Skip to main content
Top
Published in: Cluster Computing 5/2019

04-12-2017

A fusion framework based on fuzzy integrals for passive-blind image tamper detection

Authors: Mandeep Kaur, Savita Gupta

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The innate complexity and uncertainty in the domain of image forensics has made the application of fusion technology an obligatory requirement. Fuzzy integrals, that provide a meaningful formalism for combining different information sources has gained limited consideration in image forensics. The current paper presents a fuzzy integral based fusion framework for image tamper detection that can exploit the interaction between multiple forensic tools for collaborative decision making. Four tools that expose traces of semantic manipulation based on specific statistical cues are designed that work cohesively to allow detection of forgeries in single image (copy-move), composite image (splicing) and two generic artefacts (double JPEG compression and noise inconsistency). The measurement level fusion of tool outcome is carried out with Sugneo and Choquet integrals as the underlying aggregation operators. The classification competency of each tool is evaluated on a specialized dataset of forged images with the respective forgery trace. The empirical evaluation of the fusion framework for blind tamper detection is carried out on a combined master dataset comprising the various forgery traces under study. The Choquet integral based aggregation exhibits an enhanced classification competency on comparison with other fusion approaches like Feature level, Fuzzy Logic based on if-else rules, Behaviour Knowledge Space, Dempster-Shafer combination and classifier ensemble architecture based on Wolpkart’s stacked generalization.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Farid, H.: A survey of image forgery detection. Signal Process. Mag. 26(2), 16–25 (2009)CrossRef Farid, H.: A survey of image forgery detection. Signal Process. Mag. 26(2), 16–25 (2009)CrossRef
2.
go back to reference Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. J. Signal Process. 25(6), 389–399 (2010) Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. J. Signal Process. 25(6), 389–399 (2010)
3.
go back to reference Piva, A.: An overview on image forensics. ISRN Signal Process. J. Article ID 496701, p. 22 (2013) Piva, A.: An overview on image forensics. ISRN Signal Process. J. Article ID 496701, p. 22 (2013)
4.
go back to reference Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)CrossRef Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10(3), 226–245 (2013)CrossRef
5.
go back to reference Bondi, L., Baroffio, L.: First steps toward camera model identification with convolutional neural networks. IEEE Signal Process. Lett. 24(3), 259–263 (2017)CrossRef Bondi, L., Baroffio, L.: First steps toward camera model identification with convolutional neural networks. IEEE Signal Process. Lett. 24(3), 259–263 (2017)CrossRef
6.
go back to reference Zhang, Q., Lu, W.: Joint image splicing detection in DCT and Contourlet transform domain. Vis. Commun. Image Represent. 40, 449–458 (2016)MathSciNetCrossRef Zhang, Q., Lu, W.: Joint image splicing detection in DCT and Contourlet transform domain. Vis. Commun. Image Represent. 40, 449–458 (2016)MathSciNetCrossRef
7.
go back to reference Li, C., Ma, Q.: Image splicing detection based on Markov features in QDCT domain. Neurocomputing 228, 29–36 (2017)CrossRef Li, C., Ma, Q.: Image splicing detection based on Markov features in QDCT domain. Neurocomputing 228, 29–36 (2017)CrossRef
9.
go back to reference Lyu, Y., Shen, X., Chen, H.: Copy-paste detection based on a SIFT marked graph feature vector. Chin. J. Electron. 26(2), 346–350 (2017) Lyu, Y., Shen, X., Chen, H.: Copy-paste detection based on a SIFT marked graph feature vector. Chin. J. Electron. 26(2), 346–350 (2017)
10.
go back to reference Pun, C.-M., Liu, B.: Multi-scale noise estimation for image splicing forgery detection. Vis. Commun. Image Represent. 38, 195–206 (2016)CrossRef Pun, C.-M., Liu, B.: Multi-scale noise estimation for image splicing forgery detection. Vis. Commun. Image Represent. 38, 195–206 (2016)CrossRef
11.
go back to reference Thai, T.H., Cogranne, R.: JPEG quantization step estimation and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 12(1), 123–133 (2017)CrossRef Thai, T.H., Cogranne, R.: JPEG quantization step estimation and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 12(1), 123–133 (2017)CrossRef
12.
go back to reference Barni, M., Costanzo, A.: A Fuzzy approach to deal with uncertainity in image forensics. Signal Process. (2012) Barni, M., Costanzo, A.: A Fuzzy approach to deal with uncertainity in image forensics. Signal Process. (2012)
13.
go back to reference Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image manipulation detection. J. Electron. Imag. 15(4), 041102–041102-17 (2006) Bayram, S., Avcibas, I., Sankur, B., Memon, N.: Image manipulation detection. J. Electron. Imag. 15(4), 041102–041102-17 (2006)
14.
go back to reference Hsu, Y.F., Chang, S.F.: Statistical fusion of multiple cues for image tampering detection. In: Asilomar Conference on Signals, Systems, and Computers, pp. 1–5 (2008) Hsu, Y.F., Chang, S.F.: Statistical fusion of multiple cues for image tampering detection. In: Asilomar Conference on Signals, Systems, and Computers, pp. 1–5 (2008)
15.
go back to reference Hu, D., Zhou, L.: D-S evidence theory based digital image trustworthiness evaluation model. Multimed. Inf. Netw. Secur. 1, 85–89 (2009) Hu, D., Zhou, L.: D-S evidence theory based digital image trustworthiness evaluation model. Multimed. Inf. Netw. Secur. 1, 85–89 (2009)
16.
go back to reference Hu, D., Zhang, X.: On digital image trustworthiness. Appl. Soft Comput. 48, 240–253 (2016)CrossRef Hu, D., Zhang, X.: On digital image trustworthiness. Appl. Soft Comput. 48, 240–253 (2016)CrossRef
17.
go back to reference Chetty, G., Singh, M.: Nonintrusive image tamper detection based on Fuzzy fusion. Int. J. Comput. Sci. Netw. Secur. 10(9), 86–90 (2010) Chetty, G., Singh, M.: Nonintrusive image tamper detection based on Fuzzy fusion. Int. J. Comput. Sci. Netw. Secur. 10(9), 86–90 (2010)
18.
go back to reference Hashmi, M.F., Keskar, A.G.: Fuzzy based image forensic tool for detection and classification of image cloning. Int. J. Comput. Intell. Syt. 9(2), 351–375 (2016)CrossRef Hashmi, M.F., Keskar, A.G.: Fuzzy based image forensic tool for detection and classification of image cloning. Int. J. Comput. Intell. Syt. 9(2), 351–375 (2016)CrossRef
19.
go back to reference Fontani, M., Bianchi, T., De Rosa, A., Piva, A., Barni, M.: A Dempster–Shafer framework for decision fusion in image forensics. In: WIFS‘2011, Brazil (2011) Fontani, M., Bianchi, T., De Rosa, A., Piva, A., Barni, M.: A Dempster–Shafer framework for decision fusion in image forensics. In: WIFS‘2011, Brazil (2011)
20.
go back to reference Fontani, M., Bianchi, T.: A framework for decision fusion in image forensics based on Dempster–Shafer theory of evidence. IEEE Trans. Inf. Forensics Secur. 8(4), 593–607 (2013)CrossRef Fontani, M., Bianchi, T.: A framework for decision fusion in image forensics based on Dempster–Shafer theory of evidence. IEEE Trans. Inf. Forensics Secur. 8(4), 593–607 (2013)CrossRef
21.
go back to reference Cozzolino, D., Gargiulo, F., Sansone, C., Verdoliva, L.: Multiple classifier systems for image forgery detection. In: Image Analysis and Processing (Lecture Notes in Computer Science), Naples, Italy, vol. 8157, pp. 259–268 (2013) Cozzolino, D., Gargiulo, F., Sansone, C., Verdoliva, L.: Multiple classifier systems for image forgery detection. In: Image Analysis and Processing (Lecture Notes in Computer Science), Naples, Italy, vol. 8157, pp. 259–268 (2013)
22.
go back to reference Anselmo, F., Felipussi, S.C., Alfaro, C., et al.: Behavior knowledge space-based fusion for copy–move forgery detection. IEEE Trans. Image Process. 25(10) (2016) Anselmo, F., Felipussi, S.C., Alfaro, C., et al.: Behavior knowledge space-based fusion for copy–move forgery detection. IEEE Trans. Image Process. 25(10) (2016)
23.
go back to reference Li, H., Luo, W., Qiu, X., Huang, J.: Image forgery localization via integrating tampering possibility maps. IEEE Trans. Inf. Forensics Secur. 12(5) (2017) Li, H., Luo, W., Qiu, X., Huang, J.: Image forgery localization via integrating tampering possibility maps. IEEE Trans. Inf. Forensics Secur. 12(5) (2017)
24.
go back to reference Cozzolino, D., Gragnaniello, D., Verdoliva, L.: Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques. In: ICIP 2014, pp. 5302–5306 (2014) Cozzolino, D., Gragnaniello, D., Verdoliva, L.: Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques. In: ICIP 2014, pp. 5302–5306 (2014)
25.
go back to reference Korus, P., Huang, J.: Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans. Image Process. 25(3), 1312–1326 (2016)MathSciNetCrossRef Korus, P., Huang, J.: Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans. Image Process. 25(3), 1312–1326 (2016)MathSciNetCrossRef
26.
go back to reference Yang, F., Li, J.: Copy-move forgery detection based on hybrid features. Eng. Appl. Artif. Intell. 59, 73–83 (2017)CrossRef Yang, F., Li, J.: Copy-move forgery detection based on hybrid features. Eng. Appl. Artif. Intell. 59, 73–83 (2017)CrossRef
27.
go back to reference Torra, V., Narukawa, Y.: The interpretation of fuzzy integrals and their application to fuzzy systems. Int. J. Approx. Reasn. 41, 43–58 (2006)MathSciNetCrossRef Torra, V., Narukawa, Y.: The interpretation of fuzzy integrals and their application to fuzzy systems. Int. J. Approx. Reasn. 41, 43–58 (2006)MathSciNetCrossRef
28.
go back to reference Grabisch, M.: The application of fuzzy intgrals in multicriteria decision making. Eur. J. Oper. Res. 89(3), 445–456 (1996) Grabisch, M.: The application of fuzzy intgrals in multicriteria decision making. Eur. J. Oper. Res. 89(3), 445–456 (1996)
29.
go back to reference Redi, J.A., Taktak, W.: Digital image forensics: a booklet for beginners. Multimed. Tools Appl. 51, 133–162 (2011)CrossRef Redi, J.A., Taktak, W.: Digital image forensics: a booklet for beginners. Multimed. Tools Appl. 51, 133–162 (2011)CrossRef
30.
go back to reference Polikar, R.: Ensemble based systems in decision making. IEEE Circuits Syst. Mag. 6, 21–45 (2006)CrossRef Polikar, R.: Ensemble based systems in decision making. IEEE Circuits Syst. Mag. 6, 21–45 (2006)CrossRef
31.
go back to reference Dasarathy, B.V.: Decision Fusion. IEEE Computer Society Press, Los Alamitos, CA (1994) Dasarathy, B.V.: Decision Fusion. IEEE Computer Society Press, Los Alamitos, CA (1994)
32.
go back to reference Freedman, D.: Overview of decision level fusion techniques for identification and their application. In: American Control Conference, vol. 2, pp. 1299–1303 (1994) Freedman, D.: Overview of decision level fusion techniques for identification and their application. In: American Control Conference, vol. 2, pp. 1299–1303 (1994)
33.
go back to reference Ruta, D., Gabrys, B.: An overview of classifier fusion methods. Comput. Inf. Syst. 7, 1–10 (2000) Ruta, D., Gabrys, B.: An overview of classifier fusion methods. Comput. Inf. Syst. 7, 1–10 (2000)
34.
go back to reference Kharrazi, M., Sencar, H.T., Memon, N.: Improving steganalysis by fusion techniques: a case study with image steganography. Trans. Data Hiding Multimed. Secur. 123–137 (2006) Kharrazi, M., Sencar, H.T., Memon, N.: Improving steganalysis by fusion techniques: a case study with image steganography. Trans. Data Hiding Multimed. Secur. 123–137 (2006)
35.
go back to reference Mane, A.M., Dongale, T.D.: Application of Fuzzy measure and fuzzy integral in students failure decision making. IOSR. J. Math. 10(6), 47–53 (2014)CrossRef Mane, A.M., Dongale, T.D.: Application of Fuzzy measure and fuzzy integral in students failure decision making. IOSR. J. Math. 10(6), 47–53 (2014)CrossRef
36.
go back to reference Murofushi, T., et al.: Fuzzy measures and fuzzy integrals. Fuzzy Measures Integrals 3–41 (2000) Murofushi, T., et al.: Fuzzy measures and fuzzy integrals. Fuzzy Measures Integrals 3–41 (2000)
37.
go back to reference Wang, Z. et al.: Nonlinear integrals and their appliactions in data mining. Adv. Fuzzy Syst. 24 (2010) Wang, Z. et al.: Nonlinear integrals and their appliactions in data mining. Adv. Fuzzy Syst. 24 (2010)
39.
go back to reference Sugeno, M.: Theory of Fuzzy integrals and its applications. Doctrol Thesis (1974) Sugeno, M.: Theory of Fuzzy integrals and its applications. Doctrol Thesis (1974)
40.
go back to reference Huang, H., et al.: Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China, pp. 1241–1245 (2008) Huang, H., et al.: Detection of copy-move forgery in digital images using SIFT algorithm. In: IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China, pp. 1241–1245 (2008)
42.
go back to reference Kaur, M., Gupta, S.: A passive blind approach for image splicing detection based on DWT and LBP histograms. In: Security in Computing and Communications (SSCC 2016) Communications in Computer and Information. Science 625, 318–327 (2016) Kaur, M., Gupta, S.: A passive blind approach for image splicing detection based on DWT and LBP histograms. In: Security in Computing and Communications (SSCC 2016) Communications in Computer and Information. Science 625, 318–327 (2016)
43.
go back to reference Pyatykh, S., Hesser, J.: Image noise level estimation by principal component analysis. IEEE Trans. Image Process. 22(2), 687–699 (2013)MathSciNetCrossRef Pyatykh, S., Hesser, J.: Image noise level estimation by principal component analysis. IEEE Trans. Image Process. 22(2), 687–699 (2013)MathSciNetCrossRef
44.
go back to reference Li, B., et al.: Detecting doubly compressed JPEG images by using mode based first digit features. In: MMSP, Cairns, Queensland, Australia, pp. 730–735 (2008) Li, B., et al.: Detecting doubly compressed JPEG images by using mode based first digit features. In: MMSP, Cairns, Queensland, Australia, pp. 730–735 (2008)
45.
go back to reference Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensic Secur. 6(3), 1099–1110 (2011). http://lci.micc.unifi.it Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensic Secur. 6(3), 1099–1110 (2011). http://​lci.​micc.​unifi.​it
46.
go back to reference Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China Summit & International Conference on Signal and Information Processing (China SIP), pp. 422–426 (2013). http://forensics.idealtest Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database. In: 2013 IEEE China Summit & International Conference on Signal and Information Processing (China SIP), pp. 422–426 (2013). http://​forensics.​idealtest
47.
go back to reference Ojala, T., Pietikainen, M.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002)CrossRef Ojala, T., Pietikainen, M.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002)CrossRef
48.
go back to reference Kaur, M., Walia, S.: Forgery detection using noise estimation and hog feature extraction. Int. J. Multimed. Ubiquitous Eng. 11(4), 37–48 (2016)CrossRef Kaur, M., Walia, S.: Forgery detection using noise estimation and hog feature extraction. Int. J. Multimed. Ubiquitous Eng. 11(4), 37–48 (2016)CrossRef
50.
go back to reference Fu, D., et al.: A generalized Benford’s Law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, p. 65051L (2007) Fu, D., et al.: A generalized Benford’s Law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, p. 65051L (2007)
51.
go back to reference Hou, W., Ji, Z.: Double JPEG compression detection based on extended first digit features of DCT coefficients. Int. J. Inf. Educ. Technol. 3(5), 512–515 (2013) Hou, W., Ji, Z.: Double JPEG compression detection based on extended first digit features of DCT coefficients. Int. J. Inf. Educ. Technol. 3(5), 512–515 (2013)
52.
go back to reference Kuncheva, L.: Combining Pattern Classifiers: Methods and Algorithms. Wiley, New York (2004)CrossRef Kuncheva, L.: Combining Pattern Classifiers: Methods and Algorithms. Wiley, New York (2004)CrossRef
53.
go back to reference Amerini, R., et al.: Splicing forgeries localization through the use of first digit features. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 143-148 (2014) Amerini, R., et al.: Splicing forgeries localization through the use of first digit features. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 143-148 (2014)
54.
go back to reference Berry, M.W.A.: Soft Computing in Data Science Communications in Computer and Information Science. Springer, New York (2016) Berry, M.W.A.: Soft Computing in Data Science Communications in Computer and Information Science. Springer, New York (2016)
55.
go back to reference Shoaie, Z., et al.: Combination of multiple classifiers with fuzzy integral method for classifying the eeg signals in brain-computer interface. In: International Conference on Biomedical and Pharmaceutical Engineering, Singapore, pp. 157–161 (2006) Shoaie, Z., et al.: Combination of multiple classifiers with fuzzy integral method for classifying the eeg signals in brain-computer interface. In: International Conference on Biomedical and Pharmaceutical Engineering, Singapore, pp. 157–161 (2006)
56.
go back to reference Bostrom, H., Johansson, R., Karlsson, A.: On evidential combination rules for ensemble classifiers. In: 11th International Conference on Information Fusion, Cologne, pp. 1–8 (2008) Bostrom, H., Johansson, R., Karlsson, A.: On evidential combination rules for ensemble classifiers. In: 11th International Conference on Information Fusion, Cologne, pp. 1–8 (2008)
57.
go back to reference Shapley, L.S.: A value for n-person games. Contrib. Theory Games 2, 307–317 (1953) Shapley, L.S.: A value for n-person games. Contrib. Theory Games 2, 307–317 (1953)
58.
go back to reference Gloe, T., et al.: The ‘Dresden Image Database’ for benchmarking digital image forensics. In: 25th Symposium On Applied Computing (ACM SAC 2010), vol. 2, pp. 1585–1591 (2010) Gloe, T., et al.: The ‘Dresden Image Database’ for benchmarking digital image forensics. In: 25th Symposium On Applied Computing (ACM SAC 2010), vol. 2, pp. 1585–1591 (2010)
59.
go back to reference Dang-Nguyen, D.-T., et al.: RAISE—a raw images dataset for digital image forensics. In: ACM Multimedia Systems, Portland, Oregon March 18–20 (2015) Dang-Nguyen, D.-T., et al.: RAISE—a raw images dataset for digital image forensics. In: ACM Multimedia Systems, Portland, Oregon March 18–20 (2015)
60.
go back to reference Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–480 (2004) Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–480 (2004)
61.
go back to reference Christlein, V., Riess, C., et al.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012) Christlein, V., Riess, C., et al.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)
62.
go back to reference Grabisch, M.: k-Order additive discrete fuzzy measures and their representation. Fuzzy Sets Syst. 92(2), 167–189 (1997)MathSciNetCrossRef Grabisch, M.: k-Order additive discrete fuzzy measures and their representation. Fuzzy Sets Syst. 92(2), 167–189 (1997)MathSciNetCrossRef
Metadata
Title
A fusion framework based on fuzzy integrals for passive-blind image tamper detection
Authors
Mandeep Kaur
Savita Gupta
Publication date
04-12-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1393-3

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner