Exploring Rotation and Scale Invariant Features in Image Pla- giarism Detection Using Manifold-Ranking Algorithm

  • Authors

    • Simindokht Jahangard MSc, Department of Computer Engineering, Khorasgan Branch, Islamic Azad University, Isfahan, Iran
    2018-09-25
    https://doi.org/10.14419/ijet.v7i4.10575
  • image plagiarism, image retrieval, feature extracting, k-regular nearest neighbor graph, manifold-ranking.
  • Plagiarism, as a crucial offense especially in academia, not only is well-known problem in text but also is becoming widespread in image. In this work, the performance of manifold-ranking, known as robust method among semi-supervised methods, has been investigated by using twelve different features. As its high performance is attributed to the quality of constructed graph, we applied robust k-regular nearest neighbor (k-RNN) graph in the framework of manifold-ranking based retrieval. Among all tested feature point detectors and descriptors, Root-SIFT, the feature point ones, due to it is invariant to an array of image transforms, is the most reliable feature for calculating image similarity. The database consisting of images from scientific papers containing four popular benchmark test images served to test these methods.

     

  • References

    1. [1] D. Gupta "Study on Extrinsic Text Plagiarism Detection Techniques and Tools," Journal of Engineering Science & Technology Review, vol. 9, no. 5, 2016.

      [2] T. W. Chow and M. Rahman, "Multilayer SOM with tree-structured data for efficient document retrieval and plagiarism detection," IEEE Transactions on Neural Networks, vol. 20, no. 9, pp. 1385-1402, 2009.

      [3] Z. Su, B.-R. Ahn, K.-Y. Eom, M.-K. Kang, J.-P. Kim, and M.-K. Kim, "Plagiarism detection using the Levenshtein distance and Smith-Waterman algorithm," in Innovative Computing Information and Control, 2008. ICICIC'08. 3rd International Conference on, 2008, pp. 569-569: IEEE.

      [4] S. F. Hussain and A. Suryani, "On retrieving intelligently plagiarized documents using semantic similarity," Engineering Applications of Artificial Intelligence, vol. 45, pp. 246-258, 2015.

      [5] M. Elhadi and A. Al-Tobi, "Use of text syntactical structures in detection of document duplicates," in Digital Information Management, 2008. ICDIM 2008. Third International Conference on, 2008, pp. 520-525: IEEE.

      [6] B. Wang, F. Pan, K.-M. Hu, and J.-C. Paul, "Manifold-ranking based retrieval using k-regular nearest neighbor graph," Pattern Recognition, vol. 45, no. 4, pp. 1569-1577, 2012.

      [7] B. Xu, J. Bu, C. Chen, C. Wang, D. Cai, and X. He, "EMR: A scalable graph-based ranking model for content-based image retrieval," IEEE Transactions on knowledge and data engineering, vol. 27, no. 1, pp. 102-114, 2015.

      [8] Y. Fujiwara, G. Irie, S. Kuroyama, and M. Onizuka, "Scaling manifold ranking based image retrieval," Proceedings of the VLDB Endowment, vol. 8, no. 4, pp. 341-352, 2014.

      [9] Y. Wang, M. A. Cheema, X. Lin, and Q. Zhang, "Multi-manifold ranking: Using multiple features for better image retrieval," in Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2013, pp. 449-460: Springer.

      [10] L. Ma, H. Li, F. Meng, Q. Wu, and L. Xu, "Manifold-ranking embedded order preserving hashing for image semantic retrieval," Journal of Visual Communication and Image Representation, vol. 44, pp. 29-39, 2017.

      [11] M. Iwanowski, A. Cacko, and G. Sarwas, "Comparing Images for Document Plagiarism Detection," in International Conference on Computer Vision and Graphics, 2016, pp. 532-543: Springer.

      [12] B. Neha, M. Mahajan, and S. Bhushan, "Comparison of Techniques for Plagiarism Detection in Document Images: A Review.," European Journal of Advances in Engineering and Technology, pp. 27-31, 2015.

      [13] D. G. Lowe, "Object recognition from local scale-invariant features," in Computer vision, 1999. The proceedings of the seventh IEEE international conference on, 1999, vol. 2, pp. 1150-1157: Ieee.

      [14] R. Arandjelović and A. Zisserman, "Three things everyone should know to improve object retrieval," in Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, 2012, pp. 2911-2918: IEEE.

      [15] H. Bay, T. Tuytelaars, and L. Van Gool, "Surf: Speeded up robust features," Computer vision–ECCV 2006, pp. 404-417, 2006.

      [16] A. C. Berg and J. Malik, "Geometric blur for template matching," in Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference on, 2001, vol. 1, pp. I-I: IEEE.

      [17] A. Oliva and A. Torralba, "Modeling the shape of the scene: A holistic representation of the spatial envelope," International journal of computer vision, vol. 42, no. 3, pp. 145-175, 2001.

      [18] M. A. Stricker and M. Orengo, "Similarity of color images," in IS&T/SPIE's Symposium on Electronic Imaging: Science & Technology, 1995, pp. 381-392: International Society for Optics and Photonics.

      [19] J. Huang, S. R. Kumar, M. Mitra, and W.-J. Zhu, "Image indexing using color correlograms," ed: Google Patents, 2001.

      [20] A. K. Jain and S. K. Bhattacharjee, "Address block location on envelopes using Gabor filters," Pattern recognition, vol. 25, no. 12, pp. 1459-1477, 1992.

      [21] A. K. Jain, N. K. Ratha, and S. Lakshmanan, "Object detection using Gabor filters," Pattern recognition, vol. 30, no. 2, pp. 295-309, 1997.

      [22] K. Jarrett, K. Kavukcuoglu, and Y. LeCun, "What is the best multi-stage architecture for object recognition?," in Computer Vision, 2009 IEEE 12th International Conference on, 2009, pp. 2146-2153: IEEE.

      [23] S. Park, D. Park, and C. Won, "Core experiments on MPEG-7 edge histogram descriptor," MPEG document M, vol. 5984, p. 2000, 2000.

      [24] D. K. Park, Y. S. Jeon, and C. S. Won, "Efficient use of local edge histogram descriptor," in Proceedings of the 2000 ACM workshops on Multimedia, 2000, pp. 51-54: ACM.

      [25] T. Ahonen, J. Matas, C. He, and M. Pietikäinen, "Rotation invariant image description with local binary pattern histogram fourier features," Image analysis, pp. 61-70, 2009.

      [26] B. Mahdian and S. Saic, "Detection of copy–move forgery using a method based on blur moment invariants," Forensic science international, vol. 171, no. 2, pp. 180-189, 2007.

      [27] Z. Mohamadian and A. A. Pouyan, "Detection of duplication forgery in digital images in uniform and non-uniform regions," in Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on, 2013, pp. 455-460: IEEE.

      [28] H. Farid, "Creating and detecting doctored and virtual images: Implications to the child pornography prevention act," Department of Computer Science, Dartmouth College, TR2004-518, vol. 13, 2004.

      [29] T. Zhang and R.-d. Wang, "Copy-move forgery detection based on SVD in digital image," in Image and Signal Processing, 2009. CISP'09. 2nd International Congress on, 2009, pp. 1-5: IEEE.

      [30] M. Zimba and S. Xingming, "DWT-PCA(EVD) Based Copy-move Image Forgery Detection," International Journal of Digital Content Technology and its Applications, vol. 5, no. 1, 2011.

      [31] S. Bravo-Solorio and A. K. Nandi, "Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics," Signal Processing, vol. 91, no. 8, pp. 1759-1770, 2011.

      [32] M Sridevi, C. Mala, and S. Sandeep, "Copy–Move Image Plagiarism Detection," Journal of Computer Science and Information Technology, vol. 52, pp. 19-29, 2012.

      [33] H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Computational Intelligence and Industrial Application, 2008. PACIIA'08. Pacific-Asia Workshop on, 2008, vol. 2, pp. 272-276: IEEE.

      [34] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, "Copy-move forgery detection and localization by means of robust clustering with J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.

      [35] R. C. Pandey, S. K. Singh, K. Shukla, and R. Agrawal, "Fast and robust passive copy-move forgery detection using SURF and SIFT image features," in Industrial and Information Systems (ICIIS), 2014 9th International Conference on, 2014, pp. 1-6: IEEE.

      [36] S. Prasad and B. Ramkumar, "Passive copy-move forgery detection using SIFT, HOG and SURF features," in Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on, 2016, pp. 706-710: IEEE.

      [37] Y.-H. Lee and Y. Kim, "Efficient image retrieval using advanced SURF and DCD on mobile platform," Multimedia Tools and Applications, vol. 74, no. 7, pp. 2289-2299, 2015.

      [38] S. Jau-Ling and C. Ling-Hwei, "Color image retrieval based on primitives of color moments," Recent Advances in Visual Information Systems, pp. 19-27, 2002.

      [39] A. V. Malviya and S. A. Ladhake, "Pixel Based Image Forensic Technique for Copy-move Forgery Detection Using Auto Color Correlogram," Procedia Computer Science, vol. 79, pp. 383-390, 2016.

      [40] A. V. Malviya and S. A. Ladhake, "Region duplication detection using color histogram and moments in digital image," in Inventive Computation Technologies (ICICT), International Conference on, 2016, vol. 1, pp. 1-4: IEEE.

      [41] C. H. Su, H. S. Chiu, J. H. Hung, and T. M. Hsieh, "Color Space Comparison between RGB and HSV Based Images Retrieval," in Advanced Materials Research, 2014, vol. 989, pp. 4123-4126: Trans Tech Publ.

      [42] R. P. Yohannan and M. Manuel, "Detection of copy-move forgery based on Gabor filter," in Engineering and Technology (ICETECH), 2016 IEEE International Conference on, 2016, pp. 629-634: IEEE.

      [43] J.-C. Lee, "Copy-move image forgery detection based on Gabor magnitude," Journal of Visual Communication and Image Representation, vol. 31, pp. 320-334, 2015.

      [44] S. Agarwal, A. Verma, and P. Singh, "Content based image retrieval using discrete wavelet transform and edge histogram descriptor," in Information Systems and Computer Networks (ISCON), 2013 International Conference on, 2013, pp. 19-23: IEEE.

      [45] L. Li, S. Li, H. Zhu, S.-C. Chu, J. F. Roddick, and J.-S. Pan, "An efficient scheme for detecting copy-move forged images by local binary patterns," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 46-56, 2013.

      [46] B. Ustubioglu, G. Ulutas, M. Ulutas, V. Nabiyev, and A. Ustubioglu, "LBP-DCT based copy move forgery detection algorithm," in Information Sciences and Systems 2015: Springer, 2016, pp. 127-136.

      [47] J. Winn, A. Criminisi, and T. Minka, "Object categorization by learned universal visual dictionary," in Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on, 2005, vol. 2, pp. 1800-1807: IEEE.

      [48] T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns," IEEE Transactions on pattern analysis and machine intelligence, vol. 24, no. 7, pp. 971-987, 2002.

      [49] A. Oliva, "Gist of the scene," Neurobiology of attention, vol. 696, no. 64, pp. 251-258, 2005.

      [50] Y. Rubner, C. Tomasi, and L. J. Guibas, "The earth mover's distance as a metric for image retrieval," International journal of computer vision, vol. 40, no. 2, pp. 99-121, 2000.

      [51] C.-T. Hsieh, J.-L. Shih, C.-H. Lee, C.-C. Han, and K.-C. Fan, "3D model retrieval using multiple features and manifold ranking," in Ubi-Media Computing (UMEDIA), 2015 8th International Conference on, 2015, pp. 7-10: IEEE.

      [52] C. Zhang and F. Wang, "A multilevel approach for learning from labeled and unlabeled data on graphs," Pattern Recognition, vol. 43, no. 6, pp. 2301-2314, 2010.

      [53] J. He, M. Li, H.-J. Zhang, H. Tong, and C. Zhang, "Manifold-ranking based image retrieval," in Proceedings of the 12th annual ACM international conference on Multimedia, 2004, pp. 9-16: ACM.

  • Downloads

  • How to Cite

    Jahangard, S. (2018). Exploring Rotation and Scale Invariant Features in Image Pla- giarism Detection Using Manifold-Ranking Algorithm. International Journal of Engineering & Technology, 7(4), 2663-2671. https://doi.org/10.14419/ijet.v7i4.10575