Image forensics using color illumination, block and key point based approach

被引:7
作者
Thakur, Abhishek [1 ]
Jindal, Neeru [1 ]
机构
[1] Thapar Univ, ECED, Patiala, Punjab, India
关键词
Digital signal processing (DSP); Image forgery (IF); Discrete wavelet transform (DWT); Simple linear iterative clustering (SLIC); Block matching threshold (BMT); Feature extraction (FE); FORGERY;
D O I
10.1007/s11042-018-5836-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Every individual is keen to exhibit socialism and connectedness posting their personal photos and videos on several social websites. Thus, it has become literally easy for the onlookers to see and modify their photos and videos. Here the concept enumerates in picture as image forensics, whereby it is possible to examine the authenticity and genuineness of photograph and video into consideration. In addition to this,nowadays photograph and videos are considered as a firm and valid proof in the court room for investigation, validation and judgement. Several experts are continuously working in an image forensic field to discover and develop better techniques for the detection of forgeries in image and videos. Detection of image forgeries is done in two ways. Firstly the forged image we are already familiar with is called active forgery detection technique and secondly, where we don't know the forgery, then is referred to as the passive forgery detection technique. Passive technique is incorporated to detect forgery in this paper where hybridization is used. We have used DWT, color illumination Algorithm, SLIC Algorithm; SIFT Algorithm, Correlation Coefficient Map generation Algorithm, Block Matching Threshold Algorithm and Feature Extraction Algorithm for the detection and ramifying forgeries. The novelty of the proposed hybrid technique is the use of color illumination which detect image edges and trace them correctly to detect forged region. We have tested 48 images from database and find out image forgery detection at image level with Precision=97. 25%; Recall=100% and F1=98. 53%.
引用
收藏
页码:26033 / 26053
页数:21
相关论文
共 34 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], 2011, 2011 18 INT C SYST S
[3]  
[Anonymous], IEEE T IMAGE PROCESS
[4]  
Ansari M.D., 2014, IETE Journal of Education, V55, P40, DOI [DOI 10.1080/09747338.2014.921415, 10.1080/09747338.2014.921415]
[5]  
Anuja Dixit J, 2016, INT J SIGNAL PROCESS, V9, P71, DOI [10.14257/ijsip.2016.9.3.07, DOI 10.14257/IJSIP.2016.9.3.07]
[6]  
Bashar M, 2010, IEEE Trans Image Process, DOI 10.1109/TIP.2010.2046599
[7]  
Bayram S, 2009, ACOUSTICS SPEECH SIG, DOI [10. 1109/ICASSP. 2009. 4959768, DOI 10.1109/ICASSP.2009.4959768]
[8]   Digital image forgery detection using passive techniques: A survey [J].
Birajdar, Gajanan K. ;
Mankar, Vijay H. .
DIGITAL INVESTIGATION, 2013, 10 (03) :226-245
[9]  
Bravo-Solorio S, 2011, INT CONF ACOUST SPEE, P1880
[10]   Illuminant-Based Transformed Spaces for Image Forensics [J].
Carvalho, Tiago ;
Faria, Fabio A. ;
Pedrini, Helio ;
Torres, Ricardo da S. ;
Rocha, Anderson .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :720-733