The use of textural descriptors were useful in the present work, which are calculated based on the Haralick features for image tempering using the Extreme Learning Machine (ELM). This method was applied to color images after converting it into YCbCr color system, and then the image is divided into blocks in order to apply the Local Binary Pattern (LBP) on each block belongs to each resulted color band. The textural features are then computed and encoded for the target image to be stored in a database file for that reconstructed image. The computed features enter the ELM classifier to carry out the processes of the training and classification. The training was performed on CASSIA-II dataset while testing was performed on CASSIA-I. The classification results gave a test accuracy of tempering detection about 99.7% when using the Y-band, 99.7% when using the Cb band, and 99.4% when using the Cr band. Whereas, the evaluation of the test results was good compared to previous work, this confirms the validity of the results and ensure the correct path of the proposed method.

1.
B.
Liu
,
C. M.
Pun
, and
X. C.
Yuan
, “
Digital image forgery detection using JPEG features and local noise iscrepancies
,”
Sci. World J.
,
2014
, doi: .
2.
D.
Sharma
and
P.
Abrol
, “
Digital Image Tampering – A Threat to Security Management
,”
Int. J. Adv. Res. Comput. Commun. Eng.
,
2013
.
3.
W.
Wang
,
J.
Dong
, and
T.
Tan
, “
A Survey of Passive Image Tampering Detection
,” pp.
308
309
,
2009
.
4.
F.
Cao
,
B.
Liu
, and
D. Sun
Park
, “
Image classification based on effective extreme learning machine
,”
eurocomputing
, vol.
102
, pp.
90
97
,
2013
, doi: .
5.
S.
Kumar
,
J.
Desai
, and
S.
Mukherjee
, “
A fast DCT based method for copy move forgery detection
,”
2013 IEEE 2nd Int. Conf. Image Inf. Process. IEEE ICIIP 2013
, pp.
649
654
,
2013
, doi: .
6.
D. A.
Mendoza
, “
Digital Forensics Method for Image Tampering Detection
,”
2017
.
7.
M.
Sridevi
,
C.
Mala
, and
S.
Sanyam
, “
Comparative study of image forgery and copy-move techniques
,” in
Advances in Intelligent and Soft Computing
,
2012
, doi: .
8.
G.
Bin Huang
,
Q. Y.
Zhu
, and
C. K.
Siew
, “
Extreme learning machine: Theory and applications
,”
Neurocomputing
,
2006
, doi: .
9.
A.
Akusok
,
K. M.
Bjork
,
Y.
Miche
, and
A.
Lendasse
, “
High-Performance Extreme Learning Machines: A Complete Toolbox for Big Data Applications
,”
IEEE Access
, vol.
3
, pp.
1011
1025
,
2015
, doi: .
10.
A. F. M.
Agarap
, “
Deep Learning using Rectified Linear Units (ReLU
),”
arXiv
, no.
1
, pp.
2
8
,
2018
.
11.
Y. F.
Hsu
and
S. F.
Chang
, “
Camera response functions for image forensics: An automatic algorithm for splicing detection
,”
IEEE Trans. Inf. Forensics Secur.
,
2010
, doi: .
12.
W.
Wang
,
J.
Dong
, and
T.
Tan
, “
Image tampering detection based on stationary distribution of Markov chain
,” in
Proceedings - International Conference on Image Processing, ICIP
,
2010
, doi: .
13.
L.
Verdoliva
,
D.
Cozzolino
, and
G.
Poggi
, “
A feature-based approach for image tampering detection and localization
,” in
2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014
,
2015
, doi: .
14.
W.
Li
,
Y.
Yuan
, and
N.
Yu
, “
Passive detection of doctored JPEG image via block artifact grid extraction
,”
Signal Processing
, vol.
89
, no.
9
, pp.
1821
1829
,
2009
, doi: .
15.
L.
Bondi
,
S.
Lameri
,
D.
Guera
,
P.
Bestagini
,
E. J.
Delp
, and
S.
Tubaro
, “
Tampering Detection and Localization Through Clustering of Camera-Based CNN Features
,” in
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops
,
2017
, doi: .
16.
P.
Singh
, “
Correlation Based Image Tampering Detection
,” no. November,
2017
.
17.
E. González
Fernández
,
A. L. Sandoval
Orozco
,
L. J. García
Villalba
, and
J.
Hernandez-Castro
, “
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts
,”
Sensors (Basel).
,
2018
, doi: .
18.
R.
Agarwal
and
M.
Pant
, “
Image tampering detection using genetic algorithm
,”
MATEC Web Conf.
,
2019
, doi: .
19.
X.
Shen
,
Z.
Shi
, and
H.
Chen
, “
Splicing image forgery detection using textural features based on the grey level co-occurrence matrices
,”
IET Image Process.
,
2017
, doi: .
20.
J. D.
Chang
,
B. H.
Chen
, and
C. S.
Tsai
, “
LBP-based fragile watermarking scheme for image tamper detection and recovery
,” in
ISNE 2013 - IEEE International Symposium on Next-Generation Electronics 2013
,
2013
, doi: .
21.
D. P.
Mohapatra
and
S.
Patnaik
, “
Preface
,”
Adv. Intell. Syst. Comput.
, vol.
243
, p.
V
,
2014
, doi: .
This content is only available via PDF.
You do not currently have access to this content.