Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 15 - 2019

No.1 January 2019
No.1 January 2019
No.2 February 2019
No.2 February 2019
No.3 March 2019
No.3 March 2019
No.4 April 2019
No.4 April 2019
No.5 May 2019
No.5 May 2019
No.6 June 2019
No.6 June 2019

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018
No.9 September 2018
No.9 September 2018
No.10 October 2018
No.10 October 2018
No.11 November 2018
No.11 November 2018
No.12 December 2018
No.12 December 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

 

Colorized Image Forgery Detection based on Similarity Measurement of Gaussian Mixture Distribution

Volume 14, Number 3, March 2018, pp. 445-452
DOI: 10.23940/ijpe.18.03.p5.445452

Ze Yanga, Jianhou Ganb, Juxiang Zhoub, Bin Wena, and Jun Wangb

aCollege of Computer Science and Technology, Yunnan Normal University, Kunming, 650500, China
bKey Laboratory of Education Informalization for Nationalities of Ministry of Education, Yunnan Normal University, Kunming, 650500, China

(Submitted on December 8, 2017; Revised on January 16, 2018; Accepted on February 17, 2018)


Abstract:

In the era of rapid development of multi-media information, forgery detection has become an important research field of digital image security. This paper proposes a new method to detect the forged image generated by deep learning. First, the feature matrix is constructed through extracting each pixel value of channels a and b in Lab color space for the real and the forged image training set, respectively, which is used to fit the Gaussian Mixture Model (GMM) distribution. Then, the Expectation Maximization (EM) adaptation algorithm is used to re-fit the GMM for test image using the obtained GMM parameter as prior information. Finally, the similarity between two GMM is calculated for forgery detection. Experiments show that the proposed method is more accurate than the traditional SVM for forgery detection.

 

References: 13

  1. J. Deng, W. Dong, R Socher, et al, “ImageNet: a Large-Scale Hierarchical Image Database” in Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 2009:248-255.
  2. H. Farid, S. Lab, “Creating and detecting doctored and virtual images: Implications to the Child Pornography Prevention Act [J]. 2004.
  3. J. R. Hershey, P. A. Olsen, “Approximating the Kullback-Leibler Divergence Between Gaussian Mixture Models” in IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2007: IV-317 - IV-320.
  4. W.R. Howard, “Pattern Recognition and Machine Learning”, [M]. Springer, 2006.
  5. E. Luo, S. H. Chan, T. Q. Nguyen, “Adaptive Image Denoising by Mixture Adaptation” in IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 2016, 25(10):4489-4503.
  6. R. L. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” in Communications of the ACM, 1983, 26(2):96-99.
  7. P. Sutthiwan, Y. Q. Shi, J. Dong, et al, “New Developments in Colour Image Tampering Detection” in IEEE International Symposium on Circuits and Systems. IEEE, 2010:3064-3067.
  8. V. Thirunavukkarasu, J. S. Kumar, “Passive Image Tamper Detection Based on Fast Retina Key Point Descriptor” in IEEE International Conference on Advances in Computer Applications. IEEE, 2017:279-285.
  9. N. Vasconcelos, P. Ho, P. Moreno, “The Kullback-Leibler Kernel as a Framework for Discriminant and Localized Representations for Visual Recognition” in Computer Vision - ECCV 2004. DBLP, 2004:430-441.
  10. Y. E. Xi, “Blind Image Tamper Detection Algorithm Based on Radon and Fourier-Mellin Transform” in Signal Processing, 2010:212-215.
  11. J. M. Yang, T. Q. Huang, W. J. Jiang, “Splicing Image Tamper Detection Based on Human Face Colour Temperature” in Journal of Shandong University, 2013.
  12. J. Zhong, Y. Gan, J. Young, et al, “Copy Move Forgery Image Detection via Discrete Radon and Polar Complex Exponential Transform-Based Moment Invariant Features”, in International Journal of Pattern Recognition and Artificial Intelligence, 2017, 31(02): 1754005.
  13. R. Zhang, P. Isola, A. A. Efros, “Colourful Image Colorization” in European Conference on Computer Vision. Springer, Cham, 2016:649-666.

 

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

 

CURRENT ISSUE

Prev Next

Degradation Index Extraction and Degradation Trend Prediction for Rolling Bearing

Xin Zhang, Jianmin Zhao, Xianglong Ni, Haiping Li, and Fucheng Sun

Read more

Explore One Factor of Affecting Software Reliability Demonstration Testing Result

Zhenyu Ma, Wei Wu, Wei Zhang, Jianping Wang, and Fusheng Liu

Read more

On-Condition Maintenance Decision on EMU Bogie

Yonghua Li, Hongjie Yu, Yuehua Gao, and Xiaojia Liang

Read more

Lubrication Characteristics Analysis of a Rotor Bearing for Space Application

Shouqing Huang, Shouwen Liu, Xiaokai Huang, and Fangyong Li

Read more

Analog Circuit Fault Prognostic Approach using Optimized RVM

Chaolong Zhang, Yigang He, Shanhe Jiang, Lanfang Zhang, and Xiaolu Wang

Read more

Speech Enhancement Algorithms with Adaptive Methods

Chunli Wang, Peiyi Yang, Quanyu Wang, Lili Niu, and Huaiwei Lu

Read more

Edge Detection Method based on Lifting B-Spline Dyadic Wavelet

Zhibin Hu, Caixia Deng, Yunhong Shao, and Cui Wang

Read more

Word Sense Disambiguation based on Maximum Entropy Classifier

Chunxiang Zhang, Xuesong Zhou, Xueyao Gao, and Bo Yu

Read more
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com