AUTHENTICATION BASED IMAGE FORGERY DETECTION USING OPTIMIZED FEATURES IN JPEG IMAGES

Main Article Content

Amandeep Kaur
Isha Vats

Abstract

With the current development in technology, image manipulation and particularly image splicing has been termed as a regular and established concern. The swift growth in commercial image editing programs and software for instance Adobe Photoshop has significantly elevated the number of forged, doctored and tampered images on a daily basis. This situation has resulted into extreme consequences, minimizing the authenticity and reliability of such images as well as creating untrue beliefs in a wide range of ideal-world relevance. The authenticity of a digital image suffers from severe threats due to the rise of powerful digital image editing tools that easily alter the image contents without leaving any visible traces of such changes. The splicing forgery can be done by copied a one/more region from source image and pasted into a target image to produce a composite image called spliced image. Therefore, this type of forgery is considered very challenging from tampering detection point of view. To make the matter worst some post-processing effects such as blurring, JPEG compression, rotation and scaling maybe introduced in the spliced image. In previous paper, we study found the problems in forgery detection in Jpg images. Robust feature extraction techniques used in block based copy move image forgery detection require a high computation time. There is a need for reduced computation time for detection schemes to be practical for use with large images and in real time environments. Utilization of GPU to compute the processes can highly parallelize the tasks involved to reduce computation time. Current CPU based algorithms that have been designed are not suitable to be directly adopted in a GPU based scheme. It must be determined how a parallel copy move image forgery detection scheme can be designed for use with a GPU. Digital images provide a new way to represent pictures and scenes that only film and a darkroom could supply before. In this research work, we implement the feature extraction using principle component analysis and optimization (ant colony optimization) algorithm to detect the forgery image in JPG images. In optimization approach to classify the features and match the training feature if training and testing features has matching then detect the forgery image in the jpg images. Evaluate the performance parameters PSNR (Peak Signal to Noise Ratio), Error rate Accuracy and compare the existing parameters i.e accuracy.
Keywords- Image Forgery, Robust feature extraction, Ant colony Approach and Neural Network

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

Amandeep Kaur, PTU

Department of Computer Science and Engineering

References

L. Wang, A. Ngom, and L. Rueda. "Sequential Forward Selection Approach to the Non-unique Oligonucleotide Probe Selection Problem," presented at the Proceedings of the Third IAPR International Conference on Pattern Recognition in Bioinformatics, Melbourne, Australia, 2008.

Gharehchopogh, Farhad Soleimanian, Neda Jabbari, and Zeinab Ghaffari Azar. "Evaluation of fuzzy k-means and k-means clustering algorithms in intrusion detection systems." International Journal of Scientific & Technology Research 1, no. 11 (2012).

Li, Jian, Xiaolong Li, Bin Yang, and Xingming Sun. "Segmentation-based image copy-move forgery detection scheme." IEEE Transactions on Information Forensics and Security 10, no. 3 (2015): 507-518.

Deshpande, Pradyumna, and Prashasti Kanikar. "Pixel based digital image forgery detection techniques." International Journal of Engineering Research and Applications 2, no. 3 (2012): 539-543.

Y. Zhang, C. Zhao, Y. Pi, and S. Li, "Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients," in Communications, Signal Processing, and Systems. vol. 202, Q. Liang, W. Wang, J. Mu, J. Liang, B. Zhang, Y. Pi, and C. Zhao, Eds., ed: Springer New York, 2012, pp. 181-189.

S. Bayram, H. T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on, 2009, pp. 1053-1056.

Huynh, Tu K., Khoa V. Huynh, Thuong Le-Tien, and Sy C. Nguyen. "A survey on image forgery detection techniques." In Computing & Communication Technologies-Research, Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on, pp. 71-76. IEEE, 2015.

Qazi, Tanzeela, Khizar Hayat, Samee U. Khan, Sajjad A. Madani, Imran A. Khan, Joanna Kołodziej, Hongxiang Li, Weiyao Lin, Kin Choong Yow, and Cheng-Zhong Xu. "Survey on blind image forgery detection." IET Image Processing 7, no. 7 (2013): 660-670.

Zandi, Mohsen, Ahmad Mahmoudi-Aznaveh, and Azadeh Mansouri. "Adaptive matching for copy-move Forgery detection." In Information Forensics and Security (WIFS), 2014 IEEE International Workshop on, pp. 119-124. IEEE, 2014.

Pandey, Ramesh Chand, Sanjay Kumar Singh, and K. K. Shukla. "Passive copy-move forgery detection in videos." In Computer and Communication Technology (ICCCT), 2014 International Conference on, pp. 301-306. IEEE, 2014.

Wahab, Ainuddin Wahid Abdul, Mustapha Aminu Bagiwa, Mohd Yamani Idna Idris, Suleman Khan, Zaidi Razak, and Muhammad Rezal Kamel Ariffin. "Passive video forgery detection techniques: a survey." In Information assurance and security (IAS), 2014 10th International Conference on, pp. 29-34. IEEE, 2014.

Fadl, Sondos M., and Noura A. Semary. "A proposed accelerated image copy-move forgery detection." In Visual Communications and Image Processing C

Most read articles by the same author(s)