Int. Symposium Signal Processing and Information Technology, Aug. 2006, pp. 138-143.
[31] Kashyap, Abhishek; B. Suresh; Agrawal, Megha; Gupta, Hariom; Joshi, Shiv Dutt, “Detection of splicing forgery using wavelet decomposition,†in Proc. IEEE Int. Conf. Computing, Communication and Automation (ICCCA 2015), 15-16 May 2015.
[32] Mahdian, Babak; Saic, Stanislav, “Blind Authentication Using Periodic Properties of Interpolation,†IEEE Trans. Information Forensics and Security, vol.3, no.3, pp.529-538, Sept. 2008.
[33] Khosravi M., Mosaddeghi F., Oveisi, M., khodayari-b, A., Aerodynamic drag reduction of heavy vehicles using append devices by CFD analysis, Journal of Central South University, Volume 22, 2015, pp 4645–4652.
[34] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, G. Serra, “A SIFT-based forensic method for copy-move attack detection and transformation recovery,†IEEE Transactions on Information Forensics and Security, vol. 6, issue 3, pp. 1099-1110, 2011.
-
Downloads
-
How to Cite
Kashyap, A., Agarwal, M., & Gupta, H. (2018). Detection of copy-move image forgery using SVD and cuckoo search algorithm. International Journal of Engineering & Technology, 7(2.13), 79-87. https://doi.org/10.14419/ijet.v7i2.13.11604Received date: 2018-04-15
Accepted date: 2018-04-15
Published date: 2018-04-15