skip to main content
10.1145/3194452.3194468acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaiConference Proceedingsconference-collections
research-article

Image Authenticity Decision Based on Random Sample Consensus and Circular Feature Selection

Authors Info & Claims
Published:12 March 2018Publication History

ABSTRACT

In order to reduce the complexity of forgery detection algorithm and improve the accuracy, this paper proposes an image forgery detection algorithm based on DCT coupled random sample consensus optimization. First of all, the initial image is divided into sub-blocks of uniform size and DCT coefficients for each block is obtained through DCT to represent each blocks; then, circular feature screening mechanism is established to extract four features of the block, thereby reducing the feature dimension of each block. Finally, each eigenvector is ordered in a lexicographical manner and prior threshold is used to match the feature, reduce the image block false matching rate optimized by random sample consensus, thus completing the image authenticity for decision making. Experimental results show that, compared with the current image forgery detection algorithm, this algorithm has better robustness, efficiency and accuracy, and good detection effects on the fuzzy and noise forgery.

References

  1. Jiao Lixin, Du Zhenlong. Copy-paste image forgery blind detection based on mean shift {J}. Journal of Computer Applications, 2014, 34 (3):806--809.Google ScholarGoogle Scholar
  2. Devanshi Chauhan, Dipali Kasat, Sanjeev Jain. Survey on Keypoint Based Copy-move Forgery Detection Methods on Image {J}. Procedia Computer Science, 2016, 85(11): 206--212.Google ScholarGoogle ScholarCross RefCross Ref
  3. Du Zhenlong, Yang Fan, Li Xiaoli. Blind detection of copy and paste forgery images based on complex feature {J}. Computer engineering and design, 2012, 33 (11): 4264--4267.Google ScholarGoogle Scholar
  4. YAOH, QIAOT, TANGZJ. Detecting copy-move forgery using non-negative matrix factorization {J}. Proceedings of the 2011 third International Conference on Multimedia Information Networking and Security. Washington, DC: IEEE Computer Society, 2014: 591--594. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Wang Haoming, Yang Xiaoyuan. Detection Method for JPEG Image Based on the Difference of DCT Coefficient Histograms {J}. Journal of Sichuan University (Engineering Science Edition), 2014, 46(1):41--46.Google ScholarGoogle Scholar
  6. Viswanath Kapinaiah; Jayanta Mukherjee. Block DCT to wavelet transcoding in transform domain {J}. Signal, Image and Video Processing, 2012, 6(2):179--195.Google ScholarGoogle ScholarCross RefCross Ref
  7. Liu Yan, Li Honglong. Image and Video Processing Techniques in the DCT Domain {J}. Journal of Image and Graphics, 2013, 8(2):121--128.Google ScholarGoogle Scholar
  8. Zhou T C, Cheng X, Wu Z Y. Action recognition using hierarchically tree-structured dictionary encoding {J}. Journal of Image and Graphics? 2014, 19(7): 1054--1061.Google ScholarGoogle Scholar
  9. Chen T W, Wang Q. 3D line segment detection for unorganized point n cloud, from multi-view stereo {J} Proceedings of the Asia conference on Computer Vision Berlin, Uermany Springer-Verlag, 2011, 32:(16): 400--411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Xie Shipeng, Hu Maolin. Sparse Texture Representation and Classification {J}. Application Research of Canpulers, 2011, 24(3):306--308.Google ScholarGoogle Scholar
  11. Besiris, D.; Zigouris, E.Dictionary-based color image retrieval using multiset theory {J}. Journal of Visual Communication and Image Representation, 2013, 24(7): 1155--1167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M Hussain, G Muhammad, SQ Saleh. Image Forgery Detection Using Multi-Resolution Weber Local Descriptors {J}. International Conference on Signal Image Techno, 2012, 4(1): 395--40.Google ScholarGoogle Scholar

Index Terms

  1. Image Authenticity Decision Based on Random Sample Consensus and Circular Feature Selection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCAI '18: Proceedings of the 2018 International Conference on Computing and Artificial Intelligence
      March 2018
      156 pages
      ISBN:9781450364195
      DOI:10.1145/3194452

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 March 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader