GRAPHICS PROCESSING UNIT BASED PARALLEL...

26
GRAPHICS PROCESSING UNIT BASED PARALLEL COPY MOVE IMAGE FORGERY DETECTION SCHEME AHMAD UWAYS BIN ZULKURNAIN A project report submitted in partial fulfilment of the requirements for the award of the degree of Master of Computer Science (Information Security) Faculty of Computing Universiti Teknologi Malaysia JANUARY 2015

Transcript of GRAPHICS PROCESSING UNIT BASED PARALLEL...

Page 1: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

GRAPHICS PROCESSING UNIT BASED PARALLEL COPY MOVE IMAGEFORGERY DETECTION SCHEME

AHMAD UWAYS BIN ZULKURNAIN

A project report submitted in partial fulfilment of therequirements for the award of the degree of

Master of Computer Science (Information Security)

Faculty of ComputingUniversiti Teknologi Malaysia

JANUARY 2015

Page 2: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

iii

To my family, especially my wife, Noridah, for unending support she has given me and

my son, Ihsan, for inspiring me to improve. They are my motivation.

Page 3: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

iv

ACKNOWLEDGEMENT

Thank you to Dr. Mohd Fo’ad Rohani for his guidance, support andunderstanding. He is extremely accommodating and sincere in helping me completethe project.

Thank you to my wife and parents for their support. Without them, I could nothave completed this project.

Finally, thank you to all my course mates who have given me feedback andwere gracious enough to share their knowledge which helped me successfully executethis project.

I would also like to thank the developers of the utmthesis LATEX project formaking the thesis writing process a lot easier for me. Thanks to them, I could focuson the content of the thesis, and not waste time with formatting issues. Those guys areawesome.

Page 4: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

v

ABSTRACT

In digital image forensics, an important area of research is forgery detection.Copy-move forgery is a specific type of image tampering where a part of the imageis copied and pasted on some other part of the same image. Currently, robust copymove image forgery detection techniques are complex and face the problem of highcomputation time. CPU based and partial GPU based versions of copy move imageforgery detection schemes currently exist, but parallelization can be improved tofurther reducing computation time. In this project, a fully GPU based detection schemewas designed and developed to achieve improved performance. In addition, this projectuses counting bloom filters instead of radix sort for detecting duplicated image regions.To compare counting bloom filters with radix sort for duplicate detection, a detectionscheme which supports both techniques is developed. The effectiveness of countingbloom filter is tested for robustness against copy move image forgeries with addedpost-processing and geometric transformations. The developed GPU based scheme isfive times faster than multi-threaded CPU implementations for the feature extractionprocess while counting bloom filters performed 18 times faster than radix sort induplicate detection. The scheme also achieves 84% detection rate. No false positiveswere detected by the scheme.

Page 5: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

vi

ABSTRAK

Dalam forensik imej digital, salah satu bidang penting dalam penyelidikanadalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenisteknik pengubahan imej tertentu di mana sebahagian daripada imej disalin dandialihkan ke bahagian lain dalam imej yang sama. Kaedah mantap untuk mengesanpemalsuan secara salin dan tampal dalam imej digital yang kini wujud adalahkompleks dan menghadapi masalah masa pengiraan yang tinggi. Skim pengesananberasaskan CPU sepenuhnya dan separa berasaskan GPU bagi pengesanan pemalsuanimej secara salin dan tampal telah dibangunkan, tetapi penyelarian masih bolehdiperbaiki untuk mengurangkan masa pengiraan. Projek ini mereka bentuk danmembina sebuah skim pengesanan berasaskan GPU sepenuhnya untuk mencapaiprestasi yang lebih baik. Di samping itu, projek ini menggunakan counting bloom

filter sebagai alternatif kepada penyusunan radix untuk mengesan kawasan imej yanghampir sama. Untuk membandingkan counting bloom filter dengan penyusunanradix dalam proses mengenal pasti ciri imej berpadanan, satu skim pengesanan yangmenyokong kedua-dua teknik dibangunkan. Keberkesanan counting bloom filter diujiuntuk ketegapan terhadap pemalsuan imej secara salin dan tampal dengan penambahanpasca pemprosesan dan transformasi geometri kawasan imej yang disalin. Skimberasaskan GPU yang dibangunkan lima kali lebih pantas daripada pelaksanaan CPUuntuk proses pengekstrakan ciri manakala counting bloom filter 18 kali lebih pantasdaripada penyusunan radix dalam pengesanan pendua. Skim ini juga mencapai 84%kadar pengesanan. Tiada pengesanan palsu berlaku dengan skim tersebut.

Page 6: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

vii

TABLE OF CONTENTS

CHAPTER TITLE PAGE

DECLARATION iiDEDICATION iiiACKNOWLEDGEMENT ivABSTRACT vABSTRAK viTABLE OF CONTENTS viiLIST OF TABLES xiiLIST OF FIGURES xiiiLIST OF ABBREVIATIONS xivLIST OF SYMBOLS xvLIST OF APPENDICES xvi

1 INTRODUCTION 11.1 Introduction 11.2 Problem Background 31.3 Problem Statement 51.4 Research Questions 51.5 Project Aim 61.6 Project Objectives 61.7 Project Scope 61.8 Importance of Project 71.9 Thesis Organization 7

2 LITERATURE REVIEW 92.1 Introduction 92.2 Previous Works 102.3 Block based Methods 11

2.3.1 Moment-based 11

Page 7: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

viii

2.3.1.1 Principal Component Transfor-mation with Blur Moment In-variants 11

2.3.1.2 Gaussian Pyramid with Hu Mo-ments 12

2.3.1.3 Scale Invariant Feature Trans-form and Zernike Moments 12

2.3.2 Dimensionality reduction-based 122.3.2.1 Principal Component Analysis

and Singular Value Decomposi-tion 13

2.3.2.2 Discrete Wavelet Transform andKernel Principal ComponentAnalysis 13

2.3.2.3 Principal Component Analysis-Eigen Value Decomposition 13

2.3.3 Intensity-based 142.3.3.1 Additive White Gaussian Noise 142.3.3.2 Color Dependent Feature Vec-

tors with One Dimensional De-scriptors 14

2.3.3.3 Relative Intensity 152.3.4 Frequency-based 15

2.3.4.1 Discrete Cosine Transform 152.3.4.2 Discrete Wavelet Transform 162.3.4.3 Fourier Mellin Transform 162.3.4.4 Polar Harmonic Transform 172.3.4.5 Discrete Curvelet Transform 17

2.3.5 Others 172.4 Comparison of Block Based Detection Schemes 182.5 Current Issues 18

2.5.1 Robustness against Post-Processing andGeometric Transformations 18

2.5.2 Computation Time 202.5.3 Standardization of Datasets 212.5.4 Duplicate Matching 21

2.6 Components of Block Based Algorithms 212.6.1 Image Segmentation 222.6.2 Block Feature Representation 22

Page 8: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

ix

2.6.3 Forgery Detection Techniques 232.6.3.1 Radix Sort 232.6.3.2 Counting Bloom Filters 24

2.7 Parallelization Efforts on CPU 252.8 Parallelization on GPU 26

2.8.1 Data Management 272.8.2 Parallelization Models 272.8.3 Research Direction 28

2.9 Summary 28

3 RESEARCH METHODOLOGY 303.1 Introduction 303.2 Research Flow 313.3 Research Framework 323.4 Designing a Copy Move Image Forgery Detection

Scheme 323.4.1 Image Segmentation 323.4.2 Determination of Feature Extraction

Technique 343.4.3 Determination of Feature Extraction Pa-

rameters 343.5 Determination of Dataset 35

3.5.1 Existing Datasets 353.5.2 Self-built Dataset 363.5.3 Selection and Rationale 363.5.4 Image Selection 373.5.5 Image Manipulation 37

3.6 Development of prototype 383.7 Integration of Radix Sort and Counting Bloom

Filters 383.8 Experimental Setup 383.9 Experimental Procedure 39

3.9.1 Similarity Analysis using Radix Sort 393.9.2 Similarity Analysis using Counting

Bloom Filters 393.10 Results Comparison 39

3.10.1 Detection Rate 403.10.2 Detection Positive Rate 403.10.3 Speed 40

Page 9: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

x

3.11 Summary 41

4 DESIGN AND IMPLEMENTATION 424.1 Introduction 424.2 CPU/GPU Architecture 424.3 Image Segmentation 444.4 Feature Extraction 44

4.4.1 Image Sub-channel Calculation 454.4.2 Discrete Cosine Transform 454.4.3 Quantization 46

4.5 Counting Bloom Filter 474.5.1 Duplicate Detection 474.5.2 Thresholds 484.5.3 Noise Removal 49

4.6 Final Forgery Decision 494.7 Summary 49

5 RESULTS AND ANALYSIS 515.1 Introduction 515.2 Execution Time 51

5.2.1 Feature Extraction 525.2.2 Practical Improvements 52

5.3 Forgery Detection 535.3.1 Impact of Memory Consumption 54

5.4 Detection Rate and Robustness 545.4.1 Partial Detection 555.4.2 Noisy Detection 565.4.3 JPEG Compression 565.4.4 Rotation and Scaling 57

5.5 Strengths and Weaknesses of Detection Scheme 595.6 Importance of Forgery Decision Mechanism 605.7 Summary 60

6 CONCLUSIONS AND FUTURE WORK 616.1 Introduction 616.2 Achievements 616.3 Contributions 626.4 Limitations 62

Page 10: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

xi

6.5 Concluding Remarks 626.6 Recommendation for Future Work 64

REFERENCES 65Appendices A – H 68 – 85

Page 11: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

xii

LIST OF TABLES

TABLE NO. TITLE PAGE

2.1 Comparison of Block Based Copy Move Image ForgeryDetection Schemes 19

3.1 Overview of Project Framework 335.1 Copy Move Forgery Detection Counts 56

Page 12: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

xiii

LIST OF FIGURES

FIGURE NO. TITLE PAGE

1.1 Copy Move Image Forgery Detection Process 22.1 Copy Move Image Forgery Detection Approaches 102.2 Most Significant Digit (MSD) Radix Sort 242.3 Counting Bloom Filter 253.1 The Research Flow 314.1 Detection Scheme 434.2 Design for Counting Bloom Filter 474.3 Preliminary Detection Result 494.4 Detection Result After Density Check 504.5 Final Forgery Detection 505.1 Feature Extraction Times For Images of Different Sizes 525.2 Duplicate Detection Times Using Radix Sort And Bloom

Filter 535.3 Copy Move Forgery Detection Samples and Results 555.4 Partial Detection of Image Forgery 575.5 Noisy Detection of Image Forgery 585.6 Detection Results with Various JPEG Compression Levels 59A.1 Project 1 Gantt Chart 68A.2 Project 2 Gantt Chart 69B.1 Original Image 70B.2 Copy Move Forged Image 70B.3 Copy Moved Regions 70B.4 Copy Moved Pixels 71B.5 Spliced Region 1 71B.6 Spliced Region 2 71

Page 13: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

xiv

LIST OF ABBREVIATIONS

AWGN – Additive White Gaussian Noise

CASIA – Institute of Automation, Chinese Academy of Sciences

CPU – Central Processing Unit

CUDA – Compute Unified Device Architecture

DCT – Discrete Cosine Transform

DWT – Discrete Wavelet Transform

DyWT – Dyadic Wavelet Transform

FFT – Fast Fourier Transform

FMT – Fourier-Mellin Transform

GPU – Graphics Processing Unit

I/O – Input/Output

IMD – Image Manipulation Dataset

IPC – Instructions Per Cycle

JPEG – Joint Photographic Experts Group

KPCA – Kernel Principal Component Analysis

LBP – Local Binary Pattern

LSD – Least Significant Digit

MIMD – Multiple Instruction, Multiple Data

MSD – Most Significant Digit

PCA – Principal Component Analysis

PCA-EVD – Principal Component Analysis-Eigen Value Decomposition

PCT – Principal Component Transformation

PHT – Polar Harmonic Transform

QCD – Quantized Coefficient Decomposition

SIFT – Scale Invariant Feature Transform

SVD – Singular Value Decomposition

Page 14: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

xv

LIST OF SYMBOLS

b – Block size

r – Radius

M – Image dimension

N – Alternate image dimension

Rdetection – Detection rate

Rfalse – False detection rate

x – X-coordinate of image

y – Y-coordinate of image

p – Pixel

Y ′ – Luma channel

R′ – Red channel

G′ – Green channel

B′ – Blue channel

G – DCT coefficient matrix

Q – Quantization matrix

B – Quantized coefficient matrix

Page 15: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

xvi

LIST OF APPENDICES

APPENDIX TITLE PAGE

A Gantt Chart Project 1 and Gantt Chart Project 2 68B Image Manipulation Dataset Sample Image 70C GPU Kernel 72D Discrete Cosine Transform 74E Counting Bloom Filter Implementation Using std::map 78F Duplicate Detection 80G Noise Removal Algorithm 82H Hash Function 84

Page 16: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

CHAPTER 1

INTRODUCTION

1.1 Introduction

Image forgery detection is needed to prevent alteration of images and restoresome trust in digital images (Farid, 2009). It is applied in areas such as journalism,digital forensic science, and surveillance systems (Gupta, Saxena and Vasistha, 2013).The availability of powerful image processing and editing software makes it easyto create, alter, and manipulate digital images (Fridrich, Soukal and Lukas, 2003).With that, the issue of verifying the authenticity and integrity of digital images isbecoming increasingly important. There are two categories of image forgery detectiontechniques: active and passive. Active, also known as intrusive, detection techniquesrequire a form of digital signature to be embedded in the image at the instance ofits creation. However, not all digital devices are able to implant such signatureswhen capturing images (Muhammad et al., 2011). On the other hand, passive, alsoreferred to as non-intrusive or blind, approaches examine the image blindly withoutreliance on any embedded information. Although a passive approach has wider scopeof usefulness, it is a computationally expensive process (Khan and Kulkarni, 2010).

Copy-move forgery is one of the tampering methods used to manipulate digitalimages. It is done by duplicating a region of the original image and pasting it ontoanother region of the same image. Various methods have been proposed to passivelydetect copy move image forgery. There are two main categories of approach forcopy move image forgery detection: block based and keypoint based. Block basedapproaches identify image features based on local image regions whereas keypointbased approaches identify feature descriptions of objects within the image. This projectwill focus on block based approaches and the issues specific to this class of copy moveimage forgery detection.

Page 17: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

2

The purpose of block based copy move image forgery detection is to avoidan exhaustive comparison of pixels, which is impractical for large images whichare made up of millions of pixels. Segmenting the image into blocks reduces thenumber of features which need to be compared. In order to produce small but accuraterepresentation of blocks, many feature extraction techniques have been proposed suchas Discrete Cosine Transform (DCT) (Fridrich et al., 2003), Principal ComponentAnalysis (PCA) (Farid and Popescu, 2004), Discrete Wavelet Transform (DWT)(Bashar et al., 2010), Singular Value Decomposition (SVD) (Ting and Rang-ding,2009), and Fourier-Mellin Transform (FMT) (Bayram et al., 2009). Some hybrids andsub-variations of the aforementioned techniques have also been proposed. Althoughmany approaches have been proposed, there are still issues that need to be solved.

Before the issues that exist in block based approaches to copy move imageforgery detection can be explored, the processes within a block based detection schememust first be identified and explained. The common flow of block based copy moveforgery detection can be seen in Figure 1.1. The input for the detection scheme is animage suspected to contain copy move forgery. Firstly, the image is segmented intooverlapping blocks to separate the different image regions. The image region withineach block is then goes through a feature extraction process which transforms rawpixel information into a set of image features. The resulting set of image features isthen subjected to a similarity analysis process which identifies pairs of highly similaror identical image features. The final output of the detection scheme is a set of blockssuspected to be duplicates of one another.

Input Image

Image Segmentation

Feature Extraction

Similarity Analysis

Detection Results

Figure 1.1: Copy Move Image Forgery Detection Process

Page 18: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

3

A robust copy move image forgery detection scheme needs to be invariant topost-processing of the tampered image and geometric transformations of the the copymoved image regions. From Figure 1.1, feature extraction and similarity analysisare the most important processes and thus have been the focus of research in thisfield. As research progresses towards developing more robust methods of featureextraction, the algorithms being proposed have higher and higher time complexity. Thecomplex transformations used to create feature vectors of image blocks require highcomputation time. The feature vectors produced during the feature extraction processare also complex and require some form of normalization or quantization beforesimilarity analysis can be done, requiring extra rounds of calculations which increasescomputation time. As for the similarity analysis process, an efficient technique isneeded to quickly identify duplicate image features within the set of obtained featurevectors.

1.2 Problem Background

Computation time is currently a serious issue in copy move image forgerydetection, especially in real-time and near-real time applications. Resorting to lesscomplex algorithms for feature extraction results in lower successful detection rate andhigher false detection rate. These less complex algorithms are also less robust whenconfronted with post-processing of the tampered image and geometric transforms onthe the copy moved portions of the image. Hence, it is not a viable solution because itdecreases the overall success and accuracy of forgery detection. It is also possible toreduce the dimensions of an image before it is analyzed to gain a smaller search space.However, doing so causes data loss of image detail resulting in less accurate detection.One method of preserving the robustness of copy move image forgery detection whileimproving performance is through parallelization of the feature extraction process.Parallelization reduces the impact of high algorithmic time complexity and allowsthe total time required for forgery detection to scale with the hardware running thedetection scheme.

While the techniques used for feature extraction in previous works have beenvarious, the techniques used for duplicate feature matching have been extremelylimited. A majority of proposed schemes in previous works have used lexicographicalsorting of feature vector matrix to identify duplicated image regions. Improvement ofcomputation time for lexicographical sorting has been achieved using radix sort. Therehas not been focus in current research on exploring more efficient methods to perform

Page 19: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

4

block matching because lexicographical sorting has been proven to be effective withoutmajor drawbacks in terms of accuracy. However, the issue with lexicographical sortingis its computation time (Bayram, Sencar and Memon, 2009). Bayram, Sencar andMemon (2009) showed that identifying duplicate features using a counting bloomfilter is much faster than lexicographical sorting. Despite this, there have not been anythorough investigations into how bloom filters perform in terms of resulting successfuldetection rate or false positive rate.

Currently, there exist some versions of copy move image forgery detectionschemes using Central Processing Unit (CPU) based parallelization. Sridevi, Mala andSandeep (2012) developed a parallelization algorithm based on Java threads executedon CPU. Modern CPUs offer high clockspeeds and Instructions Per Cycle (IPC) countand possess excellent pipelining capabilities to process a large number of threadssimultaneously despite their limited number of physical processing cores. With theexistence of Graphics Processing Unit (GPU) general purpose computing interfaces,it is possible to leverage a large number of GPU processing cores to execute taskstraditionally limited to CPUs. GPUs are designed specifically to process graphicaldata and are thus highly suited for image processing. GPUs have lower clockspeedsand IPC compared to CPUs but possess a large number of physical cores that can beused for processing. There has been use of GPUs to accelerate the radix sort of a copymove image forgery detection scheme, but there is currently no research into usingGPU optimized counting bloom filters for copy move image forgery detection. Thereis also currently no algorithm to describe how copy move image forgery detection canbe fully parallelized using a GPU. It is not possible to achieve the same optimizationlevel by applying the same algorithms developed for CPU parallelization to GPUassisted computing because of issues such as host to device communication latencyand separated memory. Thus, an algorithm must be designed specifically for the GPUin order to be optimal.

To evaluate the viability and performance of counting bloom filters in copymove image forgery detection schemes, a comparison must be made to the existinglexicographical sorting technique used for duplicate matching. Because a parallelradix sort has already been used on GPU to significantly speed up lexicographicalsorting, a parallel bloom filter must be used for a fair comparison with radix sort.In addition, an equal comparison requires the feature extraction technique to remainconstant and produces a feature set that is suitable for processing by both countingbloom filter and radix sort. Thus, a detection scheme which supports both radix sortand counting bloom filters needs to be developed. Performance evaluation of counting

Page 20: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

5

bloom filters also needs to consider forgery detection under different scenarios suchas post-processing of tampered image and geometric transformations of forged imageregions.

1.3 Problem Statement

Robust feature extraction techniques used in block based copy move imageforgery detection require a high computation time. There is a need for reducedcomputation time for detection schemes to be practical for use with large imagesand in real time environments. Utilization of GPU to compute the processes canhighly parallelize the tasks involved to reduce computation time. Current CPU basedalgorithms that have been designed are not suitable to be directly adopted in a GPUbased scheme. It must be determined how a parallel copy move image forgerydetection scheme can be designed for use with a GPU. Counting bloom filter is fasterthan radix sort in processing feature vector matrix to identify duplicates. Evaluationof counting bloom filter in copy move image forgery detection scheme must be doneto determine its effectiveness. To test the performance of counting bloom filter, adetection scheme which supports both radix sort and counting bloom filter needs to bedeveloped.

1.4 Research Questions

The main research question to be answered in this study is:

”Are counting bloom filters an effective technique for duplicate matching in a

GPU based copy move image forgery detection scheme?”

The supporting research questions are:

i. How can a GPU based copy move image forgery detection scheme usingoverlapping block technique be designed?

ii. Which feature extraction technique for image transformation to feature vectorshould be applied for evaluating the scheme that will be developed in thisproject?

Page 21: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

6

iii. How can a radix sort be incorporated into a GPU based scheme?

iv. How can a counting bloom filter be developed for use with a GPU baseddetection scheme?

v. How does a parallel counting bloom filter perform in duplicate matchingcompare to radix sort?

1.5 Project Aim

The project aim is to improve the performance of copy move image forgerydetection through GPU parallelization and evaluate alternative similarity analysistechniques by comparing the performance of similarity analysis using counting bloomfilter with radix sort.

1.6 Project Objectives

The objectives for this research are as follows:

i. To design a parallel GPU based algorithm for copy move image forgerydetection using overlapping block technique.

ii. To develop a copy move image forgery detection scheme based on thedesigned GPU algorithm which supports forgery detection using countingbloom filters and radix sort.

iii. To compare the performance of parallelized counting bloom filters with radixsort in performing forgery detection.

1.7 Project Scope

The scopes of this project are as follows:

i. Copy move image forgery detection can be done using either block basedor keypoint based approaches. This project will only focus on block based

Page 22: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

7

approaches for copy move image forgery detection.

ii. The parallel approach proposed will be specific to the type of GPU architectureand software framework for GPU programming in this project, which is basedon Nvidia discrete graphics cards and Compute Unified Device Architecture(CUDA) platform.

iii. The project will not propose a new method for transformation of image datainto feature representations used in the feature extraction stage. Instead,quantized Discrete Cosine Transform (DCT) will be adopted as a case studyfor parallelization of feature extraction.

iv. The images used for evaluating forgery detection will be generated from theImage Manipulation Dataset (IMD).

v. Methods have been proposed to perform duplicate matching using k-d tree,lexicographical sorting and bloom filter. In this project, only the radix sortimplementation of lexicographical sorting and counting bloom filters will beevaluated.

vi. For evaluation of the parallelized counting bloom filters, comparison will onlybe made with radix sort for similarity analysis. The performance will becompared in terms of detection rate, false positive rate and speed.

1.8 Importance of Project

Currently, copy move image forgery detection is needed in many fields. Ofthose fields, journalism and digital forensics often deals with time sensitive cases.Therefore, a faster forgery detection system will benefit organizations in dealing withtheir cases in a timely manner. Existence of parallelized detection scheme can alsomake the more complex feature extraction techniques more practical by minimizingthe computation time disadvantages. This project is also a step forward towards real-time or near real-time image forgery detection.

1.9 Thesis Organization

The thesis is organized in four chapters. This chapter gives and overview ofthe fundamentals of copy-move digital image forgery detection and overview of thecurrent problems that aims to be solved by this project, specifically in regards to the

Page 23: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

8

feature extraction and similarity analysis processes within a copy move image forgerydetection scheme. The aim and objectives of the project are defined. Finally, Theproject scopes are defined and a the benefits of the project are explained.

In Chapter 2, previously done works in the field of copy move image forgerydetection are reviewed and critically analyzed. An explanation of the current issues thatexist within this area of research is presented. The study of past works also identifiesthe existing methods which meet the criteria for robustness and are suitable to be usedwith a GPU. The issues of performance with block matching techniques is also furtherexplored. Finally, a study of GPU parallelization is done to help determine how it canbe applied to copy move image forgery detection.

Methodology of the project is discussed in Chapter 3 which includes theexperimental framework and other contributing factors of this project. In particular,dataset preparation, parameter selection and experimental process are discusses alongwith how the developed scheme can be evaluated. In Chapter 4, the design andimplementation of the proposed scheme is shown along with details of the algorithmsused. Chapter 5 presents the results and analysis obtained from the experiments carriedout. Finally, Chapter 6 presents some concluding remarks and recommendation forfuture works.

Page 24: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

REFERENCES

Abd-Elhafiez, W. M. and Gharibi, W. (2012). Color Image Compression AlgorithmBased on the DCT Blocks. International Journal of Computer Science Issues

(IJCSI). 9(4).

Bashar, M., Noda, K., Ohnishi, N. and Mori, K. (2010). Exploring Duplicated Regions

in Natural Images. doi:10.1109/TIP.2010.2046599.

Bayram, S., Sencar, H. T. and Memon, N. (2009). An efficient and robust method fordetecting copy-move forgery. In Acoustics, Speech and Signal Processing, 2009.

ICASSP 2009. IEEE International Conference on. IEEE, 1053–1056.

Bradski, G. and Kaehler, A. (2008). Learning OpenCV: Computer vision with the

OpenCV library. ” O’Reilly Media, Inc.”.

Bravo-Solorio, S. and Nandi, A. K. (2011). Automated detection and localisation ofduplicated regions affected by reflection, rotation and scaling in image forensics.Signal Processing. 91(8), 1759–1770.

Christlein, V., Riess, C., Jordan, J. and Angelopoulou, E. (2012). An evaluationof popular copy-move forgery detection approaches. Information Forensics and

Security, IEEE Transactions on. 7(6), 1841–1854.

Farid, A. and Popescu, A. (2004). Exposing digital forgeries by detecting duplicated

image regions. Technical report. Technical Report, TR2004-515, Department ofComputer Science, Dartmouth College, Hanover, New Hampshire.

Farid, H. (2009). Image forgery detection. Signal Processing Magazine, IEEE. 26(2),16–25.

Fridrich, J., Soukal, D. and Lukas, J. (2003). Detection of copy-move forgery in digitalimages. In Proceedings of Digital Forensic Research Workshop. Citeseer.

Ghorbani, M., Firouzmand, M. and Faraahi, A. (2011). DWT-DCT (QCD) based copy-move image forgery detection. In Systems, Signals and Image Processing (IWSSIP),

2011 18th International Conference on. IEEE, 1–4.

Gupta, A., Saxena, N. and Vasistha, S. (2013). Detecting Copy Move Forgery InDigital Images. International Journal of Engineering Research and Applications.

Page 25: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

66

International Journal of Engineering Research and Applications. 3(2), 94–97.

Jablin, T. B. (2013). Automatic Parallelization for GPUs. Ph.D. Thesis. PrincetonUniversity.

Jenkins, B. (2012). Spookyhash: a 128-bit noncryptographic hash. Retrievable athttp://burtleburtle.net/bob/hash/spooky.html.

Khan, S. and Kulkarni, A. (2010). Reduced time complexity for detection of copy-move forgery using discrete wavelet transform. International Journal of Computer

Applications. 6(7), 31–36.

Kirsch, A. and Mitzenmacher, M. (2006). Less hashing, same performance: Building abetter bloom filter. In In Proc. the 14th Annual European Symposium on Algorithms

(ESA 2006. 456–467.

Li, L., Li, S. and Wang, J. (2012). Copy-move forgery detection based on PHT. InInformation and Communication Technologies (WICT), 2012 World Congress on.Oct. 1061–1065. doi:10.1109/WICT.2012.6409232.

Li, L., Li, S., Zhu, H., Chu, S.-C., Roddick, J. F. and Pan, J.-S. (2013). An EfficientScheme for Detecting Copymove Forged Images by Local Binary Patterns. Journal

of Information Hiding and Multimedia Signal Processing. 4(1), 46–56.

Lin, H.-J., Wang, C.-W., Kao, Y.-T. et al. (2009). Fast copy-move forgery detection.WSEAS Transactions on Signal Processing. 5(5), 188–197.

Luo, W., Huang, J. and Qiu, G. (2006). Robust detection of region-duplication forgeryin digital image. In Pattern Recognition, 2006. ICPR 2006. 18th International

Conference on, vol. 4. IEEE, 746–749.

Mahdian, B. and Saic, S. (2007). Detection of copy–move forgery using a methodbased on blur moment invariants. Forensic science international. 171(2), 180–189.

Mohamadian, Z. and Pouyan, A. (2013). Detection of Duplication Forgery inDigital Images in Uniform and Non-uniform Regions. In Computer Modelling and

Simulation (UKSim), 2013 UKSim 15th International Conference on. April. 455–460. doi:10.1109/UKSim.2013.94.

Muhammad, G., Hussain, M., Khawaji, K. and Bebis, G. (2011). Blind copy moveimage forgery detection using dyadic undecimated wavelet transform. In Digital

Signal Processing (DSP), 2011 17th International Conference on. IEEE, 1–6.

Popescu, A. C. and Farid, H. (2005). Exposing digital forgeries in color filter arrayinterpolated images. IEEE Transactions on Signal Processing. 53(10), 3948–3959.

Qiao, M., Sung, A., Liu, Q. and Ribeiro, B. (2011). A novel approach for detectionof copy-move forgery. In ADVCOMP 2011, The Fifth International Conference on

Page 26: GRAPHICS PROCESSING UNIT BASED PARALLEL ...eprints.utm.my/id/eprint/53559/1/AhmadUwaysZulkurnainMFC...adalah pengesanan pemalsuan. Pemalsuan secara salin dan tampal adalah sejenis

67

Advanced Engineering Computing and Applications in Sciences. 44–47.

Salam, A. T. and Ghazali, B. S. (2013). STATE OF THE ART OF COPY-MOVEFORGERY DETECTION TECHNIQUES: A REVIEW. International Journal of

Computer Science Issues (IJCSI). 10(6).

Selvapeter, P. J. and Hordijk, W. (2009). Cellular automata for image noise filtering.In Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress

on. IEEE, 193–197.

Singh, J. and Raman, B. (2012). A high performance copy-move image forgerydetection scheme on GPU. In Proceedings of the International Conference on Soft

Computing for Problem Solving (SocProS 2011) December 20-22, 2011. Springer,239–246.

Sridevi, M., Mala, C. and Sandeep, S. (2012). Copy-move image forgery detection ina parallel environment. Computer Science & Information Technology (CS & IT). 52,19–29.

Ting, Z. and Rang-ding, W. (2009). Copy-Move Forgery Detection Based on SVD inDigital Image. In Image and Signal Processing, 2009. CISP ’09. 2nd International

Congress on. Oct. 1–5. doi:10.1109/CISP.2009.5301325.

Wang, J., Liu, G., Li, H., Dai, Y. and Wang, Z. (2009). Detection of Image RegionDuplication Forgery Using Model with Circle Block. In Multimedia Information

Networking and Security, 2009. MINES ’09. International Conference on, vol. 1.Nov. 25–29. doi:10.1109/MINES.2009.142.

Welsh, T., Ashikhmin, M. and Mueller, K. (2002). Transferring Color to GreyscaleImages. ACM Trans. Graph. 21(3), 277–280. ISSN 0730-0301. doi:10.1145/566654.566576. Retrievable at http://doi.acm.org/10.1145/566654.566576.

Zhang, J., Feng, Z. and Su, Y. (2008). A new approach for detecting Copy-Moveforgery in digital images. In Communication Systems, 2008. ICCS 2008. 11th IEEE

Singapore International Conference on. Nov. 362–366. doi:10.1109/ICCS.2008.4737205.

Zimba, M. and Xingming, S. (2011). DWT-PCA(EVD) Based Copy-move ImageForgery Detection. International Journal of Digital Content Technology and its

Applications. 5(1).