(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-9 Issue-43 July-2019
Full-Text PDF
Paper Title : Implementation of feature extraction algorithms for image tampering detection
Author Name : Nooraini Yusoff and Loai Alamro
Abstract :

There are three main steps to detect fake images, namely feature extraction, feature matching, and feature masking based on the similarity between two or more images, or parts of images. The detection accuracy of fraudulent images highly depends on the feature extraction. Thus, the quality of the extracted features plays a key role in the image forgery detection. Multiple feature extraction methods have been proposed for detecting fake images with different level of success, however, not many have the ability to extract geometrical transformation such as rotation and scaling. Hence, to overcome the issue, this paper presents two separate groups of feature extraction, namely the dimensional reduction and keypoint. Initially, we ran a series of experiments to reveal the best feature extraction methods, involving five methods, from both groups in detecting copy-moved image forgeries. Then in our experiments, we implemented the integration of singular value decomposition (SVD) and speeded up robust features (SURF), discrete cosine transform (DCT) and SURF, and discrete wavelet transform (DWT) and SURF, to formulate a more accurate and robust copy-move detection approach. The best performance of copy-move detection was achieved by deploying DWT and SURF. The integration of DWT and SURF solves the rotation and the scaling issues in copy-move image detection with higher high accuracy and shorter execution time.

Keywords : Image forgery, Dimensional reduction, Keypoint, discrete wavelet transform and Speeded up robust features.
Cite this article : Yusoff N, Alamro L. Implementation of feature extraction algorithms for image tampering detection. International Journal of Advanced Computer Research. 2019; 9(43):197-211. DOI:10.19101/IJACR.PID37.
References :
[1]Kumar S, Desai J, Mukherjee S. A fast DCT based method for copy move forgery detection. In second international conference on image information processing 2013 (pp. 649-54). IEEE.
[Crossref] [Google Scholar]
[2]Lynch G, Shih FY, Liao HY. An efficient expanding block algorithm for image copy-move forgery detection. Information Sciences. 2013; 239:253-65.
[Crossref] [Google Scholar]
[3]Tralic D, Rosin PL, Sun X, Grgic S. Copy-move forgery detection using cellular automata. In cellular automata in image processing and geometry 2014 (pp. 105-25). Springer, Cham.
[Crossref] [Google Scholar]
[4]Sunil K, Jagan D, Shaktidev M. DCT-PCA based method for copy-move forgery detection. In ICT and critical infrastructure: proceedings of the annual convention of computer society of india-Vol II 2014 (pp. 577-83). Springer, Cham.
[Google Scholar]
[5]Ahmadi M, Ulyanov D, Semenov S, Trofimov M, Giacinto G. Novel feature extraction, selection and fusion for effective malware family classification. In the conference on data and application security and privacy 2016 (pp. 183-94). ACM.
[Crossref] [Google Scholar]
[6]Ramya RS, Venugopal KR, Iyengar SS, Patnaik LM. Feature extraction and duplicate detection for text mining: a survey. Global Journal of Computer Science and Technology. 2017.
[Google Scholar]
[7]Lei B, Xu G, Feng M, Van der Heijden F, Zou Y, De Ridder D, et al. Classification, parameter estimation and state estimation: an engineering approach using MATLAB. John Wiley & Sons; 2017.
[Google Scholar]
[8]Shah FP, Patel V. A review on feature selection and feature extraction for text classification. In international conference on wireless communications, signal processing and networking 2016 (pp. 2264-8). IEEE.
[Crossref] [Google Scholar]
[9]Ponti M, Nazaré TS, Thumé GS. Image quantization as a dimensionality reduction procedure in color and texture feature extraction. Neurocomputing. 2016; 173:385-96.
[Crossref] [Google Scholar]
[10]Bin YA, Xingming SU, Xianyi C, Zhang J, Xu LI. An efficient forensic method for copy-move forgery detection based on DWT-FWHT. Radioengineering. 2013; 22(4): 1098-105.
[Google Scholar]
[11]Zhao J, Guo J. Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Science International. 2013; 233(1-3):158-66.
[Crossref] [Google Scholar]
[12]Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm. In pacific-Asia workshop on computational intelligence and industrial application 2008 (pp. 272-6). IEEE.
[Crossref] [Google Scholar]
[13]Pan X, Lyu S. Detecting image region duplication using SIFT features. In international conference on acoustics, speech and signal processing 2010 (pp. 1706-9). IEEE.
[Crossref] [Google Scholar]
[14]Pan X, Lyu S. Region duplication detection using image feature matching. Transactions on Information Forensics and Security. 2010; 5(4):857-67.
[Crossref] [Google Scholar]
[15]Bo X, Junwen W, Guangjie L, Yuewei D. Image copy-move forgery detection based on SURF. In international conference on multimedia information networking and security 2010 (pp. 889-92). IEEE.
[Crossref] [Google Scholar]
[16]Shukla KK, Tiwari AK. Efficient algorithms for discrete wavelet transform: with applications to denoising and fuzzy inference systems. Springer Science & Business Media; 2013.
[Google Scholar]
[17]Kociołek M, Materka A, Strzelecki M, Szczypiński P. Discrete wavelet transform-derived features for digital image texture analysis. In international conference on signals and electronic systems 2001 (pp. 99-104).
[Google Scholar]
[18]Chui CK. An introduction to wavelets. Elsevier; 2016.
[Google Scholar]
[19]Kanika DN, Sharma K. Comparative analysis of discrete wavelet transform and fast wavelet transform on image compression. International Journal of Engineering Research & Technology. 2012; 1(5):1-7.
[Google Scholar]
[20]Chowdhury MM, Khatun A. Image compression using discrete wavelet transform. International Journal of Computer Science Issues. 2012; 9(4):327-30.
[Google Scholar]
[21]Ahmed N, Natarajan T, Rao KR. Discrete cosine transform. IEEE Transactions on Computers. 1974; 100(1):90-3.
[Crossref] [Google Scholar]
[22]Cook GW, Kalker T. The sparse discrete cosine transform with application to image compression. In picture coding symposium (PCS) 2013 (pp. 9-12). IEEE.
[Crossref] [Google Scholar]
[23]Kekre HB, Sarode T, Natu PJ. Color image compression using hybrid Haar-DCT wavelet in different color spaces. Advances in Image and Video Processing. 2014; 2(4):1-1.
[Google Scholar]
[24]Salomon D. A concise introduction to data compression. Springer Science & Business Media; 2007.
[Google Scholar]
[25]Andrews H, Patterson CL. Singular value decomposition (SVD) image coding. IEEE Transactions on Communications. 1976; 24(4):425-32.
[Crossref] [Google Scholar]
[26]Gallier J. Singular value decomposition (SVD) and polar form. In geometric methods and applications 2011 (pp. 367-85). Springer, New York, NY.
[Crossref] [Google Scholar]
[27]Lee N, Cichocki A. Big data matrix singular value decomposition based on low-rank tensor train decomposition. In international symposium on neural networks 2014 (pp. 121-30). Springer, Cham.
[Crossref] [Google Scholar]
[28]Ientilucci EJ. Using the singular value decomposition. Rochester Institute of Technology, Rochester, New York, United States, Technical Report. 2003.
[Google Scholar]
[29]Balaji GN, Subashini TS, Chidambaram N. Cardiac view classification using speed Up robust. Indian Journal of Science and Technology. 2015; 8(S7):1-5.
[Google Scholar]
[30]Bay H, Ess A, Tuytelaars T, Van Gool L. Speeded-up robust features (SURF). Computer Vision and Image Understanding. 2008; 110(3):346-59.
[Google Scholar]
[31]Guo F, Luo X, Liu Y. Research on feature extraction and match method based on the surf algorithm for mobile augmented reality system. In international industrial informatics and computer engineering conference 2015. Atlantis Press.
[Crossref] [Google Scholar]
[32]Alamro L, Yusoff N. Copy-move forgery detection using integrated DWT and SURF. Journal of Telecommunication, Electronic and Computer Engineering (JTEC). 2017; 9(1-2):67-71.
[Google Scholar]