Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics

Cloud computing has evolved in various application areas such as medical imaging and bioinformatics. It raises the issues of privacy and tampering in the images especially related to the medical field and bioinformatics for various reasons. The digital images are quite vulnerable to be tampered by the interceptors. The credibility of individuals can transform through falsified information in the images. Image tampering detection is an approach to identifying and finding the tampered components in the image. For the efficient detection of image tampering, the sufficient number of features are required which can be achieved by a deep learning architecture-based models without manual feature extraction of functions. In this research work, we have presented and implemented a cloud-based residual exploitation-based deep learning architectures to detect whether or not an image is being tampered. The proposed approach is implemented on the publicly available benchmark MICC-F220 dataset with the - fold cross-validation approach to avoid the overfitting problem and to evaluate the performance metrics.

[1]  Belhassen Bayar,et al.  On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[3]  T. Subashini,et al.  Application of local invariant symmetry features to detect and localize image copy move forgeries , 2019, J. Inf. Secur. Appl..

[4]  Gang Yan,et al.  AR-Net: Adaptive Attention and Residual Refinement Network for Copy-Move Forgery Detection , 2020, IEEE Transactions on Industrial Informatics.

[5]  Osamah M. Al-Qershi,et al.  Evaluation of copy-move forgery detection: datasets and evaluation metrics , 2018, Multimedia Tools and Applications.

[6]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[7]  Tiago Carvalho,et al.  Exposing Computer Generated Images by Using Deep Convolutional Neural Networks , 2017, Signal Process. Image Commun..

[8]  Ainuddin Wahid Abdul Wahab,et al.  Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points , 2016, Symmetry.

[9]  Mohammad Farukh Hashmi,et al.  Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform , 2014 .

[10]  Tapani Raiko,et al.  Pushing Stochastic Gradient towards Second-Order Methods -- Backpropagation Learning with Transformations in Nonlinearities , 2013, ICLR.

[11]  A Kuznetsov Digital image forgery detection using deep learning approach , 2019 .

[12]  Yang Wei,et al.  RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[13]  Alexey Shvets,et al.  TernausNet: U-Net with VGG11 Encoder Pre-Trained on ImageNet for Image Segmentation , 2018, Computer-Aided Analysis of Gastrointestinal Videos.

[14]  Luca Maria Gambardella,et al.  Deep Neural Networks Segment Neuronal Membranes in Electron Microscopy Images , 2012, NIPS.

[15]  Christine Guillemot,et al.  Image Inpainting : Overview and Recent Advances , 2014, IEEE Signal Processing Magazine.

[16]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[17]  R. Srivastava,et al.  Image Splicing Detection using Deep Residual Network , 2019, SSRN Electronic Journal.

[18]  Belhassen Bayar,et al.  Design Principles of Convolutional Neural Networks for Multimedia Forensics , 2017, Media Watermarking, Security, and Forensics.

[19]  Cordelia Schmid,et al.  Aggregating Local Image Descriptors into Compact Codes , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[20]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[21]  B. S. Manjunath,et al.  Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[22]  Thomas Brox,et al.  3D U-Net: Learning Dense Volumetric Segmentation from Sparse Annotation , 2016, MICCAI.

[23]  V. T. Manu,et al.  Visual artifacts based image splicing detection in uncompressed images , 2015, 2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS).

[24]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[25]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Ross B. Girshick,et al.  Fast R-CNN , 2015, 1504.08083.

[27]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[28]  Marko Heikkilä,et al.  Description of interest regions with local binary patterns , 2009, Pattern Recognit..

[29]  Mohamed Abdel-Basset,et al.  2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.

[30]  Ying Zhang,et al.  Image Region Forgery Detection: A Deep Learning Approach , 2016, SG-CRC.

[31]  Florent Perronnin,et al.  Fisher Kernels on Visual Vocabularies for Image Categorization , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[32]  Zhidong Deng,et al.  Recent progress in semantic image segmentation , 2018, Artificial Intelligence Review.

[33]  Davide Cozzolino,et al.  Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.

[34]  Jian Sun,et al.  Object Detection Networks on Convolutional Feature Maps , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[35]  Muhammad Ghulam,et al.  Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.

[36]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[37]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[38]  Lawrence D. Jackel,et al.  Backpropagation Applied to Handwritten Zip Code Recognition , 1989, Neural Computation.

[39]  Yuhui Zheng,et al.  Image splicing localization using residual image and residual-based fully convolutional network , 2020, J. Vis. Commun. Image Represent..

[40]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[41]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[42]  Trevor Darrell,et al.  Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[43]  Thomas A. Manteuffel,et al.  Algebraic Multigrid Based on Element Interpolation (AMGe) , 2000, SIAM J. Sci. Comput..