一种基于GLCM和KNN的图像伪造检测新方法

Kazi Sultana Farhana Azam, Farhin Farhad Riya, S. Al Mamun, Md.Shamim Kaiser
{"title":"一种基于GLCM和KNN的图像伪造检测新方法","authors":"Kazi Sultana Farhana Azam, Farhin Farhad Riya, S. Al Mamun, Md.Shamim Kaiser","doi":"10.1109/ICICT4SD50815.2021.9397057","DOIUrl":null,"url":null,"abstract":"Photos have been utilized to report day-time occasions. They have frequently served as proof in audience chamber, in spite of the fact that picture takers are adequate to form composites of analogy images. This preparation is exceptionally pace expending and desires master information. Nowadays, in any case, effective computerized picture altering program makes picture adjustments direct. This undercuts our beliefs in photos and in specific investigation of images as prove for real universal vents. There are two sorts of methods for picture forensics: one is dynamic security, and the other is detached discovery. The most sorts of Picture imitation procedures are Picture Spicing; Copy-Move fraud is utilized mainly to examine the tempered photos. As the imitation of pictures proliferates day-by-day, it is indispensable to develop apparatuses for distingue between genuine and tempered images; therefore, we plan to analyze the copy-move imitation. This paper has proposed a combined method of feature collection using GLCM and training with KNN. Our method has given an 85.42% of accuracy level compared with other states of art papers in image forgery detection.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Novel Approach of Detecting Image Forgery Using GLCM and KNN\",\"authors\":\"Kazi Sultana Farhana Azam, Farhin Farhad Riya, S. Al Mamun, Md.Shamim Kaiser\",\"doi\":\"10.1109/ICICT4SD50815.2021.9397057\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Photos have been utilized to report day-time occasions. They have frequently served as proof in audience chamber, in spite of the fact that picture takers are adequate to form composites of analogy images. This preparation is exceptionally pace expending and desires master information. Nowadays, in any case, effective computerized picture altering program makes picture adjustments direct. This undercuts our beliefs in photos and in specific investigation of images as prove for real universal vents. There are two sorts of methods for picture forensics: one is dynamic security, and the other is detached discovery. The most sorts of Picture imitation procedures are Picture Spicing; Copy-Move fraud is utilized mainly to examine the tempered photos. As the imitation of pictures proliferates day-by-day, it is indispensable to develop apparatuses for distingue between genuine and tempered images; therefore, we plan to analyze the copy-move imitation. This paper has proposed a combined method of feature collection using GLCM and training with KNN. Our method has given an 85.42% of accuracy level compared with other states of art papers in image forgery detection.\",\"PeriodicalId\":239251,\"journal\":{\"name\":\"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT4SD50815.2021.9397057\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT4SD50815.2021.9397057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

照片被用来报告白天的情况。他们经常在观众席上充当证据,尽管拍照者足以形成类比图像的合成物。这种准备是非常快速的,需要掌握信息。如今,无论如何,有效的计算机图像修改程序使图像调整直接。这削弱了我们对照片的信念,以及对图像的具体研究证明了真正的普遍喷口。图像取证有两种方法:一种是动态安全,另一种是分离发现。图片模仿的程序种类最多的是图片调味;复制-移动欺诈主要用于检查篡改后的照片。随着对图片的模仿日益增多,开发区分真假图像的设备是必不可少的;因此,我们计划分析复制-移动模仿。本文提出了一种结合GLCM和KNN训练的特征采集方法。该方法在图像伪造检测中,与其他技术水平相比,准确率达到了85.42%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Novel Approach of Detecting Image Forgery Using GLCM and KNN
Photos have been utilized to report day-time occasions. They have frequently served as proof in audience chamber, in spite of the fact that picture takers are adequate to form composites of analogy images. This preparation is exceptionally pace expending and desires master information. Nowadays, in any case, effective computerized picture altering program makes picture adjustments direct. This undercuts our beliefs in photos and in specific investigation of images as prove for real universal vents. There are two sorts of methods for picture forensics: one is dynamic security, and the other is detached discovery. The most sorts of Picture imitation procedures are Picture Spicing; Copy-Move fraud is utilized mainly to examine the tempered photos. As the imitation of pictures proliferates day-by-day, it is indispensable to develop apparatuses for distingue between genuine and tempered images; therefore, we plan to analyze the copy-move imitation. This paper has proposed a combined method of feature collection using GLCM and training with KNN. Our method has given an 85.42% of accuracy level compared with other states of art papers in image forgery detection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信