2-Levels of clustering strategy to detect and locate copy-move forgery in digital images

Faculty Computer Science Year: 2020
Type of Publication: ZU Hosted Pages:
Authors:
Journal: MULTIMEDIA TOOLS AND APPLICATIONS springer Volume:
Keywords : 2-Levels , clustering strategy , detect , locate copy-move    
Abstract:
Understanding is considered a key purpose of image forensic science in order to find out if a digital image is authenticated or not. It can be a sensitive task in case images are used as necessary proof as an impact judgment. it's known that There are several different manipulating attacks but, this copy move is considered as one of the most common and immediate one, in which a region is copied twice in order to give different information about the same scene, which can be considered as an issue of information integrity. The detection of this kind of manipulating has been recently handled using methods based on SIFT. SIFT characteristics are represented in the detection of image features and determining matched points. A clustering is a key step which always following SIFT matching in-order to classify similar matched points to clusters. The ability of the image forensic tool is represented in the assessment of the conversion that is applied between the two duplicated images of one region and located them correctly. Detecting copy-move forgery is not a new approach but using a new clustering approach which has been purposed by using the 2-level clustering strategy based on spatial and transformation domains and any previous information about the investigated image or the number of clusters need to be created is not necessary. Results from different data have been set, proving that the proposed method is able to individuate the altered areas, with high reliability and dealing with multiple cloning.
   
     
 
       

Author Related Publications

  • Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019 More
  • Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014 More
  • Mohammed Abdel Basset Metwally Attia, "A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems", Springer London, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient binary slime mould algorithm integrated with a novel attacking-feeding strategy for feature selection", Pergamon, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient teaching-learning-based optimization algorithm for parameters identification of photovoltaic models: Analysis and validations", Pergamon, 2021 More

Department Related Publications

  • Hosam Rada mohamed abdel megeed hawash, "Federated Threat-Hunting Approach for Microservice-Based Industrial Cyber-Physical System", IEEE, 2022 More
  • Hosam Rada mohamed abdel megeed hawash, "Explainability of artificial intelligence methods, applications and challenges: A comprehensive survey", Elsevier Inc, 2022 More
  • Hosam Rada mohamed abdel megeed hawash, "STLF-Net: Two-stream deep network for short-term load forecasting in residential buildings", Elsevier, 2022 More
  • Mustafa Khamis Baz Ramadan, "An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making", An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making, 2017 More
  • Ibrahiem Mahmoud Mohamed Elhenawy, "Applying apache spark on streaming big data for health status prediction", TECH SCIENCE PRESS, 2022 More
Tweet