Author:
Agarwal Ritu,Pant Mallika
Abstract
As digital images become an indispensable source of information, the authentication of digital images has become crucial. Various techniques of forgery have come into existence, intrusive, and non-intrusive. Image forgery detection hence is becoming more challenging by the day, due to the unwavering advances in image processing. Therefore, image forensics is at the forefront of security applications aiming at restoring trust and acceptance in digital media by exposing counterfeiting methods. The proposed work compares between various feature selection algorithms for the detection of image forgery in tampered images. Several features are extracted from normal and spliced images using spatial grey level dependence method and many more. Support vector machine and Twin SVM has been used for classification. A very difficult problem in classification techniques is to pick features to distinguish between classes. Furthermore, The feature optimization problem is addressed using a genetic algorithm (GA) as a search method. At last, classical sequential methods and floating search algorithm are compared against the genetic approach in terms of the best recognition rate achieved and the optimal number of features.
Reference21 articles.
1. Rey C and Dugelay J-L, "A survey of watermarking algorithms for image authentication.," EURASIP Journal on Applied Signal Processing, pp. 613-621, 2002.
2. Potdar V M, Han S, and Chang E, "A survey of digital image watermarking," in 3rd IEEE International Conference on Industrial Informatics, Perth,WesternAustralia, 2005, pp. 709-716.
3. Granty Regina Elwin J, Aditya T S, and Madhu Shankar S, "Survey on Passive Methods of Image Tampering Detection," in Proceedings of the International Conference on Communication and Computational Intelligence, 2010, pp. 431-436.
4. Mahdian B and Saic S, "A bibliography on blind methods for identifying image forgery," in Signal Processing:Image Communication, 2010, pp. 389-399.
5. Ali Qureshi M and Deriche M, "A Review on Copy Move Image Forgery Detection Techniques," in IEEE, 2014.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Image tampering detection using extreme learning machine;THE SECOND INTERNATIONAL SCIENTIFIC CONFERENCE (SISC2021): College of Science, Al-Nahrain University;2023