An Efficient CNN Model to Detect Copy-Move Image Forgery

Faculty Computer Science Year: 2022
Type of Publication: ZU Hosted Pages: 48622 - 48632
Authors:
Journal: IEEE Access IEEE Volume: 10
Keywords : , Efficient , Model , Detect Copy-Move Image Forgery    
Abstract:
Recently, digital images have become used in many applications, where they have become the focus of digital image processing researchers. Image forgery represents one hot topic on which researchers prioritize their studies. We concentrate on the copy-move image forgery topic as a deceptive forgery type. In copy-move image forgery, a part of an image is copied and placed in the same image to produce the forgery image. In this paper, an accurate convolutional neural network(CNN) architecture is proposed for the effective detection of copy-move image forgery. The proposed architecture is computationally lightweight with a suitable number of convolutional and max-pooling layers. We also present a fast and accurate testing process with 0.83 seconds for every test. Many empirical experiments have been conducted to ensure the efficiency of the proposed model in terms of accuracy and time. These experiments were done on benchmark datasets and have achieved 100% accuracy.
   
     
 
       

Author Related Publications

  • Khalied Mohamed Hosny, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Khalied Mohamed Hosny, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Khalied Mohamed Hosny, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Khalied Mohamed Hosny, "Fast computation of accurate Zernike moments", Springer, 2008 More
  • Khalied Mohamed Hosny, "Accurate Computation of QPCET for Color Images in Different Coordinate Systems", SPIE, 2017 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet