Authenticated media uploading framework for mobile cloud computing

With the growing popularity of social networking services and the rapid development of smart devices, an increasing number of people are now uploading media such as images and videos to social networks for sharing with acquaintances, and making that content available for public use. Given the flexibility of uploading and sharing media, a common question arises: can we trust all these images and videos? To address this issue, we propose a mobile cloud-based media uploading framework that checks images for authenticity (i.e., by detecting known forgery techniques). For images that are found to be genuine, the framework will allow public sharing. The authenticity check will be carried out on the private or local cloud to which the image is uploaded. For the check itself, we propose a curvelet transform and Weber local descriptor-based system to extract features from the image. Statistical features obtained from the system are then fed into a support vector machine-based classifier. Offline experiments show that the proposed system can achieve very high detection accuracy for image forgery. Online experiments show that the proposed framework also works in real time. To validate the suitability of this media uploading framework, workloads were measured in the Amazon Elastic Compute Cloud environment.

[1]  El-Sayed M. El-Alfy,et al.  Combining spatial and DCT based Markov features for enhanced blind detection of image splicing , 2014, Pattern Analysis and Applications.

[2]  Matti Pietikäinen,et al.  IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2009, TPAMI-2008-09-0620 1 WLD: A Robust Local Image Descriptor , 2022 .

[3]  Muhammad Ghulam,et al.  Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.

[4]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[5]  M. Shamim Hossain,et al.  Audio-visual emotion recognition using multi-directional regression and Ridgelet transform , 2016, Journal on Multimodal User Interfaces.

[6]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[7]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[8]  Tieniu Tan,et al.  Image tampering detection based on stationary distribution of Markov chain , 2010, 2010 IEEE International Conference on Image Processing.

[9]  Muhammad Ghulam,et al.  Curvelet Transform and Local Texture Based Image Forgery Detection , 2013, ISVC.

[10]  Emmanuel J. Candès,et al.  The curvelet transform for image denoising , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[11]  Angshul Majumdar,et al.  Face Recognition by Curvelet Based Feature Extraction , 2007, ICIAR.

[12]  Max Welling,et al.  Robust Higher Order Statistics , 2005, AISTATS.

[13]  Jianhua Li,et al.  Passive Image-Splicing Detection by a 2-D Noncausal Markov Model , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Yonggang Wen,et al.  Cloud Mobile Media: Reflections and Outlook , 2014, IEEE Transactions on Multimedia.

[15]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[16]  M. Shamim Hossain,et al.  Robust copy-move image forgery detection using undecimated wavelets and Zernike moments , 2011, ICIMCS '11.

[17]  Ghulam Muhammad Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system , 2015 .

[18]  Prasad Calyam,et al.  Enabling performance intelligence for application adaptation in the Future Internet , 2011, Journal of Communications and Networks.