• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient Forgery Detection Approaches for Digital Color Images

    2022-08-24 03:29:20AmiraBaumyAbeerAlgarniMahmoudAbdallaWalidElShafaiFathiAbdElSamieandNaglaaSoliman2
    Computers Materials&Continua 2022年5期

    Amira Baumy,Abeer D.Algarni,Mahmoud Abdalla,Walid El-Shafai,F(xiàn)athi E.Abd El-Samie,4 and Naglaa F.Soliman2,

    1Department of Communications,High Institute for Engineering and Technology,Al-Obour Obour City,Egypt

    2Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,Saudi Arabia

    3Department of Electronics and Communications Engineering,F(xiàn)aculty of Engineering,Zagazig University,Zagazig,Sharqia,44519,Egypt

    4Department of Electronics and Electrical Communications Engineering,F(xiàn)aculty of Electronic Engineering,Menoufia University,Menoufia,32952,Egypt

    5Security Engineering Lab,Computer Science Department,Prince Sultan University,Riyadh,11586,Saudi Arabia

    Abstract: This paper is concerned with a vital topic in image processing:color image forgery detection.The development of computing capabilities has led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks.Hence, there is an urgent need for developing efficient image forgery detection algorithms.Two main types of forgery are considered in this paper:splicing and copy-move.Splicing is performed by inserting a part of an image into another image.On the other hand, copy-move forgery is performed by copying a part of the image into another position in the same image.The proposed approach for splicing detection is based on the assumption that illumination between the original and tampered images is different.To detect the difference between the original and tampered images,the homomorphic transform separates the illumination component from the reflectance component.The illumination histogram derivative is used for detecting the difference in illumination, and hence forgery detection is accomplished.Prior to performing the forgery detection process, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, and single image super-resolution, are introduced to reinforce the details and changes between the original and embedded sections.The proposed approach for copy-move forgery detection is performed with the Speeded Up Robust Features (SURF) algorithm, which extracts feature points and feature vectors.Searching for the copied partition is accomplished through matching with Euclidian distance and hierarchical clustering.In addition, some preprocessing methods are used with the SURF algorithm, such as histogram equalization and single-mage super-resolution.Simulation results proved the feasibility and the robustness of the pre-processing step in homomorphic detection and SURF detection algorithms for splicing and copy-move forgery detection,respectively.

    Keywords: Image forgery; splicing algorithm; copy-move algorithm; histogram matching;homomorphic enhancement;SISR;SURF

    1 Introduction

    Security of the image content in the modern multimedia system is an issue of the primary concern of researchers in the last decade.Security of image content can be accomplished through several strategies such as watermarking,encryption,steganography,and image forgery detection.The basic idea of watermarking [1,2] and steganography [3,4] is to hide a secret message, signal, or image; in a cover image for conveying valuable information or owner copyright protection.The recent forgery detection algorithms[5–8]can be classified according to the types of image forgery.The most common algorithms are splicing algorithms and copy-move algorithms.These algorithms depend on different approaches such as Discrete Wavelet Transform (DWT), Local Binary Pattern (LBP), and Scale Invariant Feature Transform(SIFT).

    The main contribution of the paper is to apply the pre-processing techniques on the images before extracting the features and develop robust forgery detection methods for splicing and copy-move forgery attacks based on simple signal processing tools.The remainder of this paper is organized as follows.Section 2 introduces a related work to review the types of forgery and technologies used in image forgery detection.Section 3 illustrates the proposed pre-processing algorithms that are used to enhance the image and detection accuracy.Section 4 presents an efficient blind technique based on homomorphic transform for splicing forgery detection and a robust method to identify the forged regions in copy-move images using SURF key-point extraction.Section 5 presents the experimental results and performance evaluation.Finally,Section 6 introduces the concluding remarks and future works.

    2 Related Work

    Forensics is the science of discovering any attempts to change some sort of original data or images.Image forensics,which is the topic of our interest,includes changing the contents of digital images in an unauthorized manner.Image forensics analysis aims at discovering some forgeries in images,such as splicing forgery,copy-move forgery,and retouching forgery.So,forgery detection techniques aim to discover the existence of forgery manipulations.Different approaches have been adopted for forgery detection,such as passive and active approaches[8–10].Active forgery detection techniques work on the principles of embedding external information in the image,such as a watermark[11–13]or a digital signature[14–16].Verification is performed through the detection of the watermark or signature.

    The technique presented in [11] inserts the Computer-Generated Hologram (CGH) from the marked image into the host image.The CGH is defined as a numerical simulation of the natural phenomena of light interference and diffraction.Resizing operation is performed on the mark image according to two steps.First,the mark image is resized by a factor(1/64),then it is magnified to the size of the host image by adding zeros.Then, the Fourier transform is applied to the resized mark image to get the CGH.

    The algorithm in[12]decomposes the image into RGB components and applies 2-DWT for each component in the original image and mark image.The watermarked component is produced from the low-frequency components for the original image and mark image.Then inverse wavelet transform is used to produce the watermarked image.The watermark in[13]is obtained from the halftone model of the original image,and then it is inserted in the transform domain of the original image.Both DWT and Discrete Cosine Transform(DCT)are used to generate the watermarked image.

    As mentioned before, the second type of active technique depends on a digital signature.The technique in [14] produces a hash image with a Secure Hashing Algorithm (SHA-1) applied to the original image.Then,the hash image is encrypted by the Reed-Solomon Algorithm(RSA),a publickey algorithm,to get the signature.The length of the signature word equals 64 bytes.In parallel with the previous steps, the original image is encoded by Reed-Solomon (RS) code, and the signature is added to the encoded image to produce the encrypted image.Moreover,the technique enhances the randomness of the encrypted image using a chaotic logistic map.

    The algorithm in [15] divides the image into a fixed number of blocks equal to 32 blocks for a row and 32 blocks for a column.For any image, the length of blocks is changed, but the number is fixed.Next, a matrix of means for all blocks is calculated in a row direction and column direction.Then,the final signature is created from the XOR function applied to the two matrixes.The method in [16] extracts the low-frequency wavelet component from the image, and then an adaptive Harris corner detector is applied to get the feature points.For each feature point, the mean and variance are calculated from its neighborhood, and the signature matrix is composed of the point feature coordinates and their mean and variance.

    Passive forgery detection techniques depend on the signal or image itself for the detection of forgery.Similarity tools in statistics can be utilized with these techniques.Several studies have introduced a general survey[17–25]for different types of forgery techniques.In the copy-move technique[26–34],the copied parts share characteristics such as lighting conditions,background,and dynamic range with the rest of the images.So, forgery detection becomes more difficult.Several techniques have been investigated to detect the copy-move forgery.These techniques are classified into blockbased techniques or key-point-based techniques [19].Several algorithms start with preprocessing steps such as conversion between color systems, image enhancement, or noise removal.The feature extraction technique is the only difference between all approaches.The feature vectors should ensure a good representation of the images without losing any data.Then,matching is performed to get the duplication region by finding a high similarity between feature vectors.

    The key-points-based techniques such as SIFT[26–28]and SURF[29,30]are used to reduce the computational complexity.These techniques are not affected by scaling,rotation transformations and are robust to noise.SIFT key-point descriptors are used in[26]as feature vectors.Copy-move detection is improved in[27]by using local phase quantization to extract the texture information from the image before applying the SIFT.The DyWT decomposes the image,and then SIFT transform is applied on the LL sub-band to extract the feature descriptors[28].

    The dimension of the SIFT key-point feature vector is (1×128).So, the computational cost is slow.The use of integral images with a SURF key-point descriptor makes the computation of the descriptor faster than SIFT descriptor only,and the dimensions of the feature vector become(1×64).So, modern researches are directed to the use of SURF key points.SURF key points features are extracted,and their descriptors are matched with each other.

    Many matching techniques have been investigated in the literature, such as Euclidean distance[31], KD tree, and nearest neighbor.An agglomerative hierarchical clustering [32] is applied to the spatial locations of the matched points.The splicing forgery detection techniques aim at discovering the sudden changes between image parts.The algorithm in [33] has been presented to identify the change in the illuminant colors.A grey-world algorithm is used to estimate illuminant sub-bands,and a comparison is performed between them to locate the forged regions.The image[34]is converted from RGB to YCbCr components,and the chrominance component is divided into overlapping blocks.An LBP is calculated for each block,and then the DCT transform is applied on the resulting LBP blocks.Finally,the standard deviations are calculated for each block to build the feature vector.

    3 The Proposed Pre-Processing Techniques for Image Enhancement

    Image enhancement techniques are used in a pre-processing step in many applications such as medical and satellite image processing [35–37].Also, image enhancement can be used for forgery detection.It is used to increase the contrast between original and copied parts in any section of the image.The assumption upon which the enhancement is used in forgery detection is that any copied section in the image has a different illumination for that of the background.

    Image enhancement methods can be classified into spatial-domain and transform-domain methods [35–38].Spatial-domain methods depend on the direct manipulation of the pixels in the image.Transform-domain methods are used to enhance an image by processing in the selected transform domain.Spatial domain techniques are superior from the ease of implementation and speed perspectives.Therefore, only spatial-domain processing techniques will be discussed in this paper.Spatialdomain processing[35]is classified into point processing and mask processing.Point processing deals with the individual pixels only.It does not utilize the relation between pixels in the image.Unlike point processing,mask processing estimates the new pixel value from its original and neighborhood pixels.

    This section is devoted to the pre-processing techniques applied to the images before extracting the features to improve the forgery detection algorithms.As mentioned in the literature review, preprocessing is necessary for image forgery detection because it enhances the contrast between original and forged sections.We will develop efficient pre-processing techniques for forgery detection.These techniques include the utilization of high-pass filtering with histogram equalization,the combination between single image super-resolution and histogram equalization, and the decomposition with additive wavelet transform(AWT)and homomorphic image enhancement.

    3.1 High-Pass Filtering and Histogram Equalization

    This technique combines two stages:the high-pass filter and the histogram equalization[39].First,the image passes through the 2-D high-pass filter.Then, the high-pass filter detects the new highcontrast pixel values by processing the incoming image with a 3×3 convolution mask.The resulting images are sharper and contain more details.Eq.(1)shows the mask of the high-pass filter used in the proposed algorithm.The sum of the coefficients in a sharpening operator is also commonly taken to preserve amplitudes in regions of constant gray levels.

    After that, the histogram of the resulting image from the first stage is stretched through the spectrum (0 – 255) to increase the contrast of the images and provide more details.The normalized histogram can be estimated by the probability density function PDF mentioned in[39].

    3.2 Single Image Super-Resolution and Histogram Equalization

    The undesired motion may occur on the medium between the imaging system and the scene in many cases.This motion produces shifts between pixels and generates a low-resolution image.The missing information can be obtained from the generation of a high-resolution image.Also, several techniques are based on the assumption that the available low-resolution input images are produced by warping,blurring,or down-sampling of the high-resolution scene.High-resolution images are used in several applications such as medical image processing,satellite,and aerial imaging,fingerprint image enhancement,iris recognition,and text image enhancement.

    Super-resolution techniques are classified into two categories:multiple image super-resolution and example-based super-resolution.Multiple image super-resolution techniques depend on combining several images, and each image has different information of the same scene.Example-based superresolution techniques have databases formed by the correspondence between low-and high-resolution image patches.These techniques apply the learning rules between patches to find the missing data.The scaling up of the images leads to more image details by adding more pixels predicted by their neighbors.

    The main idea adopted in the Single Image Super-Resolution(SISR)algorithms is to use only the low-resolution images available[40,41].This means that the algorithm can generate a high-resolution image without the need for an external database.Super-resolution [40] needs only the original lowresolution image and its blurred versions.In this type of algorithm, first the image is up-sampled with bicubic interpolation, the algorithms depend on the down-sampled version and the deblurred version to obtain the required high-resolution image.Finally,Gaussian Process Regression(GPR)is used as a predictor for the new high-resolution image.The choice of the proper covariance function provides soft clustering of pixels for improvement of the edge recovery.The details of the single-image super-resolution technique are indicated in[40].It aims to increase the number of extracted features in test images.Increasing the resolution of an image gives more key points.So,the small-size forged regions can be detected.Also, good descriptors are obtained to improve the matching process.The block diagram of the proposed model is illustrated in Fig.1.It combines histogram equalization and SISR in the pre-processing step.

    Figure 1:Super-resolution with histogram equalization

    3.3 Homomorphic Enhancement with Additive Wavelet Transform

    A pre-processing technique based on the AWT is proposed for image enhancement.This technique begins with the decomposition of images by the AWT and then applies the homomorphic transform on each sub-band, as shown in Fig.2.Next, the AWT decomposes the image into different subbands,and each sub-band is enhanced with the homomorphic algorithm[42].In the final step,these homomorphic enhanced sub-bands are subjected to an inverse additive wavelet transform to get an image with better visual details.The homomorphic filtering technique is one of the most common ways used to improve the quality of digital images.It has been used in many imaging applications such as medical applications and robotic vision[39,42,43].

    Figure 2:The homomorphic enhancement pre-processing technique

    The steps of the enhancement method are shown in Fig.3 and can be explained as follows[44]:

    1) The images are decomposed intoR,G,Bcolor channels.

    2) For each channel,the wavelet sub-bandsw1,w2,w3,...,wncontain the detailed high-frequency components,and the approximation low-frequency componentINisgenerated.

    3) For each wavelet sub-band,the illumination and reflectance components are separated using a logarithmic operation.

    4) The reflectance and the illumination components are multiplied withα, andβ, respectively,whereα >1 andβ<1.

    5) An exponential function is applied to reconstruct each sub-band and then reconstruct the enhanced image.

    4 Proposed Forgery Detection Algorithms

    4.1 Proposed Splicing Forgery Detection with Homomorphic Technique

    The proposed technique aims at discriminating between the original and forgery images.It extracts the features from the histogram derivative for the illumination components.The homomorphic filtering separates the low-frequency illumination components from the high-frequency reflectance components of the image.This filtering technique can be implemented by applying a logarithm operation on the image to change the multiplication relation of illumination and reflectance to a sum relation.

    The illumination components can be separated using a low-pass filter applied on the logarithm of the image intensity as indicated in [39,42].On the other hand, the reflectance components can be produced using a high-pass filter.Firstly, the illumination histogram for authentic and forged images is differentiated,and then the Probability Density Functions(PDFs)are estimated for peaks of histogram derivatives for a set of images.Finally,the threshold is determined based on the PDFs for the histogram derivative peak distributions in the presence and absence of forgeries.The proposed technique relies heavily on determining the PDFs for each separated channel in two color models:IHS and RGB,and specifies the most sensitive channel for forgeries.The proposed model is implemented in two phases:the training phase and the testing phase.

    The proposed model can be implemented through the following steps.

    1) Choosing the training dataset and specifying the color system.

    2) Selection of original and tampered images from the dataset.

    3) Taking the logarithm of the image intensity.

    4) Getting the illumination components by utilization of a low-pass filter.

    5) Estimating the illumination histogram.

    6) Determining the absolute maximum of the derivative of the illumination histogram.

    7) For each set of the original and tampering images, the PDFs of the absolute peaks of the derivative histogram are estimated separately.

    8) Determining the forgery detection threshold.

    9) Testing this threshold with the testing dataset to obtain the performance of the proposed model.

    Figure 3:The block diagram of the AWT enhancement

    4.2 Proposed Copy-Move Forgery Detection with Pre-Processing and Speeded Up Robust Features Key-Points

    In this section,the SURF key points are utilized for the copy-move forgery detection.In addition,the Histogram equalization(HE)and SISR are applied as pre-processing techniques to improve the images before extracting the SURF key points to improve the copy-move forgery detection.

    SIFT is used for extracting the distinguishing invariant features from the images.The SIFT features present a powerful tool in many applications, such as reliable matching between different views of a 3-D scene and object recognition in computer vision.Furthermore,SIFT transform provides robust,reliable features to photometric changes such as scaling,rotation,distortion,and addition of noise.There are four main steps for extracting SIFT features:scale-space extrema detection,key-point localization,orientation assignment,and key-point descriptor.In this paper,the SURF technique is used for reducing the time cost of computations and feature matching,which is the main advantage of using it.More explanation of the SURF is provided in[29].

    Fig.4 introduced the block diagram of the proposed model that aims to increase the number of extracted features in test images.Increasing the resolution of an image gives more key points.So,the small-size forged regions can be detected.Also,good descriptors are obtained to improve the matching process.

    Figure 4:The proposed SURF-based technique for forgery detection

    The matching process for a test image is performed as follows;a set of key-pointsS={s1,s2,s3,...,sn} with their corresponding SURF descriptorsF{f1,f2,f3,...,fn} is extracted.Then, a matching process is performed in the SURF space among the vectors F of each key-point to identify similar local patches in the test image.

    Euclidean distance[44]is proposed to find the best candidate match for each key point.Similar local patches are determined with minimum Euclidean distance and minimum threshold(th1)[45].The threshold(th1)lies between 0 and 1.Ifth1is set to a value closer to 0,the results will be highly corrected but with fewer matches.Ifth1is set to a value closer to 1,the results will have more matches,but they will be lower correct,increasing the number of false matches.The Euclidean distance is defined by:

    So,agglomerative hierarchical clustering is used to neglect the false matches and find the matched descriptors.Then,groups of close descriptors are combined together.The hierarchical clustering(HC)algorithm[46]starts by assigning each key point to a cluster;then,it computes all the reciprocal spatial distances among clusters,finds the closest pair of clusters,and finally merges them into a single cluster.Such computation is repeated until a final merging scenario is achieved.Then,the matching process is performed on clusters.

    5 Simulation Results and Performance Evaluation

    5.1 Simulation Setup

    Two datasets have been used to test the proposed homomorphic algorithm.The first is a realistic database composed of 70 original images and 70 tampered images.Images are subdivided into the training data consisting of 15 original images and 15 tampered images.The testing data contains 55 original images and 55 tampered images.The Photoshop program has been used to generate the tampered images.The tampered images have been generated by tacking a copy of an image part from an image and pasting this part into another image.

    The second database is CASIA 2.0 v2[47].This database contains samples of spliced color images of different sizes.It comprises 120 original images and 120 tampered images sub-divided into 20 original images and 20 tampered images for training and 100 original images and 100 tampered images for testing.

    5.2 Performance Evaluation for Image Splicing Forgery Detection Algorithm

    In the first simulation experiment, each RGB and IHS system have examined the proposed detection algorithm.The performance of the proposed model has been determined by the calculation of the True Positive Rate (TPR), which is defined as the sensitivity, the True Negative Rate (TNR),which is defined as the specificity,the False Positive Rate(FPR),and the Accuracy.These metrics are estimated with Eqs.(3)–(6).Sensitivity is related to the ability of the algorithm to detect a tampered image correctly as being tampered.Specificity is associated with the ability of the algorithm to identify an authentic image correctly as authentic.Hence,high values of sensitivity and specificity imply the better performance of the system,where:

    ·TP(True Positive):Tampered image successfully detected as being tampered.

    ·FP(False Positive):Authentic image detected as being tampered.

    ·TN(True Negative):Authentic image successfully detected as authentic.

    ·FN(False Negative):Forged image detected as authentic.

    A comparison among red,green,blue,and intensity channels for the manually obtained dataset is shown in Tab.1.The red channel gives the highest accuracy,equals 90.A comparison among red,green, blue channels for the CASIA dataset is shown in Tab.2.Blue channel achieves the highest accuracy of 74.5%.

    Table 1:Comparison between red-green-blue channels and intensity channels on the first dataset

    Table 2:Comparison between red-green-blue channels on the CASIA dataset

    In the second simulation experiment, the effect of pre-processing on the proposed detection algorithm is tested.Pre-processing techniques are utilized to enhance the visual quality of the image.In addition,it helps in forgery detection as the details of tampered regions in the images are reinforced.The pre-processing operations applied with the proposed model are High pass filter (HPF), HE,Histogram Matching(HM),and SISR.

    The proposed enhancement approach for forgery detection has been tested on the CASIA dataset[47], and each channel of the RGB system has been used.A comparison between pre-processing techniques for forgery detection on the different channels is given in Tabs.3–5.The feasibility of using different pre-processing techniques is illustrated in the results.The accuracy is increased with all pre-processing techniques except the high-pass filtering.The specificity with a blue channel is increased from 71% to 76%.This may be attributed to the smaller wavelength range of the green channel compared to the red and green channels,as shown in Fig.5.This performance of the forgery detection process with high-pass filtering can be explained based on the idea of the operation of the high-pass filtering process.The high-pass filter can be used to make the image sharper and emphasize fine details in the image, but it attenuates the low-frequency components of the image, and it also amplifies noise.It is obvious to note that HE gives the highest accuracy from all tested techniques.The accuracy on the red channel is increased from 68%to 83%.The accuracy on the green channel is increased from 68.5%to 82.5%,and on the blue channel,from 74.5%to 82%.The reason is that the histogram equalization stretches the dynamic range of the image,and hence all details of forgery can be enlarged.

    The high-pass filter and histogram equalization are combined together for the enhancement of the forgery detection process.Tab.6 shows the effect of HPF with HE on red,green,blue channels for the second dataset[47].The accuracy on the red channel is increased from 68%to 85.5%.All channels achieve close values of accuracy.

    Table 3:Forgery detection results with pre-processing techniques on the red channel

    Table 4:Forgery detection results with pre-processing techniques on the green channel

    Table 5:Forgery detection results with pre-processing techniques on the blue channel

    SISR is combined with HE as a pre-processing technique to enhance the forgery detection results.A comparison of forgery detection performance with and without pre-processing on red, green,and blue channels is given in Tab.7.The accuracy of forgery detection on red, green, and blue channels indicates the effect of pre-processing;therefore,clear discrimination between the tampered and original images is provided.In addition, the combination between resolution enhancement and histogram equalization increased the accuracy of forgery detection from green,blue,and red channels to 79.5%,80.5%,and 78.5%from 68.5%,74.5%,and 68%,respectively.

    Figure 5:The wavelength range of red,green,and blue channels in the RGB color system

    Table 6:Forgery detection results from all channels with the HPF and HE combined technique

    Table 7:Results of SISR and HE pre-processing technique on red,green,and blue channels

    Table 7:Continued

    Finally,the homomorphic enhancement is tested in the AWT Domain for forgery detection.The simulation experiments have been performed on the blue channels with variable values ofαandβas weighing factors of the enhancement process to test the performance of the proposed enhancement algorithm.The results of the experiments are given in Tab.8.The range ofβis started from 0.8 to 0.99,and the range ofαstarts from 1.2 to 2.Both sensitivity and specificity vary with the change ofαandβ.The accuracy is increased from 77%to 83.5%.The best results are obtained withβset to 0.99 andαset to 2.

    After applying homomorphic enhancement in the AWT domain on each sub-band performance for red,green,and blue channels on the second dataset,the simulation results are given in Tab.9.The accuracy results on the green,blue,and red channels indicate the proposed pre-processing benefit.The combination between AWT and homomorphic transform increases the accuracy values on red,green,and blue channels to 73.5%,79%,and 83.5%from 68%,68.5%,and 74.5%.

    5.3 Performance Evaluation for Copy Move Based on SURF Forgery Detection Algorithm

    The SURF-based algorithm has been evaluated on two datasets:MICC_F600[48]and CoMoFoD[49].MICC-F220 contains copy-move color images of different sizes.This database is composed of 110 original images and 110 tampered images.The CoMoFoD database consists of 40 original images and 200 tampered images.The size of the images is 512×512.This dataset has small size forgeries and multiple forgeries.

    Fig.6 shows the effect of different pre-processing techniques on the tampered image 002-F from the CoMoFoD database.The number of key points is increased from 192 using SURF without pre-processing to 6219 after applying histogram equalization and single-image super-resolution.Histogram equalization produces the largest number of discriminative key-points because it increases the contrast between pixels,as shown in Fig.6c.

    Tab.10 introduces a comparison of applying HE,SISR,and a hybrid algorithm of HE and SISR for the number of extracted key points for four images in MICC_F600 datasets.It can be noted that the hybrid algorithm of HE and SISR gives a better investigation of key points.In addition,the performance of the hybrid algorithm has been tested on 40 images selected from the CoMoFoD database.Finally,the TPR is measured as shown in Tab.11.The results prove that the combination of histogram equalization and single-image super-resolution enhances the TPR from 57.5%to 85%.

    Table 8:Effect of changing β and α on the forgery detection performance from the blue channel

    Table 9:Forgery detection results with and without homomorphic enhancement in the AWT domain from all channels

    The copied part in the image may be rotated,scaled,and modified before being pasted in another region.The SURF algorithm is tested against rotation,scaling,distortion,and combination between these operations,as shown in Fig.7.It is clear that the pre-processing gives more reliable results with each operation.The overall accuracy is calculated for two datasets,and the results are shown in Fig.8.The accuracy on the MICC_F220 dataset is 99%,and the accuracy on the CoMoFoD database dataset is 92.5%.

    Figure 6:Key-points extraction from an image with forgery(002-F)from CoMoFoD database(a)The image with forgery(002_F),(b)SURF key-points,(c)Key-points after HE,(d)Key-points after SISR,(e)Key-points after HE and SISR,(f)The MH features

    Table 10:Comparison between numbers of key-points at different pre-processing algorithms

    Table 11:TPR values of the proposed SURF-based technique for 40 images

    Figure 7:Comparison of SURF-based forgery detection with and without pre-processing in the presence of some manipulations of copied areas

    Figure 8:Performance evaluation of the proposed SURF-based algorithm on two different datasets

    6 Conclusion and Future Work

    The main motivation behind this rese arch was the enhancement of image forgery detection performance.This paper discussed two types of image forgery algorithms:copy-move forgery and splicing forgery.These algorithms presented effective and robust models to discriminate between tampered images and authentic images.The enhancement based on pre-processing stages is used to reinforce the details of the images before the forgery detection process.The detail reinforcement process can achieve high classification accuracy.In this paper, high-pass filtering, histogram equalization,resolution enhancement, and adaptive wavelet transform are used individually and in combination as pre-processing stages.

    For the splicing forgery, image pre-processing and homomorphic enhancement presented an efficient image forgery detection model.The illumination component is semi-constant in normal images,and hence the histogram of the illumination is close to a single-valued histogram.Otherwise,if there is a forgery in the image, it is expected that due to making some mixes with the image, the lighting conditions may differ,and hence the illumination component may have abrupt changes that are reflected in its histogram as an abnormal change.Abnormal changes can be detected through the first-order derivative;however,there is no large effect on the reflectance component.

    Different tampered and untampered image sets have been used for the test.The proposed algorithms have been tested using the different channels of the RGB system, and the detection threshold is determined for each.The blue channel gave the maximum detection accuracy of 74.5%for the proposed detection algorithm without pre-processing.Nevertheless, the detection accuracy became 85.5%after high-pass filtering and histogram equalization.High-pass filtering and histogram equalization pre-processing combined significantly affect the red channel results as the detection accuracy changed from 68%to 85.5%.Moreover,homomorphic enhancement in the AWT domain led to an accuracy of 100%from the red channel.The resolution enhancement pre-processing technique gave a small change in the detection accuracy,and the detection accuracy became 78.5%.

    Image pre-processing and SURF-based feature extraction constituted a robust and effective image forgery detection model for the copy-move forgery.The HE and SISR are employed before extracting the SURF key-points to improve the accuracy of the copy-move forgery detection process.This strategy aims to increase the number of SURF key points to efficiently discover the copied regions.As a result,the true positive rate is improved from 64%to 85%.The true positive rate with pre-processing and SURF-based detection has been investigated against scaling, rotation, and distortion attacks.In addition, histogram equalization and single-image super-resolution together with SURF-based detection achieved good results in the presence of copied segment manipulations.In future work,the proposed forgery detection algorithms can be examined for video and other multimedia data formats.

    Acknowledgement:The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University through the Fast-track Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    极品少妇高潮喷水抽搐| 国产乱人偷精品视频| 一级片免费观看大全| 一二三四在线观看免费中文在 | 亚洲av在线观看美女高潮| av免费观看日本| 男人舔女人的私密视频| 母亲3免费完整高清在线观看 | 国产极品粉嫩免费观看在线| 下体分泌物呈黄色| 交换朋友夫妻互换小说| 九色亚洲精品在线播放| 18禁国产床啪视频网站| 免费大片18禁| 国产探花极品一区二区| 国产免费视频播放在线视频| 超色免费av| 激情五月婷婷亚洲| 免费看不卡的av| 在线观看美女被高潮喷水网站| 精品国产一区二区三区四区第35| 激情五月婷婷亚洲| 欧美激情极品国产一区二区三区 | 欧美变态另类bdsm刘玥| 久久人人爽av亚洲精品天堂| 成人免费观看视频高清| 国语对白做爰xxxⅹ性视频网站| 在线天堂最新版资源| a级毛色黄片| 日韩av不卡免费在线播放| 久久久精品94久久精品| 80岁老熟妇乱子伦牲交| 午夜91福利影院| 看十八女毛片水多多多| a 毛片基地| 久久人妻熟女aⅴ| 国产精品久久久久久精品古装| 国产极品粉嫩免费观看在线| 久久国产精品男人的天堂亚洲 | 美女大奶头黄色视频| 9热在线视频观看99| av片东京热男人的天堂| 高清视频免费观看一区二区| www日本在线高清视频| 18禁在线无遮挡免费观看视频| 中国美白少妇内射xxxbb| 好男人视频免费观看在线| 在线看a的网站| 日日啪夜夜爽| 成人亚洲欧美一区二区av| 三级国产精品片| 亚洲欧洲国产日韩| 秋霞伦理黄片| 九色亚洲精品在线播放| 亚洲美女黄色视频免费看| 激情视频va一区二区三区| 波多野结衣一区麻豆| 亚洲精品一区蜜桃| 亚洲av.av天堂| av黄色大香蕉| 精品第一国产精品| 亚洲人成77777在线视频| 欧美精品亚洲一区二区| 精品熟女少妇av免费看| 免费日韩欧美在线观看| 亚洲国产精品一区二区三区在线| 久久狼人影院| 国产一区亚洲一区在线观看| 日日啪夜夜爽| 天堂8中文在线网| av有码第一页| 大片免费播放器 马上看| 男人添女人高潮全过程视频| 成人无遮挡网站| 精品久久蜜臀av无| 在线看a的网站| 国产成人一区二区在线| 欧美日韩一区二区视频在线观看视频在线| 久久精品国产亚洲av天美| 国产视频首页在线观看| 美女xxoo啪啪120秒动态图| 亚洲av电影在线进入| 韩国高清视频一区二区三区| 91aial.com中文字幕在线观看| 亚洲欧美成人精品一区二区| 色婷婷久久久亚洲欧美| 日本av免费视频播放| 午夜福利影视在线免费观看| 日韩大片免费观看网站| 国产高清不卡午夜福利| 啦啦啦啦在线视频资源| 七月丁香在线播放| 全区人妻精品视频| 内地一区二区视频在线| 亚洲色图综合在线观看| 精品福利永久在线观看| 涩涩av久久男人的天堂| av电影中文网址| 精品国产一区二区久久| 欧美人与善性xxx| 女人被躁到高潮嗷嗷叫费观| 黄片播放在线免费| 国产黄频视频在线观看| 赤兔流量卡办理| 亚洲精品成人av观看孕妇| 亚洲欧洲精品一区二区精品久久久 | 边亲边吃奶的免费视频| 51国产日韩欧美| 国产男女内射视频| 国产免费现黄频在线看| 少妇 在线观看| 国产国拍精品亚洲av在线观看| 伊人亚洲综合成人网| 精品国产一区二区三区四区第35| 欧美 亚洲 国产 日韩一| 亚洲综合色惰| 97超碰精品成人国产| 一本大道久久a久久精品| 精品一区二区免费观看| 日韩欧美一区视频在线观看| 一级毛片电影观看| 亚洲精品美女久久av网站| 成人漫画全彩无遮挡| av有码第一页| 黄网站色视频无遮挡免费观看| 国产片内射在线| 日韩熟女老妇一区二区性免费视频| 国产成人aa在线观看| 国产精品成人在线| 国产成人午夜福利电影在线观看| 高清av免费在线| 国产av码专区亚洲av| 久久精品国产亚洲av涩爱| 日韩成人伦理影院| 日韩在线高清观看一区二区三区| 涩涩av久久男人的天堂| av在线老鸭窝| 97超碰精品成人国产| 精品一品国产午夜福利视频| 国产亚洲一区二区精品| 王馨瑶露胸无遮挡在线观看| 欧美性感艳星| 美女xxoo啪啪120秒动态图| 一级毛片 在线播放| 国产亚洲最大av| 国产男女超爽视频在线观看| 久久久久久久久久久免费av| 亚洲人成网站在线观看播放| 极品少妇高潮喷水抽搐| 亚洲伊人色综图| 老熟女久久久| 新久久久久国产一级毛片| 伊人久久国产一区二区| 18禁动态无遮挡网站| 18禁观看日本| 熟妇人妻不卡中文字幕| 成年av动漫网址| 狠狠精品人妻久久久久久综合| 女人被躁到高潮嗷嗷叫费观| 免费看av在线观看网站| 狠狠精品人妻久久久久久综合| 如何舔出高潮| 久久久久久人人人人人| 热re99久久精品国产66热6| 欧美成人精品欧美一级黄| 亚洲国产欧美日韩在线播放| 婷婷色av中文字幕| 国产在线一区二区三区精| 熟妇人妻不卡中文字幕| 国产深夜福利视频在线观看| 国产乱人偷精品视频| 国产精品久久久av美女十八| 91成人精品电影| 国产日韩欧美在线精品| 欧美97在线视频| 欧美老熟妇乱子伦牲交| 国产在线视频一区二区| 亚洲久久久国产精品| 午夜免费男女啪啪视频观看| 久久精品aⅴ一区二区三区四区 | 国产一区二区在线观看日韩| 成人毛片a级毛片在线播放| 男的添女的下面高潮视频| 满18在线观看网站| 亚洲一码二码三码区别大吗| 欧美最新免费一区二区三区| 欧美日韩综合久久久久久| 国产精品久久久久久久电影| 久久女婷五月综合色啪小说| 夫妻性生交免费视频一级片| 欧美日韩综合久久久久久| 在线看a的网站| 男女边摸边吃奶| 久久久久久久久久久久大奶| 欧美精品人与动牲交sv欧美| 熟女电影av网| 90打野战视频偷拍视频| 欧美日韩综合久久久久久| 九九在线视频观看精品| 大话2 男鬼变身卡| 男女免费视频国产| 亚洲激情五月婷婷啪啪| 久久久久久久久久久久大奶| 国产一区二区在线观看av| 亚洲精品色激情综合| 国产亚洲欧美精品永久| 久久人人爽av亚洲精品天堂| 91精品伊人久久大香线蕉| 午夜老司机福利剧场| 丝袜脚勾引网站| 18禁动态无遮挡网站| 极品少妇高潮喷水抽搐| 在线观看免费视频网站a站| 蜜桃在线观看..| a级片在线免费高清观看视频| 久久av网站| 欧美日韩综合久久久久久| 久久久久久久久久久久大奶| 一级片免费观看大全| 久久久久久久久久久久大奶| 大香蕉久久成人网| 日本av免费视频播放| 精品国产一区二区久久| 精品午夜福利在线看| av天堂久久9| 丝袜美足系列| 女性被躁到高潮视频| 欧美亚洲日本最大视频资源| 99久久人妻综合| 久久婷婷青草| 亚洲精品美女久久av网站| 国产永久视频网站| 制服诱惑二区| 国产精品国产三级国产av玫瑰| 日本猛色少妇xxxxx猛交久久| 搡老乐熟女国产| 天美传媒精品一区二区| 国产精品久久久久久精品电影小说| 国产精品久久久久久久久免| 黄色 视频免费看| 婷婷成人精品国产| 久久久久久久国产电影| 亚洲少妇的诱惑av| 考比视频在线观看| 中国美白少妇内射xxxbb| 亚洲av福利一区| 777米奇影视久久| 亚洲内射少妇av| 亚洲色图综合在线观看| 亚洲四区av| 黄网站色视频无遮挡免费观看| 亚洲图色成人| 国产又爽黄色视频| 高清视频免费观看一区二区| 老司机影院毛片| 这个男人来自地球电影免费观看 | 国产成人a∨麻豆精品| av不卡在线播放| 欧美3d第一页| 成人综合一区亚洲| 赤兔流量卡办理| 日韩熟女老妇一区二区性免费视频| 纵有疾风起免费观看全集完整版| 国产精品国产三级专区第一集| 亚洲一级一片aⅴ在线观看| 校园人妻丝袜中文字幕| 欧美日韩av久久| 成年av动漫网址| 美女中出高潮动态图| 欧美激情国产日韩精品一区| 在线看a的网站| 免费播放大片免费观看视频在线观看| 久久午夜综合久久蜜桃| 中文字幕精品免费在线观看视频 | 九九在线视频观看精品| 视频在线观看一区二区三区| 国产一区二区在线观看av| 两个人看的免费小视频| 国产精品一区www在线观看| av线在线观看网站| 91精品三级在线观看| 交换朋友夫妻互换小说| 精品一区二区三区四区五区乱码 | 午夜免费男女啪啪视频观看| 黑丝袜美女国产一区| 这个男人来自地球电影免费观看 | 少妇人妻精品综合一区二区| 韩国精品一区二区三区 | 搡女人真爽免费视频火全软件| √禁漫天堂资源中文www| 天美传媒精品一区二区| 综合色丁香网| 亚洲中文av在线| 精品第一国产精品| 久久99一区二区三区| 亚洲国产成人一精品久久久| 亚洲欧美日韩另类电影网站| 国产精品久久久久久久久免| 18禁国产床啪视频网站| 在线看a的网站| 十分钟在线观看高清视频www| 久久午夜福利片| 女的被弄到高潮叫床怎么办| 熟女av电影| 国产精品 国内视频| 欧美精品国产亚洲| 亚洲四区av| 日本91视频免费播放| 国产成人精品福利久久| 欧美日韩精品成人综合77777| 青春草亚洲视频在线观看| 久久久久国产精品人妻一区二区| 亚洲三级黄色毛片| 中文字幕另类日韩欧美亚洲嫩草| 制服诱惑二区| 久久影院123| 三级国产精品片| a级片在线免费高清观看视频| 久久99一区二区三区| 国产欧美另类精品又又久久亚洲欧美| 一区二区三区乱码不卡18| 晚上一个人看的免费电影| 深夜精品福利| 两性夫妻黄色片 | 好男人视频免费观看在线| 韩国高清视频一区二区三区| 国产成人午夜福利电影在线观看| 国产免费一级a男人的天堂| 一本—道久久a久久精品蜜桃钙片| 美女福利国产在线| 亚洲精品中文字幕在线视频| 在线观看免费视频网站a站| 婷婷色麻豆天堂久久| 啦啦啦视频在线资源免费观看| 国产精品久久久av美女十八| 免费高清在线观看日韩| 深夜精品福利| 日本午夜av视频| 一二三四中文在线观看免费高清| 日韩精品免费视频一区二区三区 | 中国三级夫妇交换| 一级黄片播放器| 九九在线视频观看精品| 制服人妻中文乱码| 美国免费a级毛片| 日韩在线高清观看一区二区三区| 18禁裸乳无遮挡动漫免费视频| 啦啦啦啦在线视频资源| 亚洲av日韩在线播放| 18禁在线无遮挡免费观看视频| 亚洲精品一二三| 日日撸夜夜添| 纯流量卡能插随身wifi吗| 免费高清在线观看日韩| 黄片播放在线免费| 又黄又爽又刺激的免费视频.| 超色免费av| 成人亚洲欧美一区二区av| 成人漫画全彩无遮挡| 婷婷成人精品国产| 亚洲欧美成人精品一区二区| 亚洲av男天堂| 狂野欧美激情性bbbbbb| 国产有黄有色有爽视频| 日韩成人av中文字幕在线观看| 成年女人在线观看亚洲视频| 成人国产麻豆网| 亚洲精品中文字幕在线视频| 22中文网久久字幕| 日韩欧美精品免费久久| 日本黄色日本黄色录像| 一边亲一边摸免费视频| 高清毛片免费看| 满18在线观看网站| 咕卡用的链子| 亚洲在久久综合| 国产亚洲午夜精品一区二区久久| 成年av动漫网址| 久久99蜜桃精品久久| a级毛片黄视频| 人体艺术视频欧美日本| 最近中文字幕高清免费大全6| 精品人妻在线不人妻| av免费在线看不卡| 纯流量卡能插随身wifi吗| 国产黄频视频在线观看| 亚洲精品第二区| 亚洲国产精品一区二区三区在线| 日本爱情动作片www.在线观看| 两个人免费观看高清视频| 久久久久视频综合| 欧美成人午夜免费资源| 香蕉国产在线看| 亚洲国产精品成人久久小说| 久久国产精品大桥未久av| 亚洲色图综合在线观看| 欧美变态另类bdsm刘玥| 日韩三级伦理在线观看| 在线亚洲精品国产二区图片欧美| 18在线观看网站| 国产亚洲精品久久久com| 久久久久国产网址| 免费大片18禁| 久久精品aⅴ一区二区三区四区 | 亚洲经典国产精华液单| 免费av中文字幕在线| 午夜影院在线不卡| 又大又黄又爽视频免费| 国产无遮挡羞羞视频在线观看| 一级,二级,三级黄色视频| 成人无遮挡网站| 在线天堂中文资源库| 人人妻人人添人人爽欧美一区卜| 日韩一区二区视频免费看| 日韩不卡一区二区三区视频在线| 国产亚洲一区二区精品| 亚洲欧美一区二区三区黑人 | 欧美国产精品va在线观看不卡| 看十八女毛片水多多多| 久久99热这里只频精品6学生| 97超碰精品成人国产| 少妇的逼好多水| 国产高清三级在线| 日韩精品有码人妻一区| 久久精品久久久久久久性| 1024视频免费在线观看| 美女国产高潮福利片在线看| 美女脱内裤让男人舔精品视频| 最近中文字幕高清免费大全6| 午夜视频国产福利| 久久久久久久久久久久大奶| 国语对白做爰xxxⅹ性视频网站| 不卡视频在线观看欧美| 搡老乐熟女国产| av在线老鸭窝| 精品国产一区二区久久| 免费黄色在线免费观看| 亚洲精品乱码久久久久久按摩| 国产老妇伦熟女老妇高清| 深夜精品福利| 亚洲伊人久久精品综合| 亚洲精品一区蜜桃| 亚洲美女视频黄频| 性色avwww在线观看| a级片在线免费高清观看视频| 男女国产视频网站| 国产又爽黄色视频| 免费在线观看黄色视频的| 亚洲av综合色区一区| 极品少妇高潮喷水抽搐| 日本欧美视频一区| 超色免费av| 亚洲av免费高清在线观看| 久久精品国产亚洲av涩爱| 一级a做视频免费观看| 极品少妇高潮喷水抽搐| 国产黄色免费在线视频| 亚洲性久久影院| 韩国av在线不卡| 最近最新中文字幕大全免费视频 | 国产1区2区3区精品| 另类亚洲欧美激情| 日韩制服骚丝袜av| 女人被躁到高潮嗷嗷叫费观| av在线观看视频网站免费| 女性被躁到高潮视频| 国产av精品麻豆| 欧美日韩视频高清一区二区三区二| 夫妻性生交免费视频一级片| www.熟女人妻精品国产 | 日韩不卡一区二区三区视频在线| 麻豆乱淫一区二区| 国产黄色免费在线视频| 国产成人aa在线观看| 纵有疾风起免费观看全集完整版| 一区二区三区乱码不卡18| 午夜视频国产福利| 大香蕉久久网| 成人影院久久| av在线app专区| 香蕉国产在线看| 水蜜桃什么品种好| 精品熟女少妇av免费看| av卡一久久| 久久亚洲国产成人精品v| 国产欧美另类精品又又久久亚洲欧美| 国产乱来视频区| 成年人免费黄色播放视频| 国产激情久久老熟女| 婷婷成人精品国产| 最近最新中文字幕大全免费视频 | 亚洲国产av新网站| 丝袜脚勾引网站| 男女免费视频国产| 国语对白做爰xxxⅹ性视频网站| h视频一区二区三区| 一区在线观看完整版| 日韩一区二区三区影片| 天天躁夜夜躁狠狠久久av| 欧美国产精品va在线观看不卡| 中文字幕另类日韩欧美亚洲嫩草| 王馨瑶露胸无遮挡在线观看| 久久久久久久久久久免费av| 美女福利国产在线| 欧美人与善性xxx| 中国国产av一级| av视频免费观看在线观看| 国产精品免费大片| av在线app专区| 日韩制服骚丝袜av| 晚上一个人看的免费电影| 2022亚洲国产成人精品| 亚洲精品成人av观看孕妇| 久久精品人人爽人人爽视色| 一区二区三区四区激情视频| 欧美人与善性xxx| 色视频在线一区二区三区| 久久久欧美国产精品| 国产高清国产精品国产三级| 蜜桃在线观看..| 午夜激情久久久久久久| 黑人巨大精品欧美一区二区蜜桃 | 啦啦啦中文免费视频观看日本| 精品少妇黑人巨大在线播放| 丰满迷人的少妇在线观看| 亚洲国产精品999| 精品一区在线观看国产| 免费看不卡的av| 男女国产视频网站| 精品亚洲成a人片在线观看| 久久精品国产自在天天线| 欧美xxxx性猛交bbbb| 人人妻人人爽人人添夜夜欢视频| 一级a做视频免费观看| 亚洲丝袜综合中文字幕| 国产精品秋霞免费鲁丝片| 日日啪夜夜爽| 七月丁香在线播放| 久久久国产欧美日韩av| 国产男人的电影天堂91| 午夜免费观看性视频| av一本久久久久| 精品一区二区三卡| 欧美另类一区| 亚洲成av片中文字幕在线观看 | 国产一区亚洲一区在线观看| 国产色婷婷99| 免费av中文字幕在线| 国产精品不卡视频一区二区| 天堂8中文在线网| 岛国毛片在线播放| 18禁在线无遮挡免费观看视频| 你懂的网址亚洲精品在线观看| 五月天丁香电影| 亚洲精品日韩在线中文字幕| 亚洲精品成人av观看孕妇| 两性夫妻黄色片 | 你懂的网址亚洲精品在线观看| 五月天丁香电影| 男女边摸边吃奶| 国产亚洲精品久久久com| 亚洲图色成人| 桃花免费在线播放| 久热这里只有精品99| 多毛熟女@视频| 免费看不卡的av| 成人18禁高潮啪啪吃奶动态图| 另类亚洲欧美激情| 国产视频首页在线观看| 亚洲欧美成人精品一区二区| 国产精品一区二区在线不卡| 18禁国产床啪视频网站| 美女xxoo啪啪120秒动态图| 免费在线观看完整版高清| 欧美日韩视频高清一区二区三区二| 人妻一区二区av| 综合色丁香网| 欧美日本中文国产一区发布| xxxhd国产人妻xxx| 精品酒店卫生间| 高清av免费在线| 欧美变态另类bdsm刘玥| 成人影院久久| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 色5月婷婷丁香| 亚洲av电影在线观看一区二区三区| 97超碰精品成人国产| 国产精品女同一区二区软件| 精品少妇黑人巨大在线播放| 免费观看无遮挡的男女| 色94色欧美一区二区| 性色avwww在线观看| 亚洲第一区二区三区不卡| a级毛片黄视频| 日韩av在线免费看完整版不卡| 久久人人爽人人片av| 成人手机av| 午夜精品国产一区二区电影| 草草在线视频免费看| 在线亚洲精品国产二区图片欧美| 波多野结衣一区麻豆| 亚洲精品成人av观看孕妇| 1024视频免费在线观看| 51国产日韩欧美| 母亲3免费完整高清在线观看 | 制服丝袜香蕉在线| 日本欧美国产在线视频| 永久网站在线| 在线 av 中文字幕| 亚洲第一区二区三区不卡| 国产亚洲精品久久久com| 免费观看av网站的网址| 成人无遮挡网站| 免费观看在线日韩| 亚洲四区av|