Title: A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection

Authors: Jonathan Goh; Vrizlynn L.L. Thing

Addresses: Cyber Security and Intelligence Department, Institute for Infocomm Research, Singapore ' Cyber Security and Intelligence Department, Institute for Infocomm Research, Singapore

Abstract: The detection of the presence of tampered images is of significant importance in digital forensics. The problem with image tampering detection is the vast number of features that are currently available in the literature. It is very challenging to determine the best features to correctly characterise these images. This paper proposes a hybrid evolutionary framework to perform a quantitative study to evaluate all features in image tampering for the best feature set. Upon feature evaluation and selection, the classification mechanism must be optimised for good performance. Therefore, in addition to being able to determine an optimal set of features for a classifier, the hybrid framework is capable of determining the optimal multiple classifier ensembles while achieving the best classification performance in terms of low complexity and high accuracy for image tampering detection. Using a training dataset of only 5% of the dataset, we were able to obtain accuracies of 90.18% on a CASIA 1 dataset with 1,457 test images, 96.21% on a CASIA 2 dataset with 10,200 and 94.64% on a combined CASIA 1 and 2 dataset with 11,657 testing images. The experiment result shows that our image tampering detection can support large-scale digital image evidence authenticity verification with consistent good accuracy.

Keywords: image forgery; evolutionary algorithms; optimal feature selection; multiple classifiers; ensemble selection; image tampering detection; digital forensics; digital images; image authenticity verification.

DOI: 10.1504/IJESDF.2015.067996

International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.1, pp.76 - 104

Received: 22 Jul 2014
Accepted: 03 Nov 2014

Published online: 11 Mar 2015 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article