Abstract
With the growing popularity of social networking services and the rapid development of smart devices, an increasing number of people are now uploading media such as images and videos to social networks for sharing with acquaintances, and making that content available for public use. Given the flexibility of uploading and sharing media, a common question arises: can we trust all these images and videos? To address this issue, we propose a mobile cloud-based media uploading framework that checks images for authenticity (i.e., by detecting known forgery techniques). For images that are found to be genuine, the framework will allow public sharing. The authenticity check will be carried out on the private or local cloud to which the image is uploaded. For the check itself, we propose a curvelet transform and Weber local descriptor-based system to extract features from the image. Statistical features obtained from the system are then fed into a support vector machine-based classifier. Offline experiments show that the proposed system can achieve very high detection accuracy for image forgery. Online experiments show that the proposed framework also works in real time. To validate the suitability of this media uploading framework, workloads were measured in the Amazon Elastic Compute Cloud environment.
Similar content being viewed by others
References
Al-Hammadi MH, Muhammad G, Hussain M, Bebis G (2013) Curvelet transform and local texture based image forgery detection, ISVC 2013, Part II, LNCS, vol 8034, pp 503–512
Calyam P, Sridharan M, Xu Y, Zhu K, Berryman A, Patali R, Venkataraman A (2011) Enabling performance intelligence for application adaptation in the future Internet. J Commun Netw 13(6):591–601
CASIA Tampered Image Detection Evaluation Database (2016) Downloadable at: http://forensics.idealtest.org. Accessed 10 Feb 2016
Chang CC, Lin CJ (2011) LIBSVM-a library for support vector machine. ACM Trans Intell Syst Technol 2(3):1–27
Chen J, Shan S, He C, Zhao G, Pietikäinen M, Chen X, Gao W (2010) WLD: a robust local image descriptor. IEEE Trans Pattern Anal Mach Intell 32(9):1705–1720
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297
Davies N (2009) The case for VM-Based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23
El-Alfy M, Qureshi MA (2015) Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal Appl 18(3):713–723
Hossain MS, Muhammad G (2015) Audio-visual emotion recognition using multi-directional regression and ridgelet transform. J Multimodal User Interfaces 1–9. doi:10.1007/s12193-015-0207-2
Jain AK (1989) Fundamentals of digital image processing, vol 51. Prentice Hall, Upper Saddle River, NJ, USA
Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995
Muhammad G (2015) Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system. Cluster Comput 18(2):795–802
Muhammad G, Hossain MS (2011) Robust copy-move image forgery detection using undecimated wavelets and zernike moments. In: ACM third International conference on internet multimedia computing and service (ICIMCS). ACM, New York
Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23
Starck J-L, Candès EJ, Donoho DL (2002) The curvelet transform for image denoising. IEEE Trans Image Process 11:670–684
Tanya M, Angshul M, Wu QMJ (2007) Face recognition by curvelet based feature extraction. ICIAR 4633:806–817
Wei W, Jing D, Tieniu T (2010) Image tampering detection based on stationary distribution of Markov chain. In: IEEE Intl. conference on image processing (ICIP’10), pp 2101–2104
Welling M (2005) Robust higher order statistics. In: Proceedings of the 10th internation workshop on artificial intelligence and statistics (AISTATS), pp 405–412
Wen Y, Zhu X, Rodrigues JPC, Chen CW (2014) Cloud mobile media: reflections and outlook. IEEE Trans Multimed 16(4):885–902
Zhao X, Wang S, Li S, Li J (2015) Passive image-splicing detection by a 2-D noncausal markov model. IEEE Trans Circ Syst Video Technol 25(2):185–199
Acknowledgments
The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia for funding this work through the research group Project No. RGP 228.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hossain, M.S., Muhammad, G. Authenticated media uploading framework for mobile cloud computing. Memetic Comp. 8, 325–332 (2016). https://doi.org/10.1007/s12293-016-0200-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12293-016-0200-7