Dbelm for Image Forgery Detection  
  Authors : Arun Anoop M; Poonkuntran S

 

Image forgery or manipulation is the removal of interested region from the particular image by the use of freely available manipulation tools. One of the popular attacks is copy move forgery attack. Main aim of image forgery is to hide the interested region or reproducing new region in that particular image in order to falsify the particular image for publicity or saving their individual from danger or fame or earns or cheat or fun An 'Alexnet based Convolutional Neural Network(CNN)' is intended for picture fraud discovery. As the accuracy parameters resulted same in the case of one attack consideration in previous methodologies, this framework concentrate copy move attack and splicing attacks. The experiment results proposed DBELM outperforms existing CMFD frameworks by a significant edge on the five freely available datasets: MIASDBv1, CASIA, CoMoFoD, Kodak & Google and MNIST handwritten dataset. For primer evaluation, MNIST dataset initially processed to check classification accuracy by CNN based on different splits and not processed by DBELM. That motivation helped us to take 90:10 split for DBELM research work. Novelty of the work is the design and implementation of proposed system, and moreover the review of previous algorithm(s) in the area of feature extraction, which aims to explore the different extraction methods, feature determination which is utilized for dimensionality reduction to eliminate repetitive and immaterial features, classifiers which are utilized for supervised or unsupervised machine learning and metrics which are the measures or parameters or accuracy improving methods for evaluation. A small % of accuracy improvement will help to cure patient's health from danger if the important document is altered. And also we located the forged region with the help of moment based algorithm (Zernike Moment) and used bat optimized extreme learning machine for better image forgery classification accuracy. An accuracy of 98% has been accomplished for the four datasets. Proposed framework demonstrates the credibility of the digital image from forgery. For better evaluation, review about all the related terms, comparative results and performance evaluation results are included. And the DBELM outperforms our previous methodologies LORA and LPG. In future, DBELM will process MNIST handwritten dataset and compare with DELM-AE, DELM & DBP methods and find out the best one among those for image forgery detection research field.

 

Published In : IJCAT Journal Volume 7, Issue 10

Date of Publication : October 2020

Pages : 151-160

Figures :16

Tables :06

 

 

 

Arun Anoop M : PhD Scholar, Department of Computer Science and Engineering Velammal College of Engineering & Technology Madurai, Tamilnadu, India.

Poonkuntran S : Professor, Department of Computer Science and Engineering Velammal College of Engineering & Technology Madurai, Tamilnadu, India.

 

 

 

 

 

 

 

Image forgery and detection; BAT ecology algorithm(BAT); Extreme Learning Machine(ELM); Alexnet based Deep CNN; Copy Move Forgery Detection(CMFD)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Authenticity expectation of a picture has ended up being basic these days in each field. Trial results have indicated that this technique gives high classification accuracy regarding various splits as we considered all through our exploration work. In the tests, the proposed technique beats some current strategies for our past exploration approaches and furthermore conventional techniques. Among four classifiers ELM demonstrated as productive in work with high classification accuracy rate. With BATELM algorithm, accomplished 98%. In future, we will do likewise with some auto-encoders ideas with various epochs.

 

 

 

 

 

 

 

 

 

[1] Mr.Arun Anoop M,"Review on Image forgery and its detection",ICIIECS,2015,IEEE,10.1109/ ICIIECS.2015.719 3253 [2] Arun Anoop M, Poonkuntran S,"Certain investigation on Biomedical impression and Image Forgery Detection," International Journal of Biomedical Engineering and Technology , DOI:10.1504/ IJBET. 2018. 1 0023469 unpublished [3] Arun Anoop M, Poonkuntran S,"LORA APPROACH FOR IMAGE FORGERY DETECTION AND LOCALIZATION IN DIGITAL IMAGES", CnR's International Journal of Social & Scientific Research, India, Vol.04 Issue (III) ISSN: 2454-3187,Jan2019. [4] Arun Anoop M, Poonkuntran S,"LPG-A NOVEL APPROACH FOR MEDICAL FORGERY DETECTION IN IMAGE TRANSMISSION," Journal of Ambient Intelligence and Humanized Computing (2020), DOI: 10.1007/s12652-020-01932-0 [5] Arun Anoop M, Dr.S.Poonkuntran, Dr.V.Vasudevan, Dr.P.Alli,"Study of the importance of digital forensics and deep learning tools", International Journal of Advanced Science and Technology ,Vol. 28, No. 20, (2019), pp. 963-978 [6] J. D. Altringham, Bats: Biology and Behaviour, Oxford University Press, (1996). [7] P. Richardson, Bats. Natural History Museum, London, (2008) [8] Yang, X. S. (2010). "A New Metaheuristic Bat-Inspired Algorithm, in: Nature Inspired Cooperative Strategies for Optimization (NISCO 2010)". Studies in Computational Intelligence. 284: 65-74. [9] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, G. Serra, A SIFT-based forensic method for copy-move attack detection and transforma-tion recovery, IEEE Trans. Inf. Forensics Secur. 6 (2011) 1099-1110.https://doi.org/10.1109/TIFS.2011.2129512. [10] H. Farid, Photo Tampering Throughout History, [Online] Http//Www. Cs.Dartmouth. Edu/Farid/Research/Digitaltampering. (2011). [11] B. Wen, Y. Zhu, R. Subramanian, T.T. Ng, X. Shen, S. Win-kler, COVERAGE - A novel database for copy-move forgery detection,Proc. - Int. Conf. Image Process. ICIP. 2016-Augus (2016) 161-165.580 https://doi.org/10.1109/ICIP.2016.7532339. [12] Dijana Tralic, Ivan Zupancic, Sonja Grgic, Mislav Grgic, CoMoFoD - New Database for Copy-Move Forgery Detection, 55th International Symposium ELMAR-2013, 25-27 September 2013,pp 49-54, Zadar, Croatia [13] D.T. Dang-Nguyen, C. Pasquini, V. Conotter, G. Boato, RAISE - A raw images dataset for digital image forensics, Proc. 6th ACM Multimed. Syst. Conf. MMSys 2015. (2015) 219-224.https://doi.org/10.1145/2713168.2713194. [14] CASIA Image Tampering Detection Evaluation Database, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Science, available at: forensics.idealtest.org [15] T. Ng and S. Chang, "A Data Set of Authentic and Spliced Image Blocks," Columbia University, Tech. Rep. 203-2004-3, January 2004 [16] V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An Evaluation of Popular Copy-Move Forgery Detection Approaches," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, December 2012 [17] S. Battiato and G. Messina, "Digital Forgery Estimation into DCT Domain - A Critical Analysis," in ACM Multimedia Workshop Multimedia in Forensics, pp. 37-42, October 2009 [18] M. Goljan, J. Fridrich, and T. Filler, "Large Scale Test of Sensor Fingerprint Camera Identification," in SPIE Media Forensics and Security, vol. 7254, pp. 0I 01-12, January 2009 [19] T. Gloe and R. Böhme, "The 'Dresden Image Database' for benchmarking digital image forensics," in 25th Symposium on Applied Computing, vol. 2, pp. 1585-1591, March 2010 [20] J. Fridrich, D. Soukal, and J. Lukas, "Detection of copy-move forgery in digital images," in Proceedings of Digital Forensic Research Workshop, pp. 55-61, August 2003 [21] Suckling J, Parker J, Dance D, Astley S, Hutt I, Boggis C, Ricketts I, Stamatakis E, Cerneaz N, Kok S-L, Taylor P, Betal D, Savage J (1994) Mammographic image analysis society digit [22] Yaseen ZM, Deo RC, Hilal A, Abd AM, Bueno LC, Salcedo-Sanz S, Nehdi ML (2017) Predicting compressive strength of lightweight foamed concrete using extreme learning machine model. Adv Eng Softw. https://doi.org/10.1016/j.advengsoft.2017.09.004 [23] Feng G, Huang G-B, Lin Q, Gay R (2009) Error minimized extreme learning machine with growth of hidden nodes and incremental learning. IEEE Trans Neural Netw 20(8):1352-1357 [24] I. Amerini, T. Uricchio, L. Ballan, R. Caldelli, Localization of JPEG Dou-ble Compression Through Multi-domain Convolutional Neural Networks,710 IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit.Work. 2017-July (2017) 1865-1871. https://doi.org/10.1109/ CVPRW.2017.233. [25] Q. Wang, R. Zhang, Double JPEG compression forensics based on a convolutional neural network, Eurasip J. Inf. Secur. 2016 (2016). https://doi.org/10.1186/s13635-016-0047-y. [26] V. Verma, N. Agarwal, N. Khanna, DCT-domain deep convolutional neural networks for multiple JPEG compression classification, Signal Process. Image Commun. 67 (2018) 22-33.https://doi.org/10.1016/j.image.2018.04.014. [27] Gu J, Wang Z, Kuen J, Ma L, Shahroudy A, Shuai B, Liu T, Wang X, Wang G, Cai J, Chen T (2018) Recent advances in convolutional neural networks. Pattern Recogn 77:354-377 [28] Kim D-H, Lee H-Y (2017) Image manipulation detection using convolutional neural network. Int J Appl Eng Res 12(21):11640-11646 [29] Liu Y, Yin B, Yu J, Wang Z (2016) Image classification based on convolutional neural networks with crosslevel strategy. Multimed Tool Appl 76(8):11065-11079 [30] Tran DT, Iosifidis A, Gabbouj M (2018) Improving efficiency in convolutional neural networks with multilinear filters. Neural Networks 105:328-339 [31] Zeiler MD, Fergus R (2014) Visualizing and understanding convolutional networks. European Conference on Computer Vision (ECCV), pp 818-833 [32] Akshay Agarwal, Richa Singh, and Mayank Vatsa (2017), Face Anti-Spoofing using Haralick Features, IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), DOI: 10.1109/BTAS.2016.7791171 [33] D'Avino, Dario & Cozzolino, Davide & Poggi, Giovanni & Verdoliva, Luisa. (2017). Autoencoder with recurrent neural networks for video forgery detection. Electronic Imaging. 2017. 92-99. 10.2352/ISSN.2470-1173.2017.7.MWSF-330. [34] Liao, Bin & Xu, Jungang & Lv, Jintao & Zhou, Shilong. (2015). An Image Retrieval Method for Binary Images Based on DBN and Softmax Classifier. IETE Technical Review. 32. 294-303. 10.1080/02564602.2015.1015631. [35] Fatahi, Mazdak. (2014). MNIST handwritten digits Description and using. 10.13140/2.1.4601.1681. [36] Bao, Yu & Li, Haojie & Fan, Xin & Liu, Risheng & Jia, Qi. (2016). Region-based CNN for Logo Detection. 319-322. 10.1145/3007669.3007728. [37] Elaskily, Mohamed & Elnemr, Heba & Sedik, Ahmed & Dessouky, Mohamed & El Banby, Ghada & Elaskily, Osama & Khalaf, Ashraf A. M. & Aslan, Heba & Faragallah, Osama & Abd El-Samie, Fathi. (2020). A novel deep learning framework for copy-move forgery detection in images. Multimedia Tools and Applications. 10.1007/s11042-020-08751-7. [38] Maeda, Toshiyuki & Bryzgalov, Peter & Shigeto, Y. (2020). Impact of changes in the Mini-batch size on CNN Training Epoch Time. 10.13140/RG.2.2.19390.51521. [39] Zhuo, Li'an & Zhang, Baochang & Chen, Chen & Ye, Qixiang & Liu, Jianzhuang & Doermann, David. (2019). Calibrated Stochastic Gradient Descent for Convolutional Neural Networks. Proceedings of the AAAI Conference on Artificial Intelligence. 33. 9348-9355. 10.1609/aaai.v33i01.33019348. [40] Guoying Zhao and Matti Pietik¨ainen(2007), Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2007 [41] Kylberg G, Sintorn IM (2013) Evaluation of noise robustness for local binary pattern descriptors in texture classifcation. EURASIP J Image Video Process 1:17 [42] Kylberg G, Sintorn I-M (2016) On the influence of interpolation method on rotation invariance in texture recognition. EURASIP J Image Video Process 2016:17 [43] Girisha AB, Chandrashekhar MC, Kurian MZ (2013) Texture feature extraction of video frames using GLCM. Int J Eng Trends Technol 4(6):2718-2721 [44] Tan X, Triggs B (2007) Enhanced local texture feature sets for face recognition under difcult lighting conditions. IEEE Trans Image Process 19(6):635-1650 [45] Nanni L, Brahnam S, Lumini A (2010) A local approach based on a local binary patterns variant texture descriptor for classifying pain states. Expert Syst Appl 37(12):7888-7894 [46] Lee JC, Chang CP, Chen WK (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci. https:// doi.org/10.1016/j.ins.2015.03.009 [47] Soni B, Das PK, Thounaojam DM (2017) Copy-move tampering detection based on local binary pattern histogram Fourier feature. In: ICCCT-2017: proceedings of the 7th international conference on computer and communication technology, November 2017, pp 78-83 [48] Yang F, Li J, Lu W, Weng J (2017) Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell 59(2017):73-83. https:// doi.org/10.1016/j.engappai.2016.12.022 [49] Baber, Junaid & Satoh, Shin'ichi & Afzulpurkar, Nitin & Bakhtyar, Maheen. (2012). Q-CSLBP: Compression of CSLBP descriptor. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7674 LNCS. 513-521. 10.1007/978-3-642-34778-8_48. [50] Huang, di & Wang, Yiding. (2007). A Robust Method for Near Infrared Face Recognition Based on Extended Local Binary Pattern. 437-446. 10.1007/978-3-540-76856-2_43. [51] Ahmed, Faisal & Hossain, Emam & Bari, A. & Shihavuddin, A.. (2011). Compound local binary pattern (CLBP) for robust facial expression recognition. 12th IEEE International Symposium on Computational Intelligence and Informatics, CINTI 2011 - Proceedings. 10.1109/CINTI.2011.6108536. [52] Li, Jiayuan & Hu, Qingwu & Ai, Mingyao. (2018). RIFT: Multi-modal Image Matching Based on Radiation-invariant Feature Transform. [53] Liang, Yixiong & Liu, Lingbo & Xu, Ying & Xiang, Yao & Zou, Beiji. (2011). Multi-task GLOH feature selection for human age estimation. Proceedings - International Conference on Image Processing, ICIP. 10.1109/ICIP.2011.6116611 [54] Guo Y, Cao X, Zhang W, Wang R (2018) Fake colorized image detection. IEEE Trans Inf Forensics Secur 13(8):1932-1944 [55] Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: detecting copy-move image forgery with source/target localization. In: European conference on computer vision (ECCV) [56] BAT food source: Available : https://askabiologist.asu.edu/bat-food [57] CNN Cheatsheet: Available: https://stanford.edu/~shervine/teaching/cs-230/cheatsheet-convolutional-neural-networks [58] Deep fake detection challenge :Available: https://www.kaggle.com/c/deepfake-detection-challenge/overview/prizes [59] DRIVE: Available: http://www.isi.uu.nl/Research/Databases/DRIVE/ [60] MESSICOR, Available: http://www.adcis.net/en/third-party/messidor/ [61] STARE Available: https://cecas.clemson.edu/~ahoover/stare/images/all-images.zip [62] CASIA V1, Available:https://www.kaggle.com/sophatvathana/casia-dataset? [63] CASIA V2, Available: https://www.kaggle.com/shaft49/real-vs-fake-images-casia-dataset [64] NB-CASIA,Available:https://github.com/nurbaqiyah/CMF-Dataset/tree/master/NB-CASIA [65] USC-SIPI,Available:http://sipi.usc.edu/database/ [66] CoMoFoD,Available: https://www.vcl.fer.hr/comofod/ [67] Kodakand Google, ,Available:http://www.cs.albany.edu/~ xypan/research/snr/Kodak.html [68] Flickr,Available:https://www.kaggle.com/hsankesara/flickr-image-dataset [69] MICC-F220, Available:https://github.com/niyishakapatrick/Copy-move-forgery-detection-Image-Blobs_AKAZE-ORB-BRISK-SURF-SIFT-results-on-MICCF220-MICCF2000 [70] GRIP,Available:http://www.grip.unina.it/download/prog/CMFD/CMFDdb_grip.zip [71] FAU,Available:http://www5.cs.fau.de/our-team [72] SMIFD,Available:https://github.com/Rana110223/SMIFD-500 [73] WILD WEB,Available:https://mklab.iti.gr/results/the-wild-web-tampered-image-dataset/ [74] PS-Battles,Available:https://github.com/dbisUnibas/ps-battles [75] COVERAGE,Available:https://1drv.ms/f/s!AggVhXcCj1FLhUUyUrqSpV_yI_GH [76] Columbia Image Splicing, Available: http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/dlform.html [77] FFCMF,Available:http://emregurbuz.tc/research/imagedatasets/ffcmf/ffcmf_dataset.rar [78] OICIO,Available:http://emregurbuz.tc/research/imagedatasets/oicio/oicio_dataset.rar [79] Deepfakes,Available:https://github.com/ondyari/FaceForensics [80] DDSM,Available:https://www.kaggle.com/skooch/ddsm-mammography [81] DDSM,Available:http://www.eng.usf.edu/cvprg/Mammography/Database.html [82] CBIS-DDSM, ,Available:https://wiki.canceri magingarchive.net/display/ Public/CBIS-DDSM [83] MIASDBv1,Available:https://www.repository.cam.ac.uk/bitstream/handle/1810/250394/miasdbv1.21.zip?sequence=3&isAllowed=y [84] Chestx-ray,Available:https://www.kaggle.com/paultimo thymooney /chest-xray-pneumonia [85] Novel CORONA virus,Available:https://www.kaggle.com /sudalairajkumar/novel-corona-virus-2019-dataset [86] CATARACT,Available:https://github.com/KrishnaRauniyar/CataractDetectionApp-UsingCNN-NeuralNetwork/tree/master/Cataract [87] Glaucoma(RIGA) ,Available:https://deepblue.lib.umich.edu/data/downloads/g732d957m [88] Yaseen ZM, Deo RC, Hilal A, Abd AM, Bueno LC, Salcedo-Sanz S, Nehdi ML (2017) Predicting compressive strength of lightweight foamed concrete using extreme learning machine model. Adv Eng Softw. https://doi.org/10.1016/j.advengsoft.2017.09.004 [89] Guo Y, Cao X, Zhang W, Wang R (2018) Fake colorized image detection. IEEE Trans Inf Forensics Secur 13(8):1932-1944 [90] Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: detecting copy-move image forgery with source/target localization. In: European conference on computer vision (ECCV)