CFP last date
20 May 2024
Reseach Article

Image Registration based on Support Vector Machine for Tampering Localization

by Jyoti Rao, Sheetal Kusal, Swati Nikam, Archana Chougule
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 7
Year of Publication: 2014
Authors: Jyoti Rao, Sheetal Kusal, Swati Nikam, Archana Chougule
10.5120/14853-3219

Jyoti Rao, Sheetal Kusal, Swati Nikam, Archana Chougule . Image Registration based on Support Vector Machine for Tampering Localization. International Journal of Computer Applications. 85, 7 ( January 2014), 23-26. DOI=10.5120/14853-3219

@article{ 10.5120/14853-3219,
author = { Jyoti Rao, Sheetal Kusal, Swati Nikam, Archana Chougule },
title = { Image Registration based on Support Vector Machine for Tampering Localization },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 7 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number7/14853-3219/ },
doi = { 10.5120/14853-3219 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:01:51.570160+05:30
%A Jyoti Rao
%A Sheetal Kusal
%A Swati Nikam
%A Archana Chougule
%T Image Registration based on Support Vector Machine for Tampering Localization
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 7
%P 23-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Different technologies are available on web. In the era of internet communication, systems should able to protect content such as pictures, videos against malicious modifications during their transmission. One of the important problems addressed in this is the authentication of the image received in a Communication. Tampering detection has significance in authentication of image. This paper presents support vector machine (SVM) based tampering detection system. In this a robust alignment (registration) method is proposed which makes use of an image hash component based on the Bag of Features (BOF) paradigm to localize the tampering. These BOF are clustered for effective image alignment. The support vector machine is optimal partitioning based linear classifier and at least theoretically better other classifier because only small numbers of classes required during classification SVM. The proposed signature is attached to the image before transmission and then analyzed at destination to recover the geometric transformations which have been applied to the received image. A block-wise tampering detection which uses histograms of oriented gradients (HOG) presentation is proposed. The proposed approach obtains better margin in providing an overall enhanced performance by reducing the training time while maintaining the accuracy.

References
  1. S. Battiato, G. M. Farinella, E. Messina,G. Puglisi, "Robust Image Alignment for Tampering Detection, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 4, August 2012
  2. S. Battiato, G. M. Farinella, E. Messina, And G. Puglisi, "Robust Image Registration And Tampering Localization Exploiting Bag Of Features Based Forensic Signature," In Proc. ACM Multimedia (Mm'11), 2011.
  3. S. Battiato, G. M. Farinella, E. Messina, And G. Puglisi, "Understanding Geometric Manipulations Of Images Through Bovw-Based Hashing," In Proc. Int. Workshop Content Protection Forensics (Cpaf2011), 2011.
  4. H. Farid, "Digital doctoring: how to tell the real from the fake," Significance, vol. 3, no. 4, 2006.
  5. Y. -C. Lin, D. Varodayan, and B. Girod, "Image authentication based on distributed source coding," in IEEE ComputerSociety International Conference on Image Processing, 2007.
  6. W. Lu, A. L. Varna, and M. Wu, "Forensic hash for multimedia information," in SPIE Electronic Imaging Symposium -Media Forensics and Security, 2010.
  7. W. Lu and M. Wu, "Multimedia forensic hash based on visual words. " in IEEE Computer Society International Conference on Image Processing, 2010.
  8. S. Roy and Q. Sun, "Robust hash for detecting and localizing image tampering," in IEEE Computer Society International Conference on Image Processing, 2007.
  9. P. H. S. Torr and A. Zisserman, "Feature based methods for structure and motion estimation," in Proc. Int. Workshop Vision Algorithms, held during ICCV, Corfu, Greece, 1999, pp. 278–294.
  10. M. Irani and P. Anandan, "About direct methods," in Proc. Int. Workshop Vision Algorithms, held during ICCV, Corfu, Greece, 1999, pp . 267–277.
  11. R. Szeliski, "Image alignment and stitching: a tutorial," Foundations and Trends in Computer Graphics and Computer Vision, vol. 2, no. 1, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

BOF Image Hash Geometric transformation image alignment tampering detection SVM.