Image Forgery Detection Using Singular Value Decomposition with Some Attacks

To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform with Singular Value Decomposition (BWT-SVD)-based feature extraction is applied to find the image forgery. The proposed method begins with dividing the test images into overlapping blocks, and then Biorthogonal Wavelet Transform (BWT) with Singular Value Decomposition (SVD) applies to extract the feature vector from the blocks. After that, the feature vectors are sorts and the duplicate vectors are identified by the similarity between two successive vectors. The occurrences of clone vectors are identified on the basis of Minkowski distance and the threshold value. Then, similarity criteria result in the existence of forgery in images. To classify images into the category of authentic images or forged images, improved version of Relevance Vector Machine (RVM) uses, which leads to efficiency and accuracy of forged image identification process. Performance of proposed scheme tests by performing experiments on CoMoFoD database. The simulation results show that the proposed IRVM scheme attained high performance when compared with existing Copy-Move based image Forgery Detection schemes in MATLAB environment.

[1]  Sonja Grgic,et al.  CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.

[2]  Array В. Кузнецов,et al.  Алгоритм обнаружения искажённых дубликатов на цифровых изображениях с использованием бинарных градиентных контуров , 2016 .

[3]  Savroop Kaur,et al.  Biorthogonal Wavelet Transform Using Bilateral Filter and Adaptive Histogram Equalization , 2015 .

[4]  Osamah M. Al-Qershi,et al.  Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.

[5]  Neeraj Rathore,et al.  Dynamic Threshold Based Load Balancing Algorithms , 2016, Wirel. Pers. Commun..

[6]  Neeraj Rathore,et al.  Efficient Agent Based Priority Scheduling and Load Balancing Using Fuzzy Logic in Grid Computing , 2015 .

[7]  Inderveer Chana,et al.  Report on Hierarchical Load Balancing Technique in Grid Environment , 2013 .

[8]  Inderveer Chana,et al.  Job Migration Policies for Grid Environment , 2016, Wirel. Pers. Commun..

[9]  Azlan Mohd Zain,et al.  Glowworm swarm optimization (GSO) for optimization of machining parameters , 2016, J. Intell. Manuf..

[10]  Inderveer Chana,et al.  Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing , 2014, J. Intell. Fuzzy Syst..

[11]  Hidema Tanaka,et al.  Security Evaluation of Light-Weight Block Ciphers by GPGPU , 2016 .

[12]  M. Ulutas,et al.  A new copy move forgery detection technique with automatic threshold determination , 2016 .

[13]  Vinay Chopra,et al.  A Survey: Copy-Move Forgery Detection Methods , 2016 .

[14]  Rathore Neeraj,et al.  ETHICAL HACKING AND SECURITY AGAINST CYBER CRIME , 2016 .

[15]  Inderveer Chana,et al.  A sender initiate based hierarchical load balancing technique for grid using variable threshold value , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).

[16]  Inderveer Chana,et al.  Variable threshold-based hierarchical load balancing technique in Grid , 2014, Engineering with Computers.

[17]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[18]  Rajesh Kumar,et al.  Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[19]  Neeraj Rathore,et al.  Performance of Hybrid Load Balancing Algorithm in Distributed Web Server System , 2018, Wirel. Pers. Commun..

[20]  Thuong Le-Tien,et al.  A Robust Algorithm of Forgery Detection in Copy-Move and Spliced Images , 2016 .

[21]  John F. Roddick,et al.  An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..

[22]  Umashankar Rawat,et al.  Efficient Hybrid Load Balancing Algorithm , 2020, National Academy Science Letters.

[23]  Guangqun Zhang,et al.  SURF-based Detection of Copy-Move Forgery in Flat Region , 2012 .

[24]  Vina Ayumi,et al.  Distribution-Sensitive Learning on Relevance Vector Machine for Pose-Based Human Gesture Recognition , 2015 .

[25]  Inderveer Chana,et al.  Load Balancing and Job Migration Techniques in Grid: A Survey of Recent Trends , 2014, Wirel. Pers. Commun..

[26]  Neeraj Rathore,et al.  Map Reduce Architecture for Grid , 2015 .

[27]  Amit Mishra,et al.  An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine , 2018, Wirel. Pers. Commun..