• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient Forgery Detection Approaches for Digital Color Images

    2022-08-24 03:29:20AmiraBaumyAbeerAlgarniMahmoudAbdallaWalidElShafaiFathiAbdElSamieandNaglaaSoliman2
    Computers Materials&Continua 2022年5期

    Amira Baumy,Abeer D.Algarni,Mahmoud Abdalla,Walid El-Shafai,F(xiàn)athi E.Abd El-Samie,4 and Naglaa F.Soliman2,

    1Department of Communications,High Institute for Engineering and Technology,Al-Obour Obour City,Egypt

    2Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,Saudi Arabia

    3Department of Electronics and Communications Engineering,F(xiàn)aculty of Engineering,Zagazig University,Zagazig,Sharqia,44519,Egypt

    4Department of Electronics and Electrical Communications Engineering,F(xiàn)aculty of Electronic Engineering,Menoufia University,Menoufia,32952,Egypt

    5Security Engineering Lab,Computer Science Department,Prince Sultan University,Riyadh,11586,Saudi Arabia

    Abstract: This paper is concerned with a vital topic in image processing:color image forgery detection.The development of computing capabilities has led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks.Hence, there is an urgent need for developing efficient image forgery detection algorithms.Two main types of forgery are considered in this paper:splicing and copy-move.Splicing is performed by inserting a part of an image into another image.On the other hand, copy-move forgery is performed by copying a part of the image into another position in the same image.The proposed approach for splicing detection is based on the assumption that illumination between the original and tampered images is different.To detect the difference between the original and tampered images,the homomorphic transform separates the illumination component from the reflectance component.The illumination histogram derivative is used for detecting the difference in illumination, and hence forgery detection is accomplished.Prior to performing the forgery detection process, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, and single image super-resolution, are introduced to reinforce the details and changes between the original and embedded sections.The proposed approach for copy-move forgery detection is performed with the Speeded Up Robust Features (SURF) algorithm, which extracts feature points and feature vectors.Searching for the copied partition is accomplished through matching with Euclidian distance and hierarchical clustering.In addition, some preprocessing methods are used with the SURF algorithm, such as histogram equalization and single-mage super-resolution.Simulation results proved the feasibility and the robustness of the pre-processing step in homomorphic detection and SURF detection algorithms for splicing and copy-move forgery detection,respectively.

    Keywords: Image forgery; splicing algorithm; copy-move algorithm; histogram matching;homomorphic enhancement;SISR;SURF

    1 Introduction

    Security of the image content in the modern multimedia system is an issue of the primary concern of researchers in the last decade.Security of image content can be accomplished through several strategies such as watermarking,encryption,steganography,and image forgery detection.The basic idea of watermarking [1,2] and steganography [3,4] is to hide a secret message, signal, or image; in a cover image for conveying valuable information or owner copyright protection.The recent forgery detection algorithms[5–8]can be classified according to the types of image forgery.The most common algorithms are splicing algorithms and copy-move algorithms.These algorithms depend on different approaches such as Discrete Wavelet Transform (DWT), Local Binary Pattern (LBP), and Scale Invariant Feature Transform(SIFT).

    The main contribution of the paper is to apply the pre-processing techniques on the images before extracting the features and develop robust forgery detection methods for splicing and copy-move forgery attacks based on simple signal processing tools.The remainder of this paper is organized as follows.Section 2 introduces a related work to review the types of forgery and technologies used in image forgery detection.Section 3 illustrates the proposed pre-processing algorithms that are used to enhance the image and detection accuracy.Section 4 presents an efficient blind technique based on homomorphic transform for splicing forgery detection and a robust method to identify the forged regions in copy-move images using SURF key-point extraction.Section 5 presents the experimental results and performance evaluation.Finally,Section 6 introduces the concluding remarks and future works.

    2 Related Work

    Forensics is the science of discovering any attempts to change some sort of original data or images.Image forensics,which is the topic of our interest,includes changing the contents of digital images in an unauthorized manner.Image forensics analysis aims at discovering some forgeries in images,such as splicing forgery,copy-move forgery,and retouching forgery.So,forgery detection techniques aim to discover the existence of forgery manipulations.Different approaches have been adopted for forgery detection,such as passive and active approaches[8–10].Active forgery detection techniques work on the principles of embedding external information in the image,such as a watermark[11–13]or a digital signature[14–16].Verification is performed through the detection of the watermark or signature.

    The technique presented in [11] inserts the Computer-Generated Hologram (CGH) from the marked image into the host image.The CGH is defined as a numerical simulation of the natural phenomena of light interference and diffraction.Resizing operation is performed on the mark image according to two steps.First,the mark image is resized by a factor(1/64),then it is magnified to the size of the host image by adding zeros.Then, the Fourier transform is applied to the resized mark image to get the CGH.

    The algorithm in[12]decomposes the image into RGB components and applies 2-DWT for each component in the original image and mark image.The watermarked component is produced from the low-frequency components for the original image and mark image.Then inverse wavelet transform is used to produce the watermarked image.The watermark in[13]is obtained from the halftone model of the original image,and then it is inserted in the transform domain of the original image.Both DWT and Discrete Cosine Transform(DCT)are used to generate the watermarked image.

    As mentioned before, the second type of active technique depends on a digital signature.The technique in [14] produces a hash image with a Secure Hashing Algorithm (SHA-1) applied to the original image.Then,the hash image is encrypted by the Reed-Solomon Algorithm(RSA),a publickey algorithm,to get the signature.The length of the signature word equals 64 bytes.In parallel with the previous steps, the original image is encoded by Reed-Solomon (RS) code, and the signature is added to the encoded image to produce the encrypted image.Moreover,the technique enhances the randomness of the encrypted image using a chaotic logistic map.

    The algorithm in [15] divides the image into a fixed number of blocks equal to 32 blocks for a row and 32 blocks for a column.For any image, the length of blocks is changed, but the number is fixed.Next, a matrix of means for all blocks is calculated in a row direction and column direction.Then,the final signature is created from the XOR function applied to the two matrixes.The method in [16] extracts the low-frequency wavelet component from the image, and then an adaptive Harris corner detector is applied to get the feature points.For each feature point, the mean and variance are calculated from its neighborhood, and the signature matrix is composed of the point feature coordinates and their mean and variance.

    Passive forgery detection techniques depend on the signal or image itself for the detection of forgery.Similarity tools in statistics can be utilized with these techniques.Several studies have introduced a general survey[17–25]for different types of forgery techniques.In the copy-move technique[26–34],the copied parts share characteristics such as lighting conditions,background,and dynamic range with the rest of the images.So, forgery detection becomes more difficult.Several techniques have been investigated to detect the copy-move forgery.These techniques are classified into blockbased techniques or key-point-based techniques [19].Several algorithms start with preprocessing steps such as conversion between color systems, image enhancement, or noise removal.The feature extraction technique is the only difference between all approaches.The feature vectors should ensure a good representation of the images without losing any data.Then,matching is performed to get the duplication region by finding a high similarity between feature vectors.

    The key-points-based techniques such as SIFT[26–28]and SURF[29,30]are used to reduce the computational complexity.These techniques are not affected by scaling,rotation transformations and are robust to noise.SIFT key-point descriptors are used in[26]as feature vectors.Copy-move detection is improved in[27]by using local phase quantization to extract the texture information from the image before applying the SIFT.The DyWT decomposes the image,and then SIFT transform is applied on the LL sub-band to extract the feature descriptors[28].

    The dimension of the SIFT key-point feature vector is (1×128).So, the computational cost is slow.The use of integral images with a SURF key-point descriptor makes the computation of the descriptor faster than SIFT descriptor only,and the dimensions of the feature vector become(1×64).So, modern researches are directed to the use of SURF key points.SURF key points features are extracted,and their descriptors are matched with each other.

    Many matching techniques have been investigated in the literature, such as Euclidean distance[31], KD tree, and nearest neighbor.An agglomerative hierarchical clustering [32] is applied to the spatial locations of the matched points.The splicing forgery detection techniques aim at discovering the sudden changes between image parts.The algorithm in [33] has been presented to identify the change in the illuminant colors.A grey-world algorithm is used to estimate illuminant sub-bands,and a comparison is performed between them to locate the forged regions.The image[34]is converted from RGB to YCbCr components,and the chrominance component is divided into overlapping blocks.An LBP is calculated for each block,and then the DCT transform is applied on the resulting LBP blocks.Finally,the standard deviations are calculated for each block to build the feature vector.

    3 The Proposed Pre-Processing Techniques for Image Enhancement

    Image enhancement techniques are used in a pre-processing step in many applications such as medical and satellite image processing [35–37].Also, image enhancement can be used for forgery detection.It is used to increase the contrast between original and copied parts in any section of the image.The assumption upon which the enhancement is used in forgery detection is that any copied section in the image has a different illumination for that of the background.

    Image enhancement methods can be classified into spatial-domain and transform-domain methods [35–38].Spatial-domain methods depend on the direct manipulation of the pixels in the image.Transform-domain methods are used to enhance an image by processing in the selected transform domain.Spatial domain techniques are superior from the ease of implementation and speed perspectives.Therefore, only spatial-domain processing techniques will be discussed in this paper.Spatialdomain processing[35]is classified into point processing and mask processing.Point processing deals with the individual pixels only.It does not utilize the relation between pixels in the image.Unlike point processing,mask processing estimates the new pixel value from its original and neighborhood pixels.

    This section is devoted to the pre-processing techniques applied to the images before extracting the features to improve the forgery detection algorithms.As mentioned in the literature review, preprocessing is necessary for image forgery detection because it enhances the contrast between original and forged sections.We will develop efficient pre-processing techniques for forgery detection.These techniques include the utilization of high-pass filtering with histogram equalization,the combination between single image super-resolution and histogram equalization, and the decomposition with additive wavelet transform(AWT)and homomorphic image enhancement.

    3.1 High-Pass Filtering and Histogram Equalization

    This technique combines two stages:the high-pass filter and the histogram equalization[39].First,the image passes through the 2-D high-pass filter.Then, the high-pass filter detects the new highcontrast pixel values by processing the incoming image with a 3×3 convolution mask.The resulting images are sharper and contain more details.Eq.(1)shows the mask of the high-pass filter used in the proposed algorithm.The sum of the coefficients in a sharpening operator is also commonly taken to preserve amplitudes in regions of constant gray levels.

    After that, the histogram of the resulting image from the first stage is stretched through the spectrum (0 – 255) to increase the contrast of the images and provide more details.The normalized histogram can be estimated by the probability density function PDF mentioned in[39].

    3.2 Single Image Super-Resolution and Histogram Equalization

    The undesired motion may occur on the medium between the imaging system and the scene in many cases.This motion produces shifts between pixels and generates a low-resolution image.The missing information can be obtained from the generation of a high-resolution image.Also, several techniques are based on the assumption that the available low-resolution input images are produced by warping,blurring,or down-sampling of the high-resolution scene.High-resolution images are used in several applications such as medical image processing,satellite,and aerial imaging,fingerprint image enhancement,iris recognition,and text image enhancement.

    Super-resolution techniques are classified into two categories:multiple image super-resolution and example-based super-resolution.Multiple image super-resolution techniques depend on combining several images, and each image has different information of the same scene.Example-based superresolution techniques have databases formed by the correspondence between low-and high-resolution image patches.These techniques apply the learning rules between patches to find the missing data.The scaling up of the images leads to more image details by adding more pixels predicted by their neighbors.

    The main idea adopted in the Single Image Super-Resolution(SISR)algorithms is to use only the low-resolution images available[40,41].This means that the algorithm can generate a high-resolution image without the need for an external database.Super-resolution [40] needs only the original lowresolution image and its blurred versions.In this type of algorithm, first the image is up-sampled with bicubic interpolation, the algorithms depend on the down-sampled version and the deblurred version to obtain the required high-resolution image.Finally,Gaussian Process Regression(GPR)is used as a predictor for the new high-resolution image.The choice of the proper covariance function provides soft clustering of pixels for improvement of the edge recovery.The details of the single-image super-resolution technique are indicated in[40].It aims to increase the number of extracted features in test images.Increasing the resolution of an image gives more key points.So,the small-size forged regions can be detected.Also, good descriptors are obtained to improve the matching process.The block diagram of the proposed model is illustrated in Fig.1.It combines histogram equalization and SISR in the pre-processing step.

    Figure 1:Super-resolution with histogram equalization

    3.3 Homomorphic Enhancement with Additive Wavelet Transform

    A pre-processing technique based on the AWT is proposed for image enhancement.This technique begins with the decomposition of images by the AWT and then applies the homomorphic transform on each sub-band, as shown in Fig.2.Next, the AWT decomposes the image into different subbands,and each sub-band is enhanced with the homomorphic algorithm[42].In the final step,these homomorphic enhanced sub-bands are subjected to an inverse additive wavelet transform to get an image with better visual details.The homomorphic filtering technique is one of the most common ways used to improve the quality of digital images.It has been used in many imaging applications such as medical applications and robotic vision[39,42,43].

    Figure 2:The homomorphic enhancement pre-processing technique

    The steps of the enhancement method are shown in Fig.3 and can be explained as follows[44]:

    1) The images are decomposed intoR,G,Bcolor channels.

    2) For each channel,the wavelet sub-bandsw1,w2,w3,...,wncontain the detailed high-frequency components,and the approximation low-frequency componentINisgenerated.

    3) For each wavelet sub-band,the illumination and reflectance components are separated using a logarithmic operation.

    4) The reflectance and the illumination components are multiplied withα, andβ, respectively,whereα >1 andβ<1.

    5) An exponential function is applied to reconstruct each sub-band and then reconstruct the enhanced image.

    4 Proposed Forgery Detection Algorithms

    4.1 Proposed Splicing Forgery Detection with Homomorphic Technique

    The proposed technique aims at discriminating between the original and forgery images.It extracts the features from the histogram derivative for the illumination components.The homomorphic filtering separates the low-frequency illumination components from the high-frequency reflectance components of the image.This filtering technique can be implemented by applying a logarithm operation on the image to change the multiplication relation of illumination and reflectance to a sum relation.

    The illumination components can be separated using a low-pass filter applied on the logarithm of the image intensity as indicated in [39,42].On the other hand, the reflectance components can be produced using a high-pass filter.Firstly, the illumination histogram for authentic and forged images is differentiated,and then the Probability Density Functions(PDFs)are estimated for peaks of histogram derivatives for a set of images.Finally,the threshold is determined based on the PDFs for the histogram derivative peak distributions in the presence and absence of forgeries.The proposed technique relies heavily on determining the PDFs for each separated channel in two color models:IHS and RGB,and specifies the most sensitive channel for forgeries.The proposed model is implemented in two phases:the training phase and the testing phase.

    The proposed model can be implemented through the following steps.

    1) Choosing the training dataset and specifying the color system.

    2) Selection of original and tampered images from the dataset.

    3) Taking the logarithm of the image intensity.

    4) Getting the illumination components by utilization of a low-pass filter.

    5) Estimating the illumination histogram.

    6) Determining the absolute maximum of the derivative of the illumination histogram.

    7) For each set of the original and tampering images, the PDFs of the absolute peaks of the derivative histogram are estimated separately.

    8) Determining the forgery detection threshold.

    9) Testing this threshold with the testing dataset to obtain the performance of the proposed model.

    Figure 3:The block diagram of the AWT enhancement

    4.2 Proposed Copy-Move Forgery Detection with Pre-Processing and Speeded Up Robust Features Key-Points

    In this section,the SURF key points are utilized for the copy-move forgery detection.In addition,the Histogram equalization(HE)and SISR are applied as pre-processing techniques to improve the images before extracting the SURF key points to improve the copy-move forgery detection.

    SIFT is used for extracting the distinguishing invariant features from the images.The SIFT features present a powerful tool in many applications, such as reliable matching between different views of a 3-D scene and object recognition in computer vision.Furthermore,SIFT transform provides robust,reliable features to photometric changes such as scaling,rotation,distortion,and addition of noise.There are four main steps for extracting SIFT features:scale-space extrema detection,key-point localization,orientation assignment,and key-point descriptor.In this paper,the SURF technique is used for reducing the time cost of computations and feature matching,which is the main advantage of using it.More explanation of the SURF is provided in[29].

    Fig.4 introduced the block diagram of the proposed model that aims to increase the number of extracted features in test images.Increasing the resolution of an image gives more key points.So,the small-size forged regions can be detected.Also,good descriptors are obtained to improve the matching process.

    Figure 4:The proposed SURF-based technique for forgery detection

    The matching process for a test image is performed as follows;a set of key-pointsS={s1,s2,s3,...,sn} with their corresponding SURF descriptorsF{f1,f2,f3,...,fn} is extracted.Then, a matching process is performed in the SURF space among the vectors F of each key-point to identify similar local patches in the test image.

    Euclidean distance[44]is proposed to find the best candidate match for each key point.Similar local patches are determined with minimum Euclidean distance and minimum threshold(th1)[45].The threshold(th1)lies between 0 and 1.Ifth1is set to a value closer to 0,the results will be highly corrected but with fewer matches.Ifth1is set to a value closer to 1,the results will have more matches,but they will be lower correct,increasing the number of false matches.The Euclidean distance is defined by:

    So,agglomerative hierarchical clustering is used to neglect the false matches and find the matched descriptors.Then,groups of close descriptors are combined together.The hierarchical clustering(HC)algorithm[46]starts by assigning each key point to a cluster;then,it computes all the reciprocal spatial distances among clusters,finds the closest pair of clusters,and finally merges them into a single cluster.Such computation is repeated until a final merging scenario is achieved.Then,the matching process is performed on clusters.

    5 Simulation Results and Performance Evaluation

    5.1 Simulation Setup

    Two datasets have been used to test the proposed homomorphic algorithm.The first is a realistic database composed of 70 original images and 70 tampered images.Images are subdivided into the training data consisting of 15 original images and 15 tampered images.The testing data contains 55 original images and 55 tampered images.The Photoshop program has been used to generate the tampered images.The tampered images have been generated by tacking a copy of an image part from an image and pasting this part into another image.

    The second database is CASIA 2.0 v2[47].This database contains samples of spliced color images of different sizes.It comprises 120 original images and 120 tampered images sub-divided into 20 original images and 20 tampered images for training and 100 original images and 100 tampered images for testing.

    5.2 Performance Evaluation for Image Splicing Forgery Detection Algorithm

    In the first simulation experiment, each RGB and IHS system have examined the proposed detection algorithm.The performance of the proposed model has been determined by the calculation of the True Positive Rate (TPR), which is defined as the sensitivity, the True Negative Rate (TNR),which is defined as the specificity,the False Positive Rate(FPR),and the Accuracy.These metrics are estimated with Eqs.(3)–(6).Sensitivity is related to the ability of the algorithm to detect a tampered image correctly as being tampered.Specificity is associated with the ability of the algorithm to identify an authentic image correctly as authentic.Hence,high values of sensitivity and specificity imply the better performance of the system,where:

    ·TP(True Positive):Tampered image successfully detected as being tampered.

    ·FP(False Positive):Authentic image detected as being tampered.

    ·TN(True Negative):Authentic image successfully detected as authentic.

    ·FN(False Negative):Forged image detected as authentic.

    A comparison among red,green,blue,and intensity channels for the manually obtained dataset is shown in Tab.1.The red channel gives the highest accuracy,equals 90.A comparison among red,green, blue channels for the CASIA dataset is shown in Tab.2.Blue channel achieves the highest accuracy of 74.5%.

    Table 1:Comparison between red-green-blue channels and intensity channels on the first dataset

    Table 2:Comparison between red-green-blue channels on the CASIA dataset

    In the second simulation experiment, the effect of pre-processing on the proposed detection algorithm is tested.Pre-processing techniques are utilized to enhance the visual quality of the image.In addition,it helps in forgery detection as the details of tampered regions in the images are reinforced.The pre-processing operations applied with the proposed model are High pass filter (HPF), HE,Histogram Matching(HM),and SISR.

    The proposed enhancement approach for forgery detection has been tested on the CASIA dataset[47], and each channel of the RGB system has been used.A comparison between pre-processing techniques for forgery detection on the different channels is given in Tabs.3–5.The feasibility of using different pre-processing techniques is illustrated in the results.The accuracy is increased with all pre-processing techniques except the high-pass filtering.The specificity with a blue channel is increased from 71% to 76%.This may be attributed to the smaller wavelength range of the green channel compared to the red and green channels,as shown in Fig.5.This performance of the forgery detection process with high-pass filtering can be explained based on the idea of the operation of the high-pass filtering process.The high-pass filter can be used to make the image sharper and emphasize fine details in the image, but it attenuates the low-frequency components of the image, and it also amplifies noise.It is obvious to note that HE gives the highest accuracy from all tested techniques.The accuracy on the red channel is increased from 68%to 83%.The accuracy on the green channel is increased from 68.5%to 82.5%,and on the blue channel,from 74.5%to 82%.The reason is that the histogram equalization stretches the dynamic range of the image,and hence all details of forgery can be enlarged.

    The high-pass filter and histogram equalization are combined together for the enhancement of the forgery detection process.Tab.6 shows the effect of HPF with HE on red,green,blue channels for the second dataset[47].The accuracy on the red channel is increased from 68%to 85.5%.All channels achieve close values of accuracy.

    Table 3:Forgery detection results with pre-processing techniques on the red channel

    Table 4:Forgery detection results with pre-processing techniques on the green channel

    Table 5:Forgery detection results with pre-processing techniques on the blue channel

    SISR is combined with HE as a pre-processing technique to enhance the forgery detection results.A comparison of forgery detection performance with and without pre-processing on red, green,and blue channels is given in Tab.7.The accuracy of forgery detection on red, green, and blue channels indicates the effect of pre-processing;therefore,clear discrimination between the tampered and original images is provided.In addition, the combination between resolution enhancement and histogram equalization increased the accuracy of forgery detection from green,blue,and red channels to 79.5%,80.5%,and 78.5%from 68.5%,74.5%,and 68%,respectively.

    Figure 5:The wavelength range of red,green,and blue channels in the RGB color system

    Table 6:Forgery detection results from all channels with the HPF and HE combined technique

    Table 7:Results of SISR and HE pre-processing technique on red,green,and blue channels

    Table 7:Continued

    Finally,the homomorphic enhancement is tested in the AWT Domain for forgery detection.The simulation experiments have been performed on the blue channels with variable values ofαandβas weighing factors of the enhancement process to test the performance of the proposed enhancement algorithm.The results of the experiments are given in Tab.8.The range ofβis started from 0.8 to 0.99,and the range ofαstarts from 1.2 to 2.Both sensitivity and specificity vary with the change ofαandβ.The accuracy is increased from 77%to 83.5%.The best results are obtained withβset to 0.99 andαset to 2.

    After applying homomorphic enhancement in the AWT domain on each sub-band performance for red,green,and blue channels on the second dataset,the simulation results are given in Tab.9.The accuracy results on the green,blue,and red channels indicate the proposed pre-processing benefit.The combination between AWT and homomorphic transform increases the accuracy values on red,green,and blue channels to 73.5%,79%,and 83.5%from 68%,68.5%,and 74.5%.

    5.3 Performance Evaluation for Copy Move Based on SURF Forgery Detection Algorithm

    The SURF-based algorithm has been evaluated on two datasets:MICC_F600[48]and CoMoFoD[49].MICC-F220 contains copy-move color images of different sizes.This database is composed of 110 original images and 110 tampered images.The CoMoFoD database consists of 40 original images and 200 tampered images.The size of the images is 512×512.This dataset has small size forgeries and multiple forgeries.

    Fig.6 shows the effect of different pre-processing techniques on the tampered image 002-F from the CoMoFoD database.The number of key points is increased from 192 using SURF without pre-processing to 6219 after applying histogram equalization and single-image super-resolution.Histogram equalization produces the largest number of discriminative key-points because it increases the contrast between pixels,as shown in Fig.6c.

    Tab.10 introduces a comparison of applying HE,SISR,and a hybrid algorithm of HE and SISR for the number of extracted key points for four images in MICC_F600 datasets.It can be noted that the hybrid algorithm of HE and SISR gives a better investigation of key points.In addition,the performance of the hybrid algorithm has been tested on 40 images selected from the CoMoFoD database.Finally,the TPR is measured as shown in Tab.11.The results prove that the combination of histogram equalization and single-image super-resolution enhances the TPR from 57.5%to 85%.

    Table 8:Effect of changing β and α on the forgery detection performance from the blue channel

    Table 9:Forgery detection results with and without homomorphic enhancement in the AWT domain from all channels

    The copied part in the image may be rotated,scaled,and modified before being pasted in another region.The SURF algorithm is tested against rotation,scaling,distortion,and combination between these operations,as shown in Fig.7.It is clear that the pre-processing gives more reliable results with each operation.The overall accuracy is calculated for two datasets,and the results are shown in Fig.8.The accuracy on the MICC_F220 dataset is 99%,and the accuracy on the CoMoFoD database dataset is 92.5%.

    Figure 6:Key-points extraction from an image with forgery(002-F)from CoMoFoD database(a)The image with forgery(002_F),(b)SURF key-points,(c)Key-points after HE,(d)Key-points after SISR,(e)Key-points after HE and SISR,(f)The MH features

    Table 10:Comparison between numbers of key-points at different pre-processing algorithms

    Table 11:TPR values of the proposed SURF-based technique for 40 images

    Figure 7:Comparison of SURF-based forgery detection with and without pre-processing in the presence of some manipulations of copied areas

    Figure 8:Performance evaluation of the proposed SURF-based algorithm on two different datasets

    6 Conclusion and Future Work

    The main motivation behind this rese arch was the enhancement of image forgery detection performance.This paper discussed two types of image forgery algorithms:copy-move forgery and splicing forgery.These algorithms presented effective and robust models to discriminate between tampered images and authentic images.The enhancement based on pre-processing stages is used to reinforce the details of the images before the forgery detection process.The detail reinforcement process can achieve high classification accuracy.In this paper, high-pass filtering, histogram equalization,resolution enhancement, and adaptive wavelet transform are used individually and in combination as pre-processing stages.

    For the splicing forgery, image pre-processing and homomorphic enhancement presented an efficient image forgery detection model.The illumination component is semi-constant in normal images,and hence the histogram of the illumination is close to a single-valued histogram.Otherwise,if there is a forgery in the image, it is expected that due to making some mixes with the image, the lighting conditions may differ,and hence the illumination component may have abrupt changes that are reflected in its histogram as an abnormal change.Abnormal changes can be detected through the first-order derivative;however,there is no large effect on the reflectance component.

    Different tampered and untampered image sets have been used for the test.The proposed algorithms have been tested using the different channels of the RGB system, and the detection threshold is determined for each.The blue channel gave the maximum detection accuracy of 74.5%for the proposed detection algorithm without pre-processing.Nevertheless, the detection accuracy became 85.5%after high-pass filtering and histogram equalization.High-pass filtering and histogram equalization pre-processing combined significantly affect the red channel results as the detection accuracy changed from 68%to 85.5%.Moreover,homomorphic enhancement in the AWT domain led to an accuracy of 100%from the red channel.The resolution enhancement pre-processing technique gave a small change in the detection accuracy,and the detection accuracy became 78.5%.

    Image pre-processing and SURF-based feature extraction constituted a robust and effective image forgery detection model for the copy-move forgery.The HE and SISR are employed before extracting the SURF key-points to improve the accuracy of the copy-move forgery detection process.This strategy aims to increase the number of SURF key points to efficiently discover the copied regions.As a result,the true positive rate is improved from 64%to 85%.The true positive rate with pre-processing and SURF-based detection has been investigated against scaling, rotation, and distortion attacks.In addition, histogram equalization and single-image super-resolution together with SURF-based detection achieved good results in the presence of copied segment manipulations.In future work,the proposed forgery detection algorithms can be examined for video and other multimedia data formats.

    Acknowledgement:The authors would like to thank the support of the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University through the Fast-track Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    热re99久久精品国产66热6| 亚洲一区二区三区欧美精品| 美女视频免费永久观看网站| 中文字幕精品免费在线观看视频 | 一边亲一边摸免费视频| 91aial.com中文字幕在线观看| 天堂中文最新版在线下载| 亚洲精品一二三| 18禁观看日本| 久久精品夜色国产| 久久 成人 亚洲| 丰满乱子伦码专区| 亚洲美女视频黄频| 视频在线观看一区二区三区| 亚洲成av片中文字幕在线观看 | 少妇的逼好多水| 精品久久久久久电影网| freevideosex欧美| 最近最新中文字幕大全免费视频 | 极品少妇高潮喷水抽搐| 好男人视频免费观看在线| 男女高潮啪啪啪动态图| 女人精品久久久久毛片| av网站免费在线观看视频| 蜜桃在线观看..| 一级爰片在线观看| a级毛片黄视频| 熟女人妻精品中文字幕| 最近的中文字幕免费完整| 亚洲欧美中文字幕日韩二区| 97人妻天天添夜夜摸| 国产精品一区www在线观看| 亚洲欧美一区二区三区国产| 欧美成人午夜精品| 在线观看www视频免费| 少妇 在线观看| 久久久久精品性色| 天堂8中文在线网| 日本vs欧美在线观看视频| 国产极品天堂在线| 亚洲成色77777| 亚洲精华国产精华液的使用体验| 乱人伦中国视频| 久久久久国产精品人妻一区二区| 亚洲 欧美一区二区三区| 一边亲一边摸免费视频| 日韩不卡一区二区三区视频在线| 欧美亚洲 丝袜 人妻 在线| 人人澡人人妻人| 欧美bdsm另类| 一级片免费观看大全| 欧美日韩综合久久久久久| 久久婷婷青草| 乱码一卡2卡4卡精品| 99久久人妻综合| 女的被弄到高潮叫床怎么办| 人妻系列 视频| 99久久精品国产国产毛片| 成人漫画全彩无遮挡| 国产国拍精品亚洲av在线观看| 桃花免费在线播放| 欧美bdsm另类| 中文字幕人妻熟女乱码| 久久99蜜桃精品久久| 最近最新中文字幕大全免费视频 | 国产淫语在线视频| 国产爽快片一区二区三区| 国产精品久久久久久精品电影小说| 91精品伊人久久大香线蕉| 精品一区在线观看国产| 大片电影免费在线观看免费| 99久久中文字幕三级久久日本| 女人精品久久久久毛片| 久久久久精品久久久久真实原创| 哪个播放器可以免费观看大片| 国产极品天堂在线| 亚洲精品乱码久久久久久按摩| 成人毛片60女人毛片免费| 国产精品一区二区在线观看99| 99re6热这里在线精品视频| 日韩在线高清观看一区二区三区| 成年女人在线观看亚洲视频| 免费少妇av软件| 新久久久久国产一级毛片| 999精品在线视频| 啦啦啦啦在线视频资源| 欧美人与性动交α欧美软件 | 精品一区二区三卡| 久久久久久人妻| 啦啦啦啦在线视频资源| 美女国产高潮福利片在线看| 亚洲精品国产av成人精品| 99久久综合免费| 久久精品久久精品一区二区三区| 久久久久人妻精品一区果冻| 亚洲国产欧美在线一区| 日韩伦理黄色片| 国产精品一国产av| 街头女战士在线观看网站| 国产极品粉嫩免费观看在线| 欧美精品人与动牲交sv欧美| 国产精品久久久久久久电影| 久久鲁丝午夜福利片| 成人亚洲精品一区在线观看| 夫妻性生交免费视频一级片| 看十八女毛片水多多多| 亚洲性久久影院| 国产av一区二区精品久久| h视频一区二区三区| 男人添女人高潮全过程视频| 一区二区日韩欧美中文字幕 | 免费在线观看完整版高清| 一级爰片在线观看| 夜夜爽夜夜爽视频| 久久婷婷青草| 赤兔流量卡办理| 巨乳人妻的诱惑在线观看| 涩涩av久久男人的天堂| 久久精品国产鲁丝片午夜精品| 丝袜喷水一区| 男女无遮挡免费网站观看| av视频免费观看在线观看| 午夜免费观看性视频| 国产淫语在线视频| 国产精品人妻久久久久久| 久久精品aⅴ一区二区三区四区 | 少妇猛男粗大的猛烈进出视频| 成人18禁高潮啪啪吃奶动态图| 国产精品一区二区在线不卡| 久久久久久久精品精品| 91精品国产国语对白视频| 久久 成人 亚洲| 亚洲高清免费不卡视频| 老司机亚洲免费影院| 欧美丝袜亚洲另类| 国产无遮挡羞羞视频在线观看| 免费黄网站久久成人精品| av在线老鸭窝| 午夜福利视频在线观看免费| av在线app专区| 国产女主播在线喷水免费视频网站| videosex国产| 国产男女超爽视频在线观看| 亚洲成人av在线免费| 一级毛片黄色毛片免费观看视频| 黑丝袜美女国产一区| 女人久久www免费人成看片| 人成视频在线观看免费观看| 日本免费在线观看一区| 大陆偷拍与自拍| 大陆偷拍与自拍| 欧美精品一区二区大全| 国产精品一国产av| 亚洲av成人精品一二三区| 久久久久视频综合| 多毛熟女@视频| 国产视频首页在线观看| 97在线视频观看| 精品一区在线观看国产| av一本久久久久| 天堂8中文在线网| 亚洲情色 制服丝袜| 久久国产亚洲av麻豆专区| 在线 av 中文字幕| 又黄又粗又硬又大视频| 亚洲成人手机| 国内精品宾馆在线| 超碰97精品在线观看| 国产色爽女视频免费观看| 色5月婷婷丁香| 男女免费视频国产| 亚洲熟女精品中文字幕| 欧美精品国产亚洲| 热re99久久国产66热| 激情视频va一区二区三区| 天天影视国产精品| 黄色配什么色好看| 亚洲精品日韩在线中文字幕| 国产精品国产三级国产av玫瑰| 日日摸夜夜添夜夜爱| 99久久综合免费| 欧美人与性动交α欧美软件 | 99re6热这里在线精品视频| 国产免费现黄频在线看| 最近中文字幕2019免费版| 成人毛片a级毛片在线播放| 丝袜人妻中文字幕| 观看av在线不卡| 亚洲欧洲国产日韩| 亚洲国产av新网站| 一本色道久久久久久精品综合| 国产成人精品婷婷| 丰满迷人的少妇在线观看| 观看美女的网站| 高清不卡的av网站| 欧美 亚洲 国产 日韩一| 最近2019中文字幕mv第一页| 天堂俺去俺来也www色官网| 欧美 日韩 精品 国产| 高清在线视频一区二区三区| 涩涩av久久男人的天堂| 人妻 亚洲 视频| 欧美激情极品国产一区二区三区 | 日本av手机在线免费观看| 高清不卡的av网站| 成人无遮挡网站| 下体分泌物呈黄色| 欧美成人精品欧美一级黄| 亚洲精品一区蜜桃| 少妇被粗大的猛进出69影院 | 中文欧美无线码| 精品一区二区三区四区五区乱码 | 国产女主播在线喷水免费视频网站| 永久免费av网站大全| 视频在线观看一区二区三区| 欧美精品一区二区免费开放| 日韩制服骚丝袜av| 一级毛片电影观看| 亚洲色图综合在线观看| 亚洲欧美清纯卡通| 秋霞在线观看毛片| av线在线观看网站| 日韩电影二区| 亚洲精品美女久久久久99蜜臀 | 大陆偷拍与自拍| 亚洲成人av在线免费| 91国产中文字幕| 亚洲国产精品专区欧美| 日本猛色少妇xxxxx猛交久久| 精品少妇久久久久久888优播| 五月天丁香电影| 亚洲成人一二三区av| 国产精品麻豆人妻色哟哟久久| 人妻 亚洲 视频| 看十八女毛片水多多多| 国产永久视频网站| 一区二区av电影网| 国产亚洲最大av| 久久97久久精品| 亚洲精品成人av观看孕妇| 狠狠精品人妻久久久久久综合| 在线 av 中文字幕| 国产爽快片一区二区三区| 人妻 亚洲 视频| 老司机影院毛片| 欧美bdsm另类| 制服人妻中文乱码| 91精品国产国语对白视频| 青春草国产在线视频| 午夜影院在线不卡| 精品酒店卫生间| 久久免费观看电影| 亚洲综合色惰| 亚洲av电影在线观看一区二区三区| 国语对白做爰xxxⅹ性视频网站| 婷婷成人精品国产| 精品视频人人做人人爽| 亚洲人成77777在线视频| 日韩一本色道免费dvd| 中国三级夫妇交换| 免费观看性生交大片5| 国产精品一二三区在线看| 精品国产一区二区三区四区第35| 亚洲国产日韩一区二区| 超色免费av| 七月丁香在线播放| 校园人妻丝袜中文字幕| 国产精品一区www在线观看| 欧美成人午夜免费资源| 国产探花极品一区二区| 国产极品天堂在线| 天堂8中文在线网| 成人二区视频| 免费在线观看完整版高清| 欧美人与性动交α欧美精品济南到 | 又大又黄又爽视频免费| 国产视频首页在线观看| 精品国产国语对白av| 99热全是精品| 国产免费又黄又爽又色| videosex国产| 中文欧美无线码| 毛片一级片免费看久久久久| 黄网站色视频无遮挡免费观看| 成年动漫av网址| av网站免费在线观看视频| 菩萨蛮人人尽说江南好唐韦庄| 久久青草综合色| 高清毛片免费看| 在线天堂最新版资源| 国产精品人妻久久久影院| 亚洲综合精品二区| 久久久a久久爽久久v久久| 日本-黄色视频高清免费观看| 自拍欧美九色日韩亚洲蝌蚪91| 曰老女人黄片| 久久久欧美国产精品| 亚洲美女黄色视频免费看| 人人妻人人添人人爽欧美一区卜| 三上悠亚av全集在线观看| 热99久久久久精品小说推荐| 中文天堂在线官网| 少妇的丰满在线观看| videossex国产| 丝袜在线中文字幕| 午夜免费观看性视频| 精品国产一区二区三区久久久樱花| 最新的欧美精品一区二区| 久久久久视频综合| 丰满少妇做爰视频| 纯流量卡能插随身wifi吗| 国产精品不卡视频一区二区| 精品人妻偷拍中文字幕| 十分钟在线观看高清视频www| 啦啦啦视频在线资源免费观看| 青春草国产在线视频| 久久国产精品男人的天堂亚洲 | 国产一区二区在线观看av| 久久精品久久精品一区二区三区| 在线亚洲精品国产二区图片欧美| 人妻一区二区av| 亚洲av中文av极速乱| www.熟女人妻精品国产 | 日本-黄色视频高清免费观看| 国产成人免费观看mmmm| 国产成人a∨麻豆精品| 99久久人妻综合| 成人亚洲欧美一区二区av| 国产极品粉嫩免费观看在线| 日本爱情动作片www.在线观看| 久久久久久人妻| 波野结衣二区三区在线| 久久久久久久久久久久大奶| 最近最新中文字幕免费大全7| 最近手机中文字幕大全| 啦啦啦啦在线视频资源| 久久鲁丝午夜福利片| 七月丁香在线播放| 国产精品一区www在线观看| 赤兔流量卡办理| 69精品国产乱码久久久| 国语对白做爰xxxⅹ性视频网站| 丝袜喷水一区| 在线免费观看不下载黄p国产| 男人添女人高潮全过程视频| 成人毛片60女人毛片免费| 五月玫瑰六月丁香| 在现免费观看毛片| 成年女人在线观看亚洲视频| 国产福利在线免费观看视频| 国产亚洲午夜精品一区二区久久| 少妇熟女欧美另类| 精品少妇黑人巨大在线播放| 视频区图区小说| 一二三四中文在线观看免费高清| 晚上一个人看的免费电影| www.av在线官网国产| 精品国产乱码久久久久久小说| av卡一久久| 秋霞伦理黄片| 亚洲美女黄色视频免费看| 亚洲国产最新在线播放| 午夜视频国产福利| 成年人免费黄色播放视频| 街头女战士在线观看网站| 高清不卡的av网站| 亚洲av在线观看美女高潮| 欧美精品一区二区大全| 校园人妻丝袜中文字幕| 亚洲国产成人一精品久久久| 成年美女黄网站色视频大全免费| av天堂久久9| 自线自在国产av| 国产永久视频网站| 日日爽夜夜爽网站| 在线观看一区二区三区激情| 久久99蜜桃精品久久| 咕卡用的链子| 久久国产精品男人的天堂亚洲 | 国产亚洲午夜精品一区二区久久| 亚洲精品第二区| 久久精品国产亚洲av涩爱| 免费观看a级毛片全部| 亚洲精品久久午夜乱码| 久久久久久人妻| 中文字幕另类日韩欧美亚洲嫩草| 欧美日韩视频高清一区二区三区二| 亚洲国产毛片av蜜桃av| 大香蕉久久成人网| 国产av国产精品国产| 伊人久久国产一区二区| 精品国产一区二区三区久久久樱花| 少妇的丰满在线观看| 国产 精品1| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产深夜福利视频在线观看| 国产精品久久久久久久电影| 午夜久久久在线观看| 国产精品久久久久久久久免| 99国产综合亚洲精品| 日本猛色少妇xxxxx猛交久久| 人妻系列 视频| 色94色欧美一区二区| 国产国拍精品亚洲av在线观看| 欧美xxxx性猛交bbbb| 久久精品国产亚洲av涩爱| 亚洲av.av天堂| 国产 精品1| 久久精品人人爽人人爽视色| 男女边吃奶边做爰视频| 天堂俺去俺来也www色官网| 全区人妻精品视频| 成人影院久久| 亚洲第一av免费看| 免费不卡的大黄色大毛片视频在线观看| 欧美 日韩 精品 国产| 永久免费av网站大全| 国产免费一区二区三区四区乱码| 精品视频人人做人人爽| 最近最新中文字幕免费大全7| 性色av一级| 日韩人妻精品一区2区三区| 热re99久久国产66热| 亚洲性久久影院| 成人影院久久| 80岁老熟妇乱子伦牲交| 一本—道久久a久久精品蜜桃钙片| 国产精品一二三区在线看| 日韩熟女老妇一区二区性免费视频| 日韩制服骚丝袜av| 国产精品99久久99久久久不卡 | 人人澡人人妻人| 久热这里只有精品99| 18禁裸乳无遮挡动漫免费视频| 黄色 视频免费看| 高清黄色对白视频在线免费看| 一区二区三区乱码不卡18| 国产欧美亚洲国产| 久久午夜综合久久蜜桃| 巨乳人妻的诱惑在线观看| 久久这里只有精品19| 国产亚洲一区二区精品| av网站免费在线观看视频| 好男人视频免费观看在线| 亚洲性久久影院| 一边亲一边摸免费视频| 国产深夜福利视频在线观看| 欧美亚洲 丝袜 人妻 在线| 在现免费观看毛片| 大香蕉久久网| 91久久精品国产一区二区三区| 国产高清三级在线| 少妇被粗大猛烈的视频| 妹子高潮喷水视频| 黄色一级大片看看| 青青草视频在线视频观看| 亚洲三级黄色毛片| 亚洲国产av新网站| 超碰97精品在线观看| 久久久亚洲精品成人影院| 我要看黄色一级片免费的| 久久精品人人爽人人爽视色| 人人妻人人添人人爽欧美一区卜| 午夜免费男女啪啪视频观看| 69精品国产乱码久久久| 美女视频免费永久观看网站| 国产精品国产三级专区第一集| 九色亚洲精品在线播放| 最近最新中文字幕大全免费视频 | 9191精品国产免费久久| 欧美老熟妇乱子伦牲交| 成人国语在线视频| www日本在线高清视频| 成人免费观看视频高清| 亚洲欧美日韩卡通动漫| 久久久久久久久久成人| 亚洲精品国产色婷婷电影| 国产精品久久久av美女十八| 菩萨蛮人人尽说江南好唐韦庄| 欧美亚洲日本最大视频资源| 1024视频免费在线观看| 大香蕉97超碰在线| videosex国产| 黄色怎么调成土黄色| 宅男免费午夜| 国产精品三级大全| h视频一区二区三区| 一本—道久久a久久精品蜜桃钙片| 久热久热在线精品观看| 亚洲精品自拍成人| 99久国产av精品国产电影| 成人亚洲欧美一区二区av| 亚洲 欧美一区二区三区| kizo精华| 多毛熟女@视频| 美女中出高潮动态图| 18禁裸乳无遮挡动漫免费视频| 内地一区二区视频在线| 欧美日韩视频精品一区| 男女边摸边吃奶| 日韩欧美精品免费久久| 90打野战视频偷拍视频| 国产免费视频播放在线视频| 国产在线视频一区二区| 精品第一国产精品| 久久久欧美国产精品| 午夜激情久久久久久久| av在线老鸭窝| 七月丁香在线播放| 日日啪夜夜爽| 草草在线视频免费看| 亚洲精品456在线播放app| 欧美精品一区二区免费开放| 超碰97精品在线观看| 街头女战士在线观看网站| 久久久精品区二区三区| 黄片无遮挡物在线观看| 国产精品一二三区在线看| 只有这里有精品99| 激情视频va一区二区三区| 亚洲av国产av综合av卡| 侵犯人妻中文字幕一二三四区| 日韩一本色道免费dvd| 免费日韩欧美在线观看| 国产熟女欧美一区二区| 大片免费播放器 马上看| 久久久久国产网址| 亚洲情色 制服丝袜| 国产不卡av网站在线观看| 黑人猛操日本美女一级片| 午夜免费观看性视频| 日韩av免费高清视频| 亚洲第一av免费看| 国产欧美另类精品又又久久亚洲欧美| 国产亚洲精品第一综合不卡 | 欧美3d第一页| 亚洲精品,欧美精品| 青春草国产在线视频| 大香蕉久久成人网| 激情视频va一区二区三区| 超色免费av| 国产精品一二三区在线看| 超色免费av| 国产亚洲一区二区精品| 欧美亚洲 丝袜 人妻 在线| 成人二区视频| 最黄视频免费看| 纯流量卡能插随身wifi吗| 中文字幕人妻熟女乱码| 欧美成人精品欧美一级黄| 婷婷色综合大香蕉| 国产精品久久久久久久久免| 国产熟女午夜一区二区三区| 女人被躁到高潮嗷嗷叫费观| 精品久久久久久电影网| 天天躁夜夜躁狠狠躁躁| 精品一区二区三区四区五区乱码 | 欧美日韩国产mv在线观看视频| 肉色欧美久久久久久久蜜桃| 欧美国产精品va在线观看不卡| 午夜福利网站1000一区二区三区| 日韩免费高清中文字幕av| 大话2 男鬼变身卡| 九色亚洲精品在线播放| 丝袜人妻中文字幕| 婷婷色av中文字幕| av福利片在线| 黑人巨大精品欧美一区二区蜜桃 | 国产色爽女视频免费观看| 九色成人免费人妻av| 在线观看免费视频网站a站| 久久久久人妻精品一区果冻| 国产在线视频一区二区| 嫩草影院入口| 肉色欧美久久久久久久蜜桃| a级毛片黄视频| 亚洲激情五月婷婷啪啪| 黄色视频在线播放观看不卡| 蜜臀久久99精品久久宅男| 国产精品国产三级国产专区5o| 91aial.com中文字幕在线观看| 男人舔女人的私密视频| 极品人妻少妇av视频| 高清在线视频一区二区三区| 99久久中文字幕三级久久日本| 国产色爽女视频免费观看| 国产一区亚洲一区在线观看| 国产色爽女视频免费观看| 五月玫瑰六月丁香| 亚洲国产看品久久| 国产国拍精品亚洲av在线观看| 亚洲三级黄色毛片| 色哟哟·www| 欧美变态另类bdsm刘玥| 人人澡人人妻人| 岛国毛片在线播放| 好男人视频免费观看在线| 中文字幕人妻丝袜制服| 美女国产高潮福利片在线看| 男女下面插进去视频免费观看 | 亚洲成人av在线免费| 国产精品99久久99久久久不卡 | 国产又爽黄色视频| 久久热在线av| 亚洲av电影在线进入| 精品一区二区三区视频在线| 只有这里有精品99| 久久久久久久大尺度免费视频| av片东京热男人的天堂| av视频免费观看在线观看| 久久韩国三级中文字幕| 欧美日韩一区二区视频在线观看视频在线| 熟女人妻精品中文字幕| 香蕉国产在线看| 91成人精品电影|