Intelligent systems to forgery image detection based on the edge characteristics using soft computing techniques

  • Authors

    • Divyashree S Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal
    • Narendra VG Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal
    • Priya Kamath Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal
    2018-11-15
    https://doi.org/10.14419/ijet.v7i4.15368
  • Forgery Image Detection, Authenticity, Canny Edge Detection, Hough Transforms, Gaussian Filtering.
  • Detection of forgery in an image is an important aspect and very much essential in order to maintain the authenticity and the privacy of the information that could be interpreted from the image. In these days images could be manipulated using various tools and techniques, so its originality is lost, because these images may be used in medical diagnosis for monitoring the patients’ health care, in smartphones for user authentication, in forensic investigations where images serve as legal evidence. In such cases it is necessary to get the correct details from an image or else it may be misused. Hence there is a need to detect the altered images and prevent the intended people in extracting the false details from the manipulated images. This research focuses on a technique to detect the forged images (tampered images) based on the edge characteristics, that are supported by the functions such as Canny edge detection and Hough transforms, to extract a feature vector for the Gaussian filtering detection. Better performance is obtained by using Random Forest classification for K-Means clustering, SGD classifica-tion for Density based clustering and hence detect the images that are forged.

     

     
  • References

    1. [1] Kang Hyeon Rhee, “Forgery Image Detection of Gaussian Filtering by Support Vector Machine using Edge Characteristicsâ€, International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, 2017.

      [2] Mr. Arun Anoop M, “Image forgery and its detection: A surveyâ€, IEEE Sponsored 2J/d International Conference on Innovations in Information, Embedded and Communication systems (ICIIECS), IEEE, 2015.

      [3] Kang Hyeon, “Gaussian Filtering Detection using Band Pass Residual and Contrast of Forgery imageâ€, IEEE, 2016.

      [4] Junyu Xu, Yun Ling, Xuan Zheng, “Forensic Detection of Gaussian Low-pass Filtering in Digital Imagesâ€, 8th International Congress on Image and Signal Processing (CISP), IEEE, 2015. https://doi.org/10.1109/CISP.2015.7407990.

      [5] Jae Jeong HWANG, Kang Hyeon RHEE, “Gaussian Filtering Detection based on Features of Residuals in Image Forensicsâ€, IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future, 2016.

      [6] Anurag Das, Abhishek Medhi, Ram Kumar Karsh, Rabul Hussain Laskar, “Image Splicing Detection using Gaussian or Defocus Blurâ€, IEEE International Conference on Communication and Signal Processing, 2016. https://doi.org/10.1109/ICCSP.2016.7754350.

      [7] Dijana Tralic, Ivan Zupancic, Sonja Grgic, Mislav Grgic, “CoMoFoD - New Database for Copy-Move Forgery Detectionâ€, International Symposium ELMAR, 2013.

      [8] Sagar Adatrao, Mayank Mittat, “An Analysis of Different Image Preprocessing Techniques for Determining the Centroids of Circular Marks Using Hough Transformâ€, 2nd International Conference on Frontiers of Signal Processing, 2016.

      [9] B. Chitradevil, P.Srimath, “An Overview on Image Processing Techniquesâ€, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 11, 2014.

      [10] Parameswaran Nampoothiri V, Dr. N Sugitha, “Digital Image Forgery - A threaten to Digital Forensicsâ€, International Conference on Circuit, Power and Computing Technologies [ICCPCT], IEEE, 2016.

      [11] Weibing Liu, Deqiang Han, Yi Yang, “A Novel Weighted SVM Based on Theory of Belief Functionsâ€, 20th International Conference on Information Fusion (ISIF), IEEE, 2017.

      [12] Chi-Man Pun, Xiao-Chen Yuan, Xiu-Li Bi, “Image Forgery Detection using Adaptive Over-segmentation and Feature Point Matchingâ€, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, 2015.

      [13] Anushree U. Tembe, Supriya S. Thombre, “Survey of Copy-paste Forgery Detection in Digital Image Forensicâ€, International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), IEEE, 2017. https://doi.org/10.1109/ICIMIA.2017.7975613.

      [14] Ibrahim Mesecan, Ihsan Omur Bucak, “Searching the Effects of Image Scaling for Underground Object Detection using KMeans and KNNâ€, UKSim-AMSS 8th European Modelling Symposium, IEEE, 2014.

      [15] Chun Guan, Kevin Kam Fung Yuen, Qi Chen, “Towards a Hybrid Approach of K-Means and Density-Based Spatial Clustering of Applications with Noise for Image Segmentationâ€, IEEE International Conference on Internet of Things (iThings), IEEE Green Computing and Communications (GreenCom), IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data, 2017.

      [16] Zeyu Li, Oriol Vinyals, Harlyn Baker, Ruzenqa Bajcsy, “Feature Learning using Generalized Extreme Value Distribution based K-Means Clusteringâ€, 21st International Conference on Pattern Recognition(ICPR), IEEE, 2012.

      [17] Hua Yang, Jipu Gao, Changbao Xu, Zheng Long, Weigang Feng, Shaohua Xiong, Shuaiwei Liu and Shan Tan, “Infrared Image Change Detection of Substation Equipment in Power System using Random Forestâ€, 13th international Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), IEEE, 2017.

      [18] Vrushali Y. Kulkarni, Manisha Petare, P.K. Sinha, “Analyzing Random Forest Classifier with Different Split Measuresâ€, International Conference on Soft Computing, Advances in Intelligent Systems and Computing 236, Springer, 2014.

      [19] M. Octaviano Pratama, Aniati Murni Aryamurthy, “Automatic Land Cover Classification of Geotagged Images using ID3, Naïve Bayes and Random Forestâ€, ICACSIS, IEEE, 2017.

      [20] Zhi Liu, Bo Tang, Xiaofu He, Qingchen Qiu, Feng Liu, “Class-Specific Random Forest with Cross-Correlation Constraints for Spectral-Spatial Hyperspectral Image Classificationâ€, GeoScience and Remote Sensing Letters, Vol. 14, No. 2, IEEE, 2017.

      [21] Amanpreet Kaur, “A Review Paper on Image Segmentation and its various Techniques in Image Processingâ€, International Journal of Science and Research(IJSR), Vol. 3, Issue 12, 2014.

      [22] Sharan Agrawal, Shivam Rana, Tanvir Ahmad, “Random Forest for the Real Forestsâ€, second International Conference on Computer and Communication Technologies, Advances in Intelligent Systems and Computing 381, Springer, 2016.

      [23] Oliveira Julio. R, Soares, Leonardo. B., Costa, E.A.C, Bampi, Sergio, “Energy-Efficient Gaussian Filter for Image Processing using Approximate Adder Circuitsâ€, IEEE, 2015.

      [24] Nidhi, “Image Processing and Object Detectionâ€, International Journal of Applied Research, 2015.

      [25] Ahmad Nor Ikwan Masazhar, Mahanijah Md Kamal, “Digital Image Processing Technique for Palm Oil Leaf Disease Detection using Multiclass SVM Classifierâ€, 4th IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA), IEEE, 2017.

      [26] Neetu Chahal, Anuradha, “A Study on Agricultural Image Processing along with the Classification Modelâ€, International Advance Computing Conference (IACC), IEEE, 2015.

  • Downloads

  • How to Cite

    S, D., VG, N., & Kamath, P. (2018). Intelligent systems to forgery image detection based on the edge characteristics using soft computing techniques. International Journal of Engineering & Technology, 7(4), 4393-4397. https://doi.org/10.14419/ijet.v7i4.15368