Autoregressive-Elephant Herding Optimization based Generative Adversarial Network for copy-move forgery detection with Interval type-2 fuzzy clustering

被引:0
|
作者
Ganeshan, R. [1 ]
Muppidi, Satish [2 ]
Thirupurasundari, D. R. [3 ]
Kumar, B. Santhosh [4 ]
机构
[1] VIT Bhopal Univ, Sch Comp Sci & Engn, Kothri Kala 466114, Madhya Pradesh, India
[2] GMR Inst Technol, Dept Comp Sci & Engn, Rajam, India
[3] Bharath Inst Higher Educ & Res, Dept Comp Sci & Engn, Chennai, India
[4] Guru Nanak Inst Technol, Dept Comp Sci & Engn, Hyderabad, India
关键词
Copy-move forgery; Image forensics; Generative Adversarial Network (GAN); Rider Optimization Algorithm-based Neural; Network (RideNN); Elephant Herding Optimization (EHO);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A copy move forgery is considered as the general form of digital image forgery, where a portion of the image is copied as well as pasted in some other position in the same image. To act upon forgery is simple; however detecting the forgery is more complex due to the copied portions' features similar to other parts of images. Therefore, an effectual forgery object detection approach is exploited by exploiting the adopted Autoregressive Elephant Herding Optimization based Generative Adversarial Network (A-EHO based GAN). The proposed A-EHO approach is derived by incorporating Conditional Autoregressive Value at Risk by Regression Quantiles (CAViaR) with Elephant Herding Optimization (EHO). First, features like Local optimal oriented pattern (LOOP) and Convolutional Neural Network (CNN) features are extracted for each foreground object. Then, the features are employed to the GAN for the computation of the forgery score. Here, the RideNN classifier detects the forgery image based on the feature vector and the forgery score. As a result, the adopted approach achieved higher performance regarding detection rate, ROC, TNR, as well as TPR with the values of 96.687%, 98.35%, 97.809%, and 96.971%, respectively.
引用
收藏
页数:10
相关论文
共 15 条
  • [1] Autoregressive-Elephant Herding Optimization based Generative Adversarial Network for copy-move forgery detection with Interval type-2 fuzzy clustering
    Ganeshan, R.
    Muppidi, Satish
    Thirupurasundari, D. R.
    Kumar, B. Santhosh
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2022, 108
  • [2] Copy-Move Forgery Detection and Localization Using a Generative Adversarial Network and Convolutional Neural-Network
    Abdalla, Younis
    Iqbal, M. Tariq
    Shehata, Mohamed
    INFORMATION, 2019, 10 (09)
  • [3] DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization
    Islam, Ashraful
    Long, Chengjiang
    Basharat, Arslan
    Hoogs, Anthony
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 4675 - 4684
  • [4] Robust copy-move forgery detection using modified superpixel based FCM clustering with emperor penguin optimization and block feature matching
    Ritu Agarwal
    Om Prakash Verma
    Evolving Systems, 2022, 13 : 27 - 41
  • [5] Robust copy-move forgery detection using modified superpixel based FCM clustering with emperor penguin optimization and block feature matching
    Agarwal, Ritu
    Verma, Om Prakash
    EVOLVING SYSTEMS, 2022, 13 (01) : 27 - 41
  • [6] Adaptive partitioning-based copy-move image forgery detection using optimal enabled deep neuro-fuzzy network
    Mariappan, Geetha
    Satish, Aravapalli Rama
    Reddy, P. V. Bhaskar
    Maram, Balajee
    COMPUTATIONAL INTELLIGENCE, 2022, 38 (02) : 586 - 609
  • [7] Bayesian Optimization-Based Interval Type-2 Fuzzy Neural Network for Furnace Temperature Control
    Tian, Hao
    Tang, Jian
    Xia, Heng
    Yu, Wen
    Qiao, Junfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025, 21 (01) : 505 - 514
  • [8] Design and Verification of an Interval Type-2 Fuzzy Neural Network Based on Improved Particle Swarm Optimization
    Lin, Cheng-Jian
    Jeng, Shiou-Yun
    Lin, Hsueh-Yi
    Yu, Cheng-Yi
    APPLIED SCIENCES-BASEL, 2020, 10 (09):
  • [9] Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network
    Doddi Srilatha
    Gopal K. Shyam
    Cluster Computing, 2021, 24 : 2657 - 2672
  • [10] Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network
    Srilatha, Doddi
    Shyam, Gopal K.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 2657 - 2672