Skip to main content
Log in

Fuzzy Based Image Forgery Classification with SWT-DCT-LBP Based Hybrid Features

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The reliability of photographs and digital images in general plays an essential role today in many areas of society. Technological advancements have greatly simplified the task of falsifying digital images, allowing in turn to decentralize production and accelerate its mass distribution. This makes the effects of these adulterated images instantaneous and global in scope, with a greater impact and damage for those who are harmed by its diffusion. This paper discusses the role that artificial intelligence can play in digital forensic analysis, proposing a review of the literature, in order to illustrate the areas of computer forensics in which artificial intelligence techniques have been used to date. This, to identify a new work niche in this area, hoping that the ideas in this document can represent promising directions for the development of more efficient and effective computer forensic tools.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Code availability

Not Applicable.

References

  1. Fu, Y., Lou, F., Meng, F., Tian, Z., Zhang, H. and Jiang, F., 2018, June. An intelligent network attack detection method based on rnn. In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (pp. 483–489). IEEE.

  2. Caviglione, L., Wendzel, S., & Mazurczyk, W. (2017). The future of digital forensics: Challenges and the road ahead. IEEE Security & Privacy, 15(6), 12–17.

    Article  Google Scholar 

  3. Ch, R., Gadekallu, T. R., Abidi, M. H., & Al-Ahmari, A. (2020). Computational system to classify cybercrime offenses using machine learning. Sustainability, 12(10), 4087.

    Article  Google Scholar 

  4. Zheng, L., Zhang, Y., & Thing, V. L. (2019). A survey on image tampering and its detection in real-world photos. Journal of Visual Communication and Image Representation, 58, 380–399.

    Article  Google Scholar 

  5. Meena, K.B. and Tyagi, V., 2019. Image forgery detection: survey and future directions. In Data, Engineering and applications (pp. 163–194). Springer, Singapore.

  6. Kaur, N., & Mahajan, N. (2016). Image forgery detection using SIFT and PCA classifiers for panchromatic images. Indian journal of Science and Technology, 9(35), 1–6.

    Article  Google Scholar 

  7. Yang, F., Li, J., Lu, W., & Weng, J. (2017). Copy-move forgery detection based on hybrid features. Engineering Applications of Artificial Intelligence, 59, 73–83.

    Article  Google Scholar 

  8. Mahale, V., Yannawar, P. and Gaikwad, A., 2020, January. Copy-Move Image Forgery Detection Using Discrete Wavelet Transform. In International Conference on Recent Trends in Image Processing and Pattern Recognition (pp. 158–168). Springer, Singapore.

  9. Alamro, L., & Yusoff, N. (2017). Copy-move forgery detection using integrated DWT and SURF. Journal of Telecommunication, Electronic and Computer Engineering JTEC, 9, 67–71.

    Google Scholar 

  10. Wang, C., Zhang, Z., Li, Q., & Zhou, X. (2019). An image copy-move forgery detection method based on SURF and PCET. IEEE Access, 7, 170032–170047.

    Article  Google Scholar 

  11. Moussa, A.M., (2020). KD-tree based algorithm for copy-move forgery detection. International Journal of Scientific & Technology Research, 9(03).

  12. Jing, Y., Bian, Y., Hu, Z., Wang, L., & Xie, X. Q. S. (2018). Deep learning for drug design: An artificial intelligence paradigm for drug discovery in the big data era. The AAPS Journal, 20(3), 1–10.

    Article  Google Scholar 

  13. Bahri, Y., Kadmon, J., Pennington, J., Schoenholz, S. S., Sohl-Dickstein, J., & Ganguli, S. (2020). Statistical mechanics of deep learning. Annual Review of Condensed Matter Physics, 11, 501–528.

    Article  Google Scholar 

  14. Kuznetsov, A., (2019) Digital image forgery detection using deep learning approach. In Journal of Physics: Conference Series (Vol. 1368, No. 3, p. 032028). IOP Publishing.

  15. Rodriguez-Ortega, Y., Ballesteros, D. M., & Renza, D. (2021). Copy-move forgery detection (CMFD) using deep learning for image and video forensics. Journal of Imaging, 7(3), 59.

    Article  Google Scholar 

  16. Kim, D. H., & Lee, H. Y. (2017). Image manipulation detection using convolutional neural network. International Journal of Applied Engineering Research, 12(21), 11640–11646.

    Google Scholar 

  17. Jabeen, S., Khan, U. G., Iqbal, R., Mukherjee, M., & Lloret, J. (2021). A deep multimodal system for provenance filtering with universal forgery detection and localization. Multimedia Tools and Applications, 80(11), 17025–17044.

    Article  Google Scholar 

  18. Osorio, J.A.C. and Robayo, C.D.L., (2020) Hybrid Algorithm for the detection of Pixel-based digital image forgery using Markov and SIFT descriptors. Revista Facultad de Ingeniería Universidad de Antioquia.

  19. Singh, G., & Singh, K. (2019). Video frame and region duplication forgery detection based on correlation coefficient and coefficient of variation. Multimedia Tools and Applications, 78(9), 11527–11562.

    Article  Google Scholar 

  20. Li, Y., & Zhou, J. (2018). Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Transactions on Information Forensics and Security, 14(5), 1307–1322.

    Article  Google Scholar 

  21. Teerakanok, S., & Uehara, T. (2019). Copy-move forgery detection: A state-of-the-art technical review and analysis. IEEE Access, 7, 40550–40568.

    Article  Google Scholar 

  22. Mahmood, T., Mehmood, Z., Shah, M., & Saba, T. (2018). A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. Journal of Visual Communication and Image Representation, 53, 202–214.

    Article  Google Scholar 

  23. Chen, B., Yu, M., Su, Q., Shim, H. J., & Shi, Y. Q. (2018). Fractional quaternion zernike moments for robust color image copy-move forgery detection. IEEE Access, 6, 56637–56646.

    Article  Google Scholar 

  24. Alberry, H. A., Hegazy, A. A., & Salama, G. I. (2018). A fast SIFT based method for copy move forgery detection. Future Computing and Informatics Journal, 3(2), 159–165.

    Article  Google Scholar 

  25. Islam, A., Long, C., Basharat, A. and Hoogs, A., (2020). DOA-GAN: Dual-order attentive generative adversarial network for image copy-move forgery detection and localization. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 4676–4685).

  26. Das, T., Hasan, R., Azam, M.R. and Uddin, J., (2018) February. A robust method for detecting copy-move image forgery using stationary wavelet transform and scale invariant feature transform. In 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2) (pp. 1–4). IEEE.

  27. Rathore, N.K., Jain, N.K., Shukla, P.K., Rawat, U. and Dubey, R., (2020) Image Forgery Detection Using Singular Value Decomposition with Some Attacks. National Academy Science Letters, pp.1–8.

  28. Dong, J., Wang, W. and Tan, T., (2013) Casia image tampering detection evaluation atabase. In 2013 IEEE China Summit and International Conference on Signal and Information Processing (pp. 422–426). IEEE.

Download references

Funding

No fund received for this project.

Author information

Authors and Affiliations

Authors

Contributions

Author 1: MSK He participated in the methodology, Conceptualization, Data collection and writing the study Author 2: Dr. ABK He Performed the Analysis the overall concept, writing and editing.

Corresponding author

Correspondence to Manish Shankar Kaushik.

Ethics declarations

Conflict of interest

The authors declare that we have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaushik, M.S., Kandali, A.B. Fuzzy Based Image Forgery Classification with SWT-DCT-LBP Based Hybrid Features. Wireless Pers Commun 130, 1527–1547 (2023). https://doi.org/10.1007/s11277-023-10343-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10343-1

Keywords

Navigation