Search results

1 – 10 of 126
Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1165

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 August 2021

V. Vinolin and M. Sucharitha

With the advancements in photo editing software, it is possible to generate fake images, degrading the trust in digital images. Forged images, which appear like authentic images

Abstract

Purpose

With the advancements in photo editing software, it is possible to generate fake images, degrading the trust in digital images. Forged images, which appear like authentic images, can be created without leaving any visual clues about the alteration in the image. Image forensic field has introduced several forgery detection techniques, which effectively distinguish fake images from the original ones, to restore the trust in digital images. Among several forgery images, spliced images involving human faces are more unsafe. Hence, there is a need for a forgery detection approach to detect the spliced images.

Design/methodology/approach

This paper proposes a Taylor-rider optimization algorithm-based deep convolutional neural network (Taylor-ROA-based DeepCNN) for detecting spliced images. Initially, the human faces in the spliced images are detected using the Viola–Jones algorithm, from which the 3-dimensional (3D) shape of the face is established using landmark-based 3D morphable model (L3DMM), which estimates the light coefficients. Then, the distance measures, such as Bhattacharya, Seuclidean, Euclidean, Hamming, Chebyshev and correlation coefficients are determined from the light coefficients of the faces. These form the feature vector to the proposed Taylor-ROA-based DeepCNN, which determines the spliced images.

Findings

Experimental analysis using DSO-1, DSI-1, real dataset and hybrid dataset reveal that the proposed approach acquired the maximal accuracy, true positive rate (TPR) and true negative rate (TNR) of 99%, 98.88% and 96.03%, respectively, for DSO-1 dataset. The proposed method reached the performance improvement of 24.49%, 8.92%, 6.72%, 4.17%, 0.25%, 0.13%, 0.06%, and 0.06% in comparison to the existing methods, such as Kee and Farid's, shape from shading (SFS), random guess, Bo Peng et al., neural network, FOA-SVNN, CNN-based MBK, and Manoj Kumar et al., respectively, in terms of accuracy.

Originality/value

The Taylor-ROA is developed by integrating the Taylor series in rider optimization algorithm (ROA) for optimally tuning the DeepCNN.

Details

Data Technologies and Applications, vol. 56 no. 1
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 14 February 2022

Arslan Akram, Saba Ramzan, Akhtar Rasool, Arfan Jaffar, Usama Furqan and Wahab Javed

This paper aims to propose a novel splicing detection method using a discriminative robust local binary pattern (DRLBP) with a support vector machine (SVM). Reliable detection of…

Abstract

Purpose

This paper aims to propose a novel splicing detection method using a discriminative robust local binary pattern (DRLBP) with a support vector machine (SVM). Reliable detection of image splicing is of growing interest due to the extensive utilization of digital images as a communication medium and the availability of powerful image processing tools. Image splicing is a commonly used forgery technique in which a region of an image is copied and pasted to a different image to hide the original contents of the image.

Design/methodology/approach

The structural changes caused due to splicing are robustly described by DRLBP. The changes caused by image forgery are localized, so as a first step, localized description is divided into overlapping blocks by providing an image as input. DRLBP descriptor is calculated for each block, and the feature vector is created by concatenation. Finally, features are passed to the SVM classifier to predict whether the image is genuine or forged.

Findings

The performance and robustness of the method are evaluated on public domain benchmark data sets and achieved 98.95% prediction accuracy. The results are compared with state-of-the-art image splicing finding approaches, and it shows that the performance of the proposed method is improved using the given technique.

Originality/value

The proposed method is using DRLBP, an efficient texture descriptor, which combines both corner and inside design detail in a single representation. It produces discriminative and compact features in such a way that there is no need for the feature selection process to drop the redundant and insignificant features.

Details

World Journal of Engineering, vol. 19 no. 4
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 4 August 2022

Kha-Tu Huynh, Tu-Nga Ly and Thuong Le-Tien

This study aims to solve problems of detecting copy-move images. With input images, the problem aims to: Confirm the original or forgery of the images, evaluate the performance of…

Abstract

Purpose

This study aims to solve problems of detecting copy-move images. With input images, the problem aims to: Confirm the original or forgery of the images, evaluate the performance of the detection and compare the proposed method’s effectiveness to the related ones.

Design/methodology/approach

This paper proposes an algorithm to identify copy-move images by matching the characteristics of objects in the same group. The method is carried out through two stages of grouping the objects and comparing objects’ features. The classification and clustering can improve processing time by skipping groups of only one object, and feature comparison on objects in the same group improves accuracy of the detection. YOLO5, the latest version of you only look once (YOLO) developed by Ultralytics LLC, and K-means are applied to classify and group the objects in the first stage. Then, modified Zernike moments (MZMs) and correlation coefficients are used for the features extraction and matching in the second stage. The Open Images V6 data set is used to train the YOLO5 model. The combination of YOLO5 and MZM makes the effectiveness of the proposed method for copy-move image detection with an average accuracy of 94.26% for images of benchmark and MICC-F600 and 95.37% for natural images. The outstanding feature of the method is that it can balance both processing time and accuracy in detecting duplicate regions on the image.

Findings

The problem is then solved by doing the following steps: Build a method to detect objects and compare their features to find the similarity if they are copy-move objects; use YOLO5 for the object detection and group the same category objects; ignore the group having only one object and extract the features of the other groups by MZMs; detect copy-move regions using K-means clustering; and calculate and compare the detection accuracy of the proposed method and related methods.

Originality/value

The main contributions of this paper include: Reduce the processing time by using YOLO5 in objects detection and K-means in clustering; improve the accuracy by using MZM to extract features and correlation coefficients to matching them; and implement and prove the effectiveness of the proposed method for three copy-move data sets: benchmark, MICC-F600 and author-built images.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 29 July 2020

Abdullah Alharbi, Wajdi Alhakami, Sami Bourouis, Fatma Najar and Nizar Bouguila

We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is…

Abstract

We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is extremely challenging and important for many applications. The proposed approach involves developing new probabilistic support vector machines (SVMs) kernels from a flexible generative statistical model named “bounded generalized Gaussian mixture model”. The developed learning framework has the advantage to combine properly the benefits of both discriminative and generative models and to include prior knowledge about the nature of data. It can effectively recognize if an image is a tampered one and also to identify both forged and authentic images. The obtained results confirmed that the developed framework has good performance under numerous inpainted images.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 7 December 2021

Thorsten Stephan Beck

This paper provides an introduction to research in the field of image forensics and asks whether advances in the field of algorithm development and digital forensics will…

Abstract

Purpose

This paper provides an introduction to research in the field of image forensics and asks whether advances in the field of algorithm development and digital forensics will facilitate the examination of images in the scientific publication process in the near future.

Design/methodology/approach

This study looks at the status quo of image analysis in the peer review process and evaluates selected articles from the field of Digital Image and Signal Processing that have addressed the discovery of copy-move, cut-paste and erase-fill manipulations.

Findings

The article focuses on forensic research and shows that, despite numerous efforts, there is still no applicable tool for the automated detection of image manipulation. Nonetheless, the status quo for examining images in scientific publications remains visual inspection and will likely remain so for the foreseeable future. This study summarizes aspects that make automated detection of image manipulation difficult from a forensic research perspective.

Research limitations/implications

Results of this study underscore the need for a conceptual reconsideration of the problems involving image manipulation with a view toward the need for interdisciplinary collaboration in conjunction with library and information science (LIS) expertise on information integrity.

Practical implications

This study not only identifies a number of conceptual challenges but also suggests areas of action that the scientific community can address in the future.

Originality/value

Image manipulation is often discussed in isolation as a technical challenge. This study takes a more holistic view of the topic and demonstrates the necessity for a multidisciplinary approach.

Details

Journal of Documentation, vol. 78 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 8 November 2019

Wei-Yen Hsu

Virtual medical instrumentation plays a vital role in a telemedicine system that obtains data from the medical instrument, required by doctors at remote location to diagnose a…

Abstract

Purposed

Virtual medical instrumentation plays a vital role in a telemedicine system that obtains data from the medical instrument, required by doctors at remote location to diagnose a patient. In recent years, the analysis of skin quality by telemedicine system has become an emerging trend. To allow the skin to complement the beauty products and achieve better improvement results, the purpose of this study is to provide advice on a system that can objectively evaluate the condition of the skin of the face and to match appropriate beauty and cosmetic products.

Design/methodology/approach

A novel customer-oriented medical system is proposed for the applications of telemedicine in this study, whose aim is to improve information transfer quality and rate to further enhance the communication between medical staffs and patients in the telemedicine. More specifically, facial skin will be recorded with digital images, and skin detection will be performed using image processing technology to facilitate doctors to provide medical treatment for the patients at far end.

Findings

The roughness, freckles and acne indicators were evaluated after obtaining skin images. These three indicators were used as input to the system, and skin scores were then calculated to evaluate skin conditions to further provide more matching skin care.

Originality/value

This can improve the health problems that have occurred and can also record the skin condition for each test. Experimental results suggest that it is suitable for the applications of telemedicine.

Details

The Electronic Library, vol. 37 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 30 April 2021

Faruk Bulut, Melike Bektaş and Abdullah Yavuz

In this study, supervision and control of the possible problems among people over a large area with a limited number of drone cameras and security staff is established.

Abstract

Purpose

In this study, supervision and control of the possible problems among people over a large area with a limited number of drone cameras and security staff is established.

Design/methodology/approach

These drones, namely unmanned aerial vehicles (UAVs) will be adaptively and automatically distributed over the crowds to control and track the communities by the proposed system. Since crowds are mobile, the design of the drone clusters will be simultaneously re-organized according to densities and distributions of people. An adaptive and dynamic distribution and routing mechanism of UAV fleets for crowds is implemented to control a specific given region. The nine popular clustering algorithms have been used and tested in the presented mechanism to gain better performance.

Findings

The nine popular clustering algorithms have been used and tested in the presented mechanism to gain better performance. An outperformed clustering performance from the aggregated model has been received when compared with a singular clustering method over five different test cases about crowds of human distributions. This study has three basic components. The first one is to divide the human crowds into clusters. The second one is to determine an optimum route of UAVs over clusters. The last one is to direct the most appropriate security personnel to the events that occurred.

Originality/value

This study has three basic components. The first one is to divide the human crowds into clusters. The second one is to determine an optimum route of UAVs over clusters. The last one is to direct the most appropriate security personnel to the events that occurred.

Details

International Journal of Intelligent Unmanned Systems, vol. 12 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 8 July 2022

Uzair Khan, Hikmat Ullah Khan, Saqib Iqbal and Hamza Munir

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in…

Abstract

Purpose

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in the research domains of object detection, Biomedical Imaging and Semantic segmentation. In this study, a bibliometric analysis of publications related to image processing in the Science Expanded Index Extended (SCI-Expanded) has been performed. Several parameters have been analyzed such as annual scientific production, citations per article, most cited documents, top 20 articles, most relevant authors, authors evaluation using y-index, top and most relevant sources (journals) and hot topics.

Design/methodology/approach

The Bibliographic data has been extracted from the Web of Science which is well known and the world's top database of bibliographic citations of multidisciplinary areas that covers the various journals of computer science, engineering, medical and social sciences.

Findings

The research work in image processing is meager in the past decade, however, from 2014 to 2019, it increases dramatically. Recently, the IEEE Access journal is the most relevant source with an average of 115 publications per year. The USA is most productive and its publications are highly cited while China comes in second place. Image Segmentation, Feature Extraction and Medical Image Processing are hot topics in recent years. The National Natural Science Foundation of China provides 8% of all funds for Image Processing. As Image Processing is now becoming one of the most critical fields, the research productivity has enhanced during the past five years and more work is done while the era of 2005–2013 was the area with the least amount of work in this area.

Originality/value

This research is novel in this regard that no previous research focuses on Bibliometric Analysis in the Image Processing domain, which is one of the hot research areas in computer science and engineering.

Article
Publication date: 6 March 2017

Yujie Cheng, Hang Yuan, Hongmei Liu and Chen Lu

The purpose of this paper is to propose a fault diagnosis method for rolling bearings, in which the fault feature extraction is realized in a two-dimensional domain using scale…

Abstract

Purpose

The purpose of this paper is to propose a fault diagnosis method for rolling bearings, in which the fault feature extraction is realized in a two-dimensional domain using scale invariant feature transform (SIFT) algorithm. This method is different from those methods extracting fault feature directly from the traditional one-dimensional domain.

Design/methodology/approach

The vibration signal of rolling bearings is first transformed into a two-dimensional image. Then, the SIFT algorithm is applied to the image to extract the scale invariant feature vector which is highly distinctive and insensitive to noises and working condition variation. As the extracted feature vector is high-dimensional, kernel principal component analysis (KPCA) algorithm is utilized to reduce the dimension of the feature vector, and singular value decomposition technique is used to extract the singular values of the reduced feature vector. Finally, these singular values are introduced into a support vector machine (SVM) classifier to realize fault classification.

Findings

The experiment results show a high fault classification accuracy based on the proposed method.

Originality/value

The proposed approach for rolling bearing fault diagnosis based on SIFT-KPCA and SVM is highly effective in the experiment. The practical value in engineering application of this method can be researched in the future.

Details

Engineering Computations, vol. 34 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

1 – 10 of 126