Multimedia ResearchISSN:2582-547X

Face Image Forgery Detection by Weight Optimized Neural Network Model

Abstract

This framework introduces a new automatic image forgery detection approach that involves four main stages like (i) Illumination map computation, (ii) Face detection, (iii) Feature extraction, and (iv) Classification. Initially, the processing of input image is exploited by means of illumination map estimation, which acquires two computation processes called Gray world estimates and Inverse-Intensity chromaticity. Subsequent to this, the Viola-Jones algorithm is employed for the face detection process, which is the second phase, in order to detect the face image clearly. Once after the detection process, the obtained facial image is subjected to feature extraction. For this, Grey Level Co-occurrence Matrix (GLCM) is exploited that extract the facial features from the image. After this, the classification process is carried out for the extracted facial features by employing the Neural Network (NN) classifier. On the whole, this paper mainly concerned over the optimization concept, in which the weight of the NN is optimally selected by using the renowned optimization algorithm named Whale Optimization Algorithm (WOA). To the end, the performance of the implemented model is compared over the other classical models like k-nearest neighbor (kNN), NN and Support Vector Machine (SVM) regarding certain measures like Accuracy, Sensitivity, and Specificity.

References

  • SundusFarooq, Muhammad HaroonYousaf, FawadHussain," A generic passive image forgery detection scheme using local binary pattern with rich models", Computers & Electrical Engineering, vol.62, pp.459-472, August 2017

  • Daniel CavalcantiJeronymo, Yuri Cassio CampbellBorges, Leandro dos SantosCoelho," Image forgery detection by semi-automatic wavelet soft-Thresholding with error level analysis", Expert Systems with Applications, vol. 85, pp.348-356, 1 November 2017.

  • Rani SusanOommen, M.Jayamohan, S.Sruthy," Using Fractal Dimension and Singular Values for Image Forgery Detection and Localization", Procedia Technology, vol.. 24, pp.1452-1459, 2016

  • C. Pun, X. Yuan and X. Bi, "Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, Aug. 2015.

  • O. Mayer and M. C. Stamm, "Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration," IEEE Transactions on Information Forensics and Security, vol. 13, no. 7, pp. 1762-1777, July 2018.

  • Felzenszwalb, P.F., Huttenlocher, D.P.: „Efficient graph-based image segmentation‟, Int. J. Vis. Comput., 59, (2), pp. 167–181, 2004

  • Mathur, M.K., Bhati, P.: „Face objects detection in still images using Viola– Jones algorithm through MATLAB tools‟, Int. J. Innov. Res. Comput. Commun. Eng., 5, (2), pp. 2468–2476, 2017

  • Chris EbeyHoneycutt, RoyPlotnick,"Image analysis techniques and gray-level co-occurrence matrices (GLCM) for calculating bioturbation indices and characterizing biogenic sedimentary structures", Computers & Geosciences, vol.34, no.11, pp.1461-1472, November 2008

  • Yogeswaran Mohan, Sia Seng Chee, Donica Kan Pei Xin and Lee Poh Foong, "Artificial Neural Network for Classification of Depressive and Normal in EEG, 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES), 2016.

  • Seyedali Mirjalili and Andrew Lewis, " The Whale Optimization Algorithm", Advances in Engineering Software, vol. 95, pp.51–67, 2016.

  • R. Dixit, R. Naskar and S. Mishra, "Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising SWT-SVD," IET Image Processing, vol. 11, no. 5, pp. 301-309, 5 2017.

  • R. Dixit and R. Naskar, "Review, analysis and parameterisation of techniques for copy–move forgery detection in digital images," IET Image Processing, vol. 11, no. 9, pp. 746-759, 9 2017.

  • H. Lin, J. Si and G. P. Abousleman, "Orthogonal Rotation-Invariant Moments for Digital Image Processing," IEEE Transactions on Image Processing, vol. 17, no. 3, pp. 272-282, March 2008.

  • Wu-Chih Hu, Wei-Hao Chen, Deng-Yuan Huang, Ching-Yu Yang," Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes", Multimedia Tools and Applications, vol.75, no.6, pp 3495–3516,March 2016.

  • Xin Wang, "Moving window-based double haar wavelet transform for image processing," IEEE Transactions on Image Processing, vol. 15, no. 9, pp. 2771-2779, Sept. 2006.

  • S. Ebrahimi, E. Angelini, L. Gajny and W. Skalli, "Lumbar spine posterior corner detection in X-rays using Haar-based features," 2016 IEEE 13th International Symposium on Biomedical Imaging (ISBI), Prague, 2016, pp. 180-183

  • J. Jang and M. Cho, "Color Artifact-Free Three-Dimensional Integral Imaging Display with Large Depth Using a Lens Array Based on Sublens Structure," Journal of Display Technology, vol. 12, no. 6, pp. 610-615, June 2016.

  • S. Wu and H. Nagahashi, "Parameterized AdaBoost: Introducing a Parameter to Speed Up the Training of Real AdaBoost," IEEE Signal Processing Letters, vol. 21, no. 6, pp. 687-691, June 2014.

  • L. Cuimei, Q. Zhiliang, J. Nan and W. Jianhua, "Human face detection algorithm via Haar cascade classifier combined with three additional classifiers," 2017 13th IEEE International Conference on Electronic Measurement & Instruments (ICEMI), Yangzhou, 2017, pp. 483-487.

  • V. Gaike, N. Akhter, K. V. Kale and P. Deshmukh, "Application of higher order GLCM features on mammograms," 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, 2015, pp. 1-3.