Weber Law Based Approach for Multi-Class Image Forgery Detection

被引:2
|
作者
Akram, Arslan [1 ,3 ]
Rashid, Javed [2 ,3 ,4 ]
Jaffar, Arfan [1 ]
Hajjej, Fahima [5 ]
Iqbal, Waseem [6 ]
Sarwar, Nadeem [7 ]
机构
[1] Super Univ, Dept Comp Sci, Lahore 54000, Pakistan
[2] Univ Okara, Informat Technol Serv, Okara 56300, Pakistan
[3] MLC Lab, Departmet Comp Sci, Okara 56300, Pakistan
[4] Int Islamic Univ, Dept CS&SE, Islamabad 44000, Pakistan
[5] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11671, Saudi Arabia
[6] Superior Univ, Dept Software Engn, Lahore 54000, Pakistan
[7] Bahria Univ, Dept Comp Sci, Lahore Campus, Lahore 54600, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 01期
关键词
Copy-Move and splicing; non-overlapping block division; texture features; weber law; spatial domain; xgboost;
D O I
10.32604/cmc.2023.041074
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy -Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy -Move and splicing images using texture information of images in the spatial domain. Firstly, images are divided into equal blocks to get scale -invariant features. Weber law has been used for getting texture features, and finally, XGBOOST is used to classify both CopyMove and splicing forgery. The proposed method classified three types of forgeries, i.e., splicing, Copy -Move, and healthy. Benchmarked (CASIA 2.0, MICCF200) and RCMFD datasets are used for training and testing. On average, the proposed method achieved 97.3% accuracy on benchmarked datasets and 98.3% on RCMFD datasets by applying 10 -fold cross -validation, which is far better than existing methods.
引用
收藏
页码:145 / 166
页数:22
相关论文
共 50 条
  • [1] Image Forgery Detection Using Multi-Resolution Weber Local Descriptors
    Hussain, Muhammad
    Muhammad, Ghulam
    Saleh, Sahar Q.
    Mirza, Anwar M.
    Bebis, George
    2013 IEEE EUROCON, 2013, : 1564 - 1571
  • [2] An Optimal Approach for Multi-class Object Detection
    Deb, Ankit
    Chaudhuri, Rapti
    Deb, Suman
    DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 335 - 340
  • [3] A multi-class relevance feedback approach to image retrieval
    Jing, P
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2001, : 46 - 49
  • [4] Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors
    Hussain, Muhammad
    Qasem, Sahar
    Bebis, George
    Muhammad, Ghulam
    Aboalsamh, Hatim
    Mathkour, Hassan
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2015, 24 (04)
  • [5] Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors
    Saleh, Sahar Q.
    Hussain, Muhammad
    Muhammad, Ghulam
    Bebis, George
    ADVANCES IN VISUAL COMPUTING, PT II, 2013, 8034 : 416 - 424
  • [6] An Active Image Forgery Detection Approach Based on Edge Detection
    Macit, Huseyin Bilal
    Koyun, Arif
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 1603 - 1619
  • [7] Efficient and Generalized Image-Based CNN Algorithm for Multi-Class Malware Detection
    Liu, Yajun
    Fan, Hong
    Zhao, Jianguang
    Zhang, Jianfang
    Yin, Xinxin
    IEEE ACCESS, 2024, 12 : 104317 - 104332
  • [8] Multi-class fruit detection based on image region selection and improved object proposals
    Kuang, Hulin
    Liu, Cairong
    Chan, Leanne Lai Hang
    Yan, Hong
    NEUROCOMPUTING, 2018, 283 : 241 - 255
  • [9] COPY-MOVE IMAGE FORGERY DETECTION USING MULTI-RESOLUTION WEBER DESCRIPTOS
    Hussain, Muhammad
    Muhammad, Ghulam
    Saleh, Sahar Q.
    Mirza, Anwar M.
    Bebis, George
    8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012), 2012, : 395 - 401
  • [10] Intrusion detection system based on multi-class SVM
    Lee, H
    Song, J
    Park, D
    ROUGH SETS, FUZZY SETS, DATA MINING, AND GRANULAR COMPUTING, PT 2, PROCEEDINGS, 2005, 3642 : 511 - 519