Skip to main content
Log in

Authenticated media uploading framework for mobile cloud computing

  • Regular Research Paper
  • Published:
Memetic Computing Aims and scope Submit manuscript

Abstract

With the growing popularity of social networking services and the rapid development of smart devices, an increasing number of people are now uploading media such as images and videos to social networks for sharing with acquaintances, and making that content available for public use. Given the flexibility of uploading and sharing media, a common question arises: can we trust all these images and videos? To address this issue, we propose a mobile cloud-based media uploading framework that checks images for authenticity (i.e., by detecting known forgery techniques). For images that are found to be genuine, the framework will allow public sharing. The authenticity check will be carried out on the private or local cloud to which the image is uploaded. For the check itself, we propose a curvelet transform and Weber local descriptor-based system to extract features from the image. Statistical features obtained from the system are then fed into a support vector machine-based classifier. Offline experiments show that the proposed system can achieve very high detection accuracy for image forgery. Online experiments show that the proposed framework also works in real time. To validate the suitability of this media uploading framework, workloads were measured in the Amazon Elastic Compute Cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Al-Hammadi MH, Muhammad G, Hussain M, Bebis G (2013) Curvelet transform and local texture based image forgery detection, ISVC 2013, Part II, LNCS, vol 8034, pp 503–512

  2. Calyam P, Sridharan M, Xu Y, Zhu K, Berryman A, Patali R, Venkataraman A (2011) Enabling performance intelligence for application adaptation in the future Internet. J Commun Netw 13(6):591–601

    Article  Google Scholar 

  3. CASIA Tampered Image Detection Evaluation Database (2016) Downloadable at: http://forensics.idealtest.org. Accessed 10 Feb 2016

  4. Chang CC, Lin CJ (2011) LIBSVM-a library for support vector machine. ACM Trans Intell Syst Technol 2(3):1–27

    Article  Google Scholar 

  5. Chen J, Shan S, He C, Zhao G, Pietikäinen M, Chen X, Gao W (2010) WLD: a robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705–1720

    Article  Google Scholar 

  6. Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297

    MATH  Google Scholar 

  7. Davies N (2009) The case for VM-Based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23

    Article  Google Scholar 

  8. El-Alfy M, Qureshi MA (2015) Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal Appl 18(3):713–723

  9. Hossain MS, Muhammad G (2015) Audio-visual emotion recognition using multi-directional regression and ridgelet transform. J Multimodal User Interfaces 1–9. doi:10.1007/s12193-015-0207-2

  10. Jain AK (1989) Fundamentals of digital image processing, vol 51. Prentice Hall, Upper Saddle River, NJ, USA

  11. Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995

    Article  Google Scholar 

  12. Muhammad G (2015) Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system. Cluster Comput 18(2):795–802

    Article  Google Scholar 

  13. Muhammad G, Hossain MS (2011) Robust copy-move image forgery detection using undecimated wavelets and zernike moments. In: ACM third International conference on internet multimedia computing and service (ICIMCS). ACM, New York

  14. Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23

    Article  Google Scholar 

  15. Starck J-L, Candès EJ, Donoho DL (2002) The curvelet transform for image denoising. IEEE Trans Image Process 11:670–684

    Article  MathSciNet  MATH  Google Scholar 

  16. Tanya M, Angshul M, Wu QMJ (2007) Face recognition by curvelet based feature extraction. ICIAR 4633:806–817

    Google Scholar 

  17. Wei W, Jing D, Tieniu T (2010) Image tampering detection based on stationary distribution of Markov chain. In: IEEE Intl. conference on image processing (ICIP’10), pp 2101–2104

  18. Welling M (2005) Robust higher order statistics. In: Proceedings of the 10th internation workshop on artificial intelligence and statistics (AISTATS), pp 405–412

  19. Wen Y, Zhu X, Rodrigues JPC, Chen CW (2014) Cloud mobile media: reflections and outlook. IEEE Trans Multimed 16(4):885–902

    Article  Google Scholar 

  20. Zhao X, Wang S, Li S, Li J (2015) Passive image-splicing detection by a 2-D noncausal markov model. IEEE Trans Circ Syst Video Technol 25(2):185–199

    Article  Google Scholar 

Download references

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia for funding this work through the research group Project No. RGP 228.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Shamim Hossain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hossain, M.S., Muhammad, G. Authenticated media uploading framework for mobile cloud computing. Memetic Comp. 8, 325–332 (2016). https://doi.org/10.1007/s12293-016-0200-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12293-016-0200-7

Keywords

Navigation