Skip to main content
Log in

Image Forgery Detection Using Singular Value Decomposition with Some Attacks

  • Short Communication
  • Published:
National Academy Science Letters Aims and scope Submit manuscript

Abstract

To improve the trustworthiness to assess the digital images by identifying authentic images and tampered images, this work is focused on Copy-Move based image Forgery Detection (CMFD) and classification using Improved Relevance Vector Machine (IRVM). In this paper, Biorthogonal Wavelet Transform with Singular Value Decomposition (BWT-SVD)-based feature extraction is applied to find the image forgery. The proposed method begins with dividing the test images into overlapping blocks, and then Biorthogonal Wavelet Transform (BWT) with Singular Value Decomposition (SVD) applies to extract the feature vector from the blocks. After that, the feature vectors are sorts and the duplicate vectors are identified by the similarity between two successive vectors. The occurrences of clone vectors are identified on the basis of Minkowski distance and the threshold value. Then, similarity criteria result in the existence of forgery in images. To classify images into the category of authentic images or forged images, improved version of Relevance Vector Machine (RVM) uses, which leads to efficiency and accuracy of forged image identification process. Performance of proposed scheme tests by performing experiments on CoMoFoD database. The simulation results show that the proposed IRVM scheme attained high performance when compared with existing Copy-Move based image Forgery Detection schemes in MATLAB environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

References

  1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110

    Article  Google Scholar 

  2. Rathore N, Chana I (2014) Load balancing and job migration techniques in grid: a survey of recent trends. Wirel Pers Commun 79(3):2089–2125

    Article  Google Scholar 

  3. Kuznetsov AV, Myasnikov VV (2016) A copy-move detection algorithm based on binary gradient contours. Comput Opt 40:284–293

    Article  ADS  Google Scholar 

  4. Ranjani MB, Poovendran R (2016) Image duplication copy move forgery detection using discrete cosine transforms method. Int J Appl Eng Res 11(4):2671–2674

    Google Scholar 

  5. Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. Int J Electron Commun 70(8):1076–1087

    Article  Google Scholar 

  6. Puri M, Chopra V (2016) A survey: copy-move forgery detection methods. Int J Comput Syst 3(9):582–586

    Google Scholar 

  7. Rathore NK (2016) Ethical hacking & security against cyber Crime. J Inf Technol 5(1):7–11

    Google Scholar 

  8. Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. Int J Electron Commun 70:1076–1087

    Article  Google Scholar 

  9. Rathore N, Chana I (2014) Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing. J Intell Fuzzy Syst 27(6):2821–2833

    Article  Google Scholar 

  10. Goyal H, Gulati T (2014) Robust copy-move image forgery detection using SIFT. Int J Comput Sci Appl 97:14–19

    Google Scholar 

  11. Rathore NK, Chana I (2008) Comparative analysis of checkpointing. In: PIMR 3rd National IT conference, IT enabled practices and emerging management Paradigm book and category is communication technologies and security issues, Topic No/Name-46, Prestige Management and Research, Indore, pp 32–35

  12. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Forensics Secur 6(3):1099–1110

    Article  Google Scholar 

  13. Rathore NK, Chana I (2011) A cognitative analysis of load balancing technique with job migration in grid environment. In: World congress on information and communication technology (WICT), IEEE proceedings paper, Mumbai, ISBN 978-1-4673-0127-5, December 2011, pp 77–82

  14. Zhang G, Wang H (2012) SURF based detection of copy-move forgery in flat region. Int J Adv Comput Technol. https://doi.org/10.4156/ijact

    Article  Google Scholar 

  15. Rathore N, Chana I (2015) Variable threshold-based hierarchical load balancing technique in Grid. Eng Comput 31(3):597–615

    Article  Google Scholar 

  16. Li L, Li S, Zhu H (2013) An efficient scheme for detecting copy-move forged images by local binary patterns. J Inf Hiding Multimed Signal Process 4:46–56

    Google Scholar 

  17. Rathore NK, Chana I (2013) A sender initiate based hierarchical load balancing technique for grid using variable threshold value. In: International conference IEEE-ISPC, ISBN 978-1-4673-6188-0, 26–28 Sept 2013, pp 1–6

  18. Ayumi V, Fanany MI (2015) Distribution-sensitive learning on relevance vector machine for pose-based human gesture recognition. Procedia Comput Sci 72:527–534

    Article  Google Scholar 

  19. Rathore NK (2015) Map reduce architecture for grid. J Softw Eng 10(1):21–30

    MathSciNet  Google Scholar 

  20. Zainal N, Zain AM, Radzi NHM, Othman MR (2016) Glowworm swarm optimization (GSO) for optimization of machining parameters. J Intell Manuf 27(4):797–804

    Article  Google Scholar 

  21. Rathore NK (2014) Efficient hierarchical load balancing technique based on grid. In: 29th M. P. Young scientist congress, Bhopal, Feb 28, 2014, pp 55

  22. Huynh-Kha T, Le-Tien T, Ha-Viet-Uyen S, Huynh-Van K, Luong M (2016) A robust algorithm of forgery detection in copy-move and spliced images. Int J Adv Comput Sci Appl 7(3):1–8

    Article  Google Scholar 

  23. Rathore N (2018) Performance of hybrid load balancing algorithm in distributed web server system. Wirel Pers Commun 101(4):1233–1246

    Article  Google Scholar 

  24. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD-new database for copy-move forgery detection. In: Proceedings of the 55th international symposium ELMAR-2013, pp 49–54

  25. Rathore NK (2015) Efficient agent based priority scheduling and load balancing using fuzzy logic in grid computing. J Comput Sci 3(3):11–22

    Google Scholar 

  26. Jain N, Rathore N, Mishra A (2017) An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine with some attacks. Interciencia J 42(11):95–120

    Google Scholar 

  27. Kaur Savroop, Dadhwal Hartej S (2015) Biorthogonal wavelet transform using bilateral filter and adaptive histogram equalization. Int J Intell Syst Appl 7(3):37

    Google Scholar 

  28. Rathore N (2016) Dynamic threshold based load balancing algorithms. Wirel Pers Commun 91(1):151–185

    Article  Google Scholar 

  29. Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int 231(1):284–295

    Article  PubMed  Google Scholar 

  30. Rathore N, Rawat U, Kulhari SC (2019) Efficient hybrid load balancing algorithm. Natl Acad Sci Lett. https://doi.org/10.1007/s40009-019-00834-w

    Article  Google Scholar 

  31. Jain N, Rathore N, Mishra A (2018) An efficient image forgery detection using biorthogonal wavelet transform and improved relevance vector machine. Wirel Pers Commun 101(4):1983–2008

    Article  Google Scholar 

  32. Rathore N, Chana I (2016) Job migration policies for grid environment. Wirel Pers Commun 89(1):241–269

    Article  Google Scholar 

  33. Sharma V, Kumar R, Rathore NK (2015) Topological broadcasting using parameter sensitivity based logical proximity graphs in coordinated ground-flying ad hoc networks. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 6(3):54–72

    Google Scholar 

  34. Rathore NK, Chana I (2013) Report on hierarchal load balancing technique in grid environment. J Inf Technol 2(4):21–35

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neeraj Kumar Rathore.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rathore, N.K., Jain, N.K., Shukla, P.K. et al. Image Forgery Detection Using Singular Value Decomposition with Some Attacks. Natl. Acad. Sci. Lett. 44, 331–338 (2021). https://doi.org/10.1007/s40009-020-00998-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40009-020-00998-w

Keywords

Navigation