Skip to main content
Erschienen in: Memetic Computing 4/2016

01.12.2016 | Regular Research Paper

Authenticated media uploading framework for mobile cloud computing

verfasst von: M. Shamim Hossain, Ghulam Muhammad

Erschienen in: Memetic Computing | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the growing popularity of social networking services and the rapid development of smart devices, an increasing number of people are now uploading media such as images and videos to social networks for sharing with acquaintances, and making that content available for public use. Given the flexibility of uploading and sharing media, a common question arises: can we trust all these images and videos? To address this issue, we propose a mobile cloud-based media uploading framework that checks images for authenticity (i.e., by detecting known forgery techniques). For images that are found to be genuine, the framework will allow public sharing. The authenticity check will be carried out on the private or local cloud to which the image is uploaded. For the check itself, we propose a curvelet transform and Weber local descriptor-based system to extract features from the image. Statistical features obtained from the system are then fed into a support vector machine-based classifier. Offline experiments show that the proposed system can achieve very high detection accuracy for image forgery. Online experiments show that the proposed framework also works in real time. To validate the suitability of this media uploading framework, workloads were measured in the Amazon Elastic Compute Cloud environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Hammadi MH, Muhammad G, Hussain M, Bebis G (2013) Curvelet transform and local texture based image forgery detection, ISVC 2013, Part II, LNCS, vol 8034, pp 503–512 Al-Hammadi MH, Muhammad G, Hussain M, Bebis G (2013) Curvelet transform and local texture based image forgery detection, ISVC 2013, Part II, LNCS, vol 8034, pp 503–512
2.
Zurück zum Zitat Calyam P, Sridharan M, Xu Y, Zhu K, Berryman A, Patali R, Venkataraman A (2011) Enabling performance intelligence for application adaptation in the future Internet. J Commun Netw 13(6):591–601CrossRef Calyam P, Sridharan M, Xu Y, Zhu K, Berryman A, Patali R, Venkataraman A (2011) Enabling performance intelligence for application adaptation in the future Internet. J Commun Netw 13(6):591–601CrossRef
4.
Zurück zum Zitat Chang CC, Lin CJ (2011) LIBSVM-a library for support vector machine. ACM Trans Intell Syst Technol 2(3):1–27CrossRef Chang CC, Lin CJ (2011) LIBSVM-a library for support vector machine. ACM Trans Intell Syst Technol 2(3):1–27CrossRef
5.
Zurück zum Zitat Chen J, Shan S, He C, Zhao G, Pietikäinen M, Chen X, Gao W (2010) WLD: a robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705–1720CrossRef Chen J, Shan S, He C, Zhao G, Pietikäinen M, Chen X, Gao W (2010) WLD: a robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705–1720CrossRef
6.
Zurück zum Zitat Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297MATH Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297MATH
7.
Zurück zum Zitat Davies N (2009) The case for VM-Based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23CrossRef Davies N (2009) The case for VM-Based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23CrossRef
8.
Zurück zum Zitat El-Alfy M, Qureshi MA (2015) Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal Appl 18(3):713–723 El-Alfy M, Qureshi MA (2015) Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal Appl 18(3):713–723
9.
Zurück zum Zitat Hossain MS, Muhammad G (2015) Audio-visual emotion recognition using multi-directional regression and ridgelet transform. J Multimodal User Interfaces 1–9. doi:10.1007/s12193-015-0207-2 Hossain MS, Muhammad G (2015) Audio-visual emotion recognition using multi-directional regression and ridgelet transform. J Multimodal User Interfaces 1–9. doi:10.​1007/​s12193-015-0207-2
10.
Zurück zum Zitat Jain AK (1989) Fundamentals of digital image processing, vol 51. Prentice Hall, Upper Saddle River, NJ, USA Jain AK (1989) Fundamentals of digital image processing, vol 51. Prentice Hall, Upper Saddle River, NJ, USA
11.
Zurück zum Zitat Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995CrossRef Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995CrossRef
12.
Zurück zum Zitat Muhammad G (2015) Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system. Cluster Comput 18(2):795–802CrossRef Muhammad G (2015) Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system. Cluster Comput 18(2):795–802CrossRef
13.
Zurück zum Zitat Muhammad G, Hossain MS (2011) Robust copy-move image forgery detection using undecimated wavelets and zernike moments. In: ACM third International conference on internet multimedia computing and service (ICIMCS). ACM, New York Muhammad G, Hossain MS (2011) Robust copy-move image forgery detection using undecimated wavelets and zernike moments. In: ACM third International conference on internet multimedia computing and service (ICIMCS). ACM, New York
14.
Zurück zum Zitat Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23CrossRef Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23CrossRef
15.
16.
Zurück zum Zitat Tanya M, Angshul M, Wu QMJ (2007) Face recognition by curvelet based feature extraction. ICIAR 4633:806–817 Tanya M, Angshul M, Wu QMJ (2007) Face recognition by curvelet based feature extraction. ICIAR 4633:806–817
17.
Zurück zum Zitat Wei W, Jing D, Tieniu T (2010) Image tampering detection based on stationary distribution of Markov chain. In: IEEE Intl. conference on image processing (ICIP’10), pp 2101–2104 Wei W, Jing D, Tieniu T (2010) Image tampering detection based on stationary distribution of Markov chain. In: IEEE Intl. conference on image processing (ICIP’10), pp 2101–2104
18.
Zurück zum Zitat Welling M (2005) Robust higher order statistics. In: Proceedings of the 10th internation workshop on artificial intelligence and statistics (AISTATS), pp 405–412 Welling M (2005) Robust higher order statistics. In: Proceedings of the 10th internation workshop on artificial intelligence and statistics (AISTATS), pp 405–412
19.
Zurück zum Zitat Wen Y, Zhu X, Rodrigues JPC, Chen CW (2014) Cloud mobile media: reflections and outlook. IEEE Trans Multimed 16(4):885–902CrossRef Wen Y, Zhu X, Rodrigues JPC, Chen CW (2014) Cloud mobile media: reflections and outlook. IEEE Trans Multimed 16(4):885–902CrossRef
20.
Zurück zum Zitat Zhao X, Wang S, Li S, Li J (2015) Passive image-splicing detection by a 2-D noncausal markov model. IEEE Trans Circ Syst Video Technol 25(2):185–199CrossRef Zhao X, Wang S, Li S, Li J (2015) Passive image-splicing detection by a 2-D noncausal markov model. IEEE Trans Circ Syst Video Technol 25(2):185–199CrossRef
Metadaten
Titel
Authenticated media uploading framework for mobile cloud computing
verfasst von
M. Shamim Hossain
Ghulam Muhammad
Publikationsdatum
01.12.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Memetic Computing / Ausgabe 4/2016
Print ISSN: 1865-9284
Elektronische ISSN: 1865-9292
DOI
https://doi.org/10.1007/s12293-016-0200-7

Weitere Artikel der Ausgabe 4/2016

Memetic Computing 4/2016 Zur Ausgabe