Skip to main content

Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9196))

Abstract

Crowdsourcing provides a novel and efficient paradigm to leverage numerous smartphone users to report timely information (time, location, photo, etc.) about events, enabling various urban sensing applications such as environment monitoring and public space management. Localization and photographing are two of the most important function modules in crowdsourcing based event reporting systems, which are used to tell people where and what events happen. However, the existing systems tend to localize the user instead of the event, resulting in the poor accuracy. Meanwhile, the existing event localization approaches need either complex user operation or complex computation process. For this reason, we propose a simple, effective, and light-weight approach for event localization. On the other hand, the existing systems cannot guarantee the photo authenticity, as the emerging various image editing and processing softwares have made the (malicious) photo tampering easier and easier. Accordingly, we design a novel smartphone-based photo tamper detection approach with high security. Detailed system implementation and performance evaluation are provided to verify the effectiveness of our proposed approaches.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Creekwatch. http://creekwatch.researchlabs.ibm.com/

  2. Ecosnapp. http://www.hbssp.org/china/

  3. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: A survey. Digital Investigation 10(3), 226–245 (2013)

    Article  Google Scholar 

  4. Blythe, P., Fridrich, J.: Secure digital camera. In: Proceedings of the Digital Forensic Research Workshop (DFRWS), pp. 17–19 (2004)

    Google Scholar 

  5. Chatzimilioudis, G., Konstantinidis, A., Laoudias, C., Zeinalipour-Yazti, D.: Crowdsourcing with smartphones. IEEE Internet Computing, 36–44 (2012)

    Google Scholar 

  6. Farid, H.: Image forgery detection-a survey. IEEE Signal Processing Magazine 26(2), 16–25 (2009)

    Article  Google Scholar 

  7. Ganti, R.K., Ye, F., Lei, H.: Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine 49(11), 32–39 (2011)

    Article  Google Scholar 

  8. Liu, L., Wei, W., Zhao, D., Ma, H.D.: Urban resolution: New metric for measuring the quality of urban sensing. IEEE Transactions on Mobile Computing (2015). doi:10.1109/TMC.2015.2404786

  9. Ma, H.D., Zhao, D., Yuan, P.: Opportunities in mobile crowd sensing. IEEE Communications Magazine 52(8), 29–35 (2014)

    Article  Google Scholar 

  10. Manweiler, J.G., Jain, P., Roy Choudhury, R.: Satellites in our pockets: an object positioning system using smartphones. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 211–224 (2012)

    Google Scholar 

  11. Mishra, M., Adhikary, F.: Digital image tamper detection techniques-a comprehensive study. International Journal of Computer Science and Business Informatics 2(1), 1–12 (2013)

    Google Scholar 

  12. Ouyang, R.W., Srivastava, A., Prabahar, P., Roy Choudhury, R., Addicott, M., McClernon, F.J.: If you see something, swipe towards it: crowdsourced event localization using smartphones. In: Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), pp. 23–32 (2013)

    Google Scholar 

  13. Reddy, S., Estrin, D., Srivastava, M.: Recruitment framework for participatory sensing data collections. In: Floréen, P., Krüger, A., Spasojevic, M. (eds.) Pervasive 2010. LNCS, vol. 6030, pp. 138–155. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  14. Shangguan, L., Zhou, Z., Yang, Z., Liu, K., Li, Z., Zhao, X., Liu, Y.: Towards accurate object localization with smartphones. IEEE Transactions on Parallel and Distributed Systems 25(10), 2731–2742 (2014)

    Article  Google Scholar 

  15. Wang, W., Dong, J., Tan, T.: A survey of passive image tampering detection. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 308–322. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Zhao, D., Ma, H.D., Tang, S., Li, X.Y.: Coupon: A cooperative framework for building sensing maps in mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems 26(2), 392–402 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tong Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Qin, T., Ma, H., Zhao, D., Li, T., Chen, J. (2015). Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection. In: Wang, Y., Xiong, H., Argamon, S., Li, X., Li, J. (eds) Big Data Computing and Communications. BigCom 2015. Lecture Notes in Computer Science(), vol 9196. Springer, Cham. https://doi.org/10.1007/978-3-319-22047-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22047-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22046-8

  • Online ISBN: 978-3-319-22047-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics