Abstract

Internet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily splicing and copy–move attacks, effortless, causing cybercrimes to be on the rise. While several models have been proposed in the literature for detecting these attacks, the robustness of those models has not been investigated when (i) a low number of tampered images are available for model building or (ii) images from IoT sensors are distorted due to image rotation or scaling caused by unwanted or unexpected changes in sensors’ physical set-up. Moreover, further improvement in detection accuracy is needed for real-word security management systems. To address these limitations, in this paper, an innovative image forgery detection method has been proposed based on Discrete Cosine Transformation (DCT) and Local Binary Pattern (LBP) and a new feature extraction method using the mean operator. First, images are divided into non-overlapping fixed size blocks and 2D block DCT is applied to capture changes due to image forgery. Then LBP is applied to the magnitude of the DCT array to enhance forgery artifacts. Finally, the mean value of a particular cell across all LBP blocks is computed, which yields a fixed number of features and presents a more computationally efficient method. Using Support Vector Machine (SVM), the proposed method has been extensively tested on four well known publicly available gray scale and color image forgery datasets, and additionally on an IoT based image forgery dataset that we built. Experimental results reveal the superiority of our proposed method over recent state-of-the-art methods in terms of widely used performance metrics and computational time and demonstrate robustness against low availability of forged training samples.

Highlights

  • Today’s digital lives have been evolving around the concept of the Internet of Things (IoT) smart objects

  • We introduced an efficient and robust model for detecting splicing and copy–move attacks in both grayscale and color images using traditional machine learning technique (SVM) and hand-crafted features

  • We applied block Discrete Cosine Transformation (DCT) on image components to capture the changes in frequency domain due to tampering operation and Local Binary Pattern (LBP) of the magnitude component of resultant

Read more

Summary

Introduction

Today’s digital lives have been evolving around the concept of the Internet of Things (IoT) smart objects. A recent report (June 2018) by Ericsson [1] projected that there will be 31.4 billion IoT devices connected to the Internet by 2023, which means each person living on earth will have approximately four IoT devices on average. Everyday objects such as home appliances, security devices, vehicles, computing devices, visual sensors, wearable sensors are becoming smarter and connected to the Internet, and they enable data sharing with each other to perform decision fusion for improved accuracy of decision. Easy to use Electronics 2020, 9, 1500; doi:10.3390/electronics9091500 www.mdpi.com/journal/electronics

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call