141
Views
5
CrossRef citations to date
0
Altmetric
Research Article

Copy-move forgery detection of digital images using football game optimization

&
Pages 258-279 | Received 20 Jun 2020, Accepted 12 Aug 2020, Published online: 05 Nov 2020
 

ABSTRACT

Copy move forgery (CMF) of digital images is the frequently adapted tampering by simply copying a region of the image and pasting it on to the same image using user-friendly image processing tools. Most of the existing key-point (KP) based CMF detection algorithms involve a hefty number of KPs and huge sets of feature descriptors, which increase their computational burden. In addition, the identified KPs may not spread over all regions of the image and the classical clustering techniques may not optimally classify the feature space into cluster space, thereby affecting the accuracy of the results. This paper suggests a new CMF detection method that considers a small number of the strongest KPs, chosen from both Difference of Gaussian (DoG)-based KPs and FAST-corner KPs, evaluates Scale Invariant Features Transform (SIFT) descriptors, applies discrete wavelet transform for dimensionality reduction, and employs football game based optimization (FGBO). The FGBO belongs to the family of meta-heuristic optimization algorithms, and is used for effectively classifying the feature space into cluster space, with a view to overcoming the drawbacks of classical methods. This article exhibits the superior performances of the developed method over existing methods by presenting results on 500 digital images.

Acknowledgments

The authors thankfully acknowledge the administrative officers of Annamalai University for the computing and internet facilities provided to perform this work.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.