Abstract

The image is the best information carrier in the current digital era and the easiest to manipulate. Image manipulation causes the integrity of this information carrier to be ambiguous. The image splicing technique is commonly used to manipulate images by fusing different regions in one image. Over the last decade, it has been confirmed that various structures in science and engineering can be demonstrated more precisely by fractional calculus using integrals or derivative operators. Many fractional-order-based techniques have been used in the image-processing field. Recently, a new specific fractional calculus, called conformable calculus, was delivered. Herein, we employ the combination of conformable focus measures (CFMs), and focus measure operators (FMOs) in obtaining redundant discrete wavelet transform (RDWT) coefficients for improving the image splicing forgery detection. The process of image splicing disorders the content of tampered image and causes abnormality in the image features. The spliced region’s boundaries are usually blurring to avoid detection. To make use of the blurred information, both CFMs and FMOs are used to calculate the degree of blurring of the tampered region’s boundaries for image splicing detection. The two public image datasets IFS-TC and CASIA TIDE V2 are used for evaluation of the proposed method. The obtained results of the proposed method achieved accuracy rate 98.30% for Cb channel on IFS-TC image dataset and 98.60% of the Cb channel on CASIA TIDE V2 with 24-D feature vector. The proposed method exhibited superior results compared with other image splicing detection methods.

Highlights

  • Information disseminated in the form of images are increasing in recent years

  • There are various methods that have been deployed to detect the image splicing tampering of the image discrete wavelet transform (DWT)

  • Better accuracyTherefore, rate. we propose the combination of Conformable Focus Measures (CFMs) and focus

Read more

Summary

Introduction

Information disseminated in the form of images are increasing in recent years. “A picture is worth a thousand words”, complex information is understood quickly with images. Image tampering apart being innocuous could lead to adverse consequences in various sectors such as health care, legal evidence in court cases, journalism, or social online media. Image tampering can be detected using active and passive authentication methods. Some post-processing operations, such as the blurring spliced boundary, are used to make the forged image like a real image, and to make forgery detection difficult.

Related Works
Proposed Method
Image Pre-Processing
Feature Extraction
One level
The Experimental
IFS-TC
Result obtained
Methods
Method
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call