A Comparative Analysis of Forensic Similarity and Scale Invariant Feature Transform (SIFT) for Forensic Image Identification
Muhammad Na'im Al Jum'ah(1*); Hamid Wijaya(2); Suwito Pomalingo(3);
(1) Universitas Sembilanbelas November Kolaka
(2) Universitas Sembilanbelas November Kolaka
(3) Universitas Multimedia Nusantara
(*) Corresponding Author
AbstractThe image manipulation process has contributed to the widespread dissemination of false information. image forensics can help law enforcement agencies in addressing the spread of false news or information issues through visual media. Forensic image identification can be conducted using various methods, including Scale Invariant Feature Transform (SIFT) and Forensic Similarity. This study compared two methods, SIFT and Forensic Similarity, for forensic image identification. The test results showed the SIFT method identified image forensics by detecting image similarity through calculation of the key point values of each image. The process of searching the key point values was performed to extract information from the image. A high key point value indicated a large amount of information obtained from the image extraction results. On the other hand, the Forensic Similarity method also performed image forensic detection by examining whether image patches shared the same forensic traces. The advantage of the Forensic Similarity method over the SIFT method was that Forensic Similarity was more detailed because it involved many processes. Thus, Forensic Similarity was able to find similarities between two image patch objects. Additionally, the results obtained from the Forensic Similarity method were more detailed in detecting image similarity by considering the key point matching value and Cosine Similarity. Several previous studies have already implemented the SIFT and Forensic Similarity methods for image forensics, but there was no research that directly compared these two methods. This is the strength of this research. However, this study only used three data samples from three different devices for data collection. Future research can use a larger sample size to observe the comparison results KeywordsDigital Forensics; Forensic Similarity; Image Forensic; Scale Invariant Feature Transform (SIFT)
|
Full Text:PDF |
Article MetricsAbstract view: 19 timesPDF view: 5 times |
Digital Object Identifierhttps://doi.org/10.33096/ilkom.v16i3.2357.371-381 |
Cite |
References
Manisha, A. K. Karunakar, and C. T. Li, "Identification of source social network of digital images using deep neural network," Pattern Recognit Lett, vol. 150, pp. 17–25, Oct. 2021, doi: 10.1016/j.patrec.2021.06.019.
P. Sharma, M. Kumar, and H. K. Sharma, "GAN-CNN Ensemble: A Robust Deepfake Detection Model of Social Media Images Using Minimized Catastrophic Forgetting and Generative Replay Technique," in Procedia Computer Science, Elsevier B.V., 2024, pp. 948–960. doi: 10.1016/j.procs.2024.04.090.
M. Fakhrulddin Abdulqader, A. Y. Dawod, and A. Zeki Ablahd, "Detection of tamper forgery image in security digital mage," Measurement: Sensors, vol. 27, Jun. 2023, doi: 10.1016/j.measen.2023.100746.
I. C. Camacho and K. Wang, "A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics," J Imaging, vol. 7, 2021.
E. Nowroozi, A. Dehghantanha, R. M. Parizi, and K.-K. R. Choo, "A survey of machine learning techniques in adversarial image forensics," Comput Secur, vol. 100, p. 102092, 2021, doi: 10.1016/j.cose.2020.102092.
K. B. Meena and V. Tyagi, "A copy-move image forgery detection technique based on tetrolet transform," Journal of Information Security and Applications, Vol. 52, p. 102481, 2020, doi: 10.1016/j.jisa.2020.102481.
M. Jafari Barani, M. Yousefi Valandar, and P. Ayubi, "A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map," Optics (Stuttg), vol. 187, pp. 205–222, Jun. 2019, doi: 10.1016/j.ijleo.2019.04.074.
S. K. Sharma, A. AlEnizi, M. Kumar, O. Alfarraj, and M. Alowaidi, "Detection of real-time deep fakes and face forgery in video conferencing employing generative adversarial networks," Heliyon, Vol. 10, No. 17, p. E37163, 2024, doi: 10.1016/j.heliyon.2024.e37163.
G. G. Rajput, S. D. Dabhole, and Prashantha, "Modified Keypoint-Based Copy Move Area Detection," in Procedia Computer Science, Elsevier B.V., 2024, pp. 3389–3396. doi: 10.1016/j.procs.2024.04.319.
B. Wang, J. Hou, F. Wei, F. Yu, and W. Zheng, "MDM-CPS: A few-shot sample approach for source camera identification," Expert Syst Appl, vol. 229, Nov. 2023, doi: 10.1016/j.eswa.2023.120315.
A. Akilal and M. T. Kechadi, "An improved forensic-by-design framework for cloud computing with systems engineering standard compliance," Forensic Science International: Digital Investigation, vol. 40, Mar. 2022, doi: 10.1016/j.fsidi.2021.301315.
N. B. A. Warif et al., "Copy-move forgery detection: Survey, challenges and future directions," Journal of Network and Computer Applications, vol. 75, pp. 259–278, 2016, doi: 10.1016/j.jnca.2016.09.008.
F. Breitinger, X. Zhang, and D. Quick, "A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage," Forensic Science International: Digital Investigation, vol. 43, Sep. 2022, doi: 10.1016/j.fsidi.2022.301443.
Y. Zhou et al., "Digital whole-slide image analysis for automated diatom test in forensic cases of drowning using a convolutional neural network algorithm," Forensic Sci Int, vol. 302, Sep. 2019, doi: 10.1016/j.forsciint.2019.109922.
O. Mayer and M. C. Stamm, "Forensic Similarity for Digital Images," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1331–1346, 2020, doi: 10.1109/TIFS.2019.2924552.
G. G. Rajput, S. D. Dabhole, and Prashantha, "Modified Keypoint-Based Copy Move Area Detection," Procedia Comput Sci, vol. 235, pp. 3389–3396, 2024, doi: 10.1016/j.procs.2024.04.319.
J. Guo, H. Chen, B. Liu, and F. Xu, "A system and method for person identification and positioning incorporating object edge detection and scale-invariant feature transformation," Measurement (Lond), vol. 223, Dec. 2023, doi: 10.1016/j.measurement.2023.113759.
E. Akbal and S. Dogan, "Forensics Image Acquisition Process of Digital Evidence," International Journal of Computer Network and Information Security, vol. 10, no. 5, pp. 1–8, 2018, doi: 10.5815/ijcnis.2018.05.01.
V. Vijayan and P. Kp, "A Comparative Analysis of RootSIFT and SIFT Methods for Drowsy Features Extraction," in Procedia Computer Science, Elsevier B.V., 2020, pp. 436–445. doi: 10.1016/j.procs.2020.04.046.
M. Yacoub, M. Abdelwahab, K. Shiokawa, and A. Mahrous, "Estimating the drift velocity of plasma bubbles in airglow images using the scale invariant feature transform and the speeded up robust feature algorithms," Advances in Space Research, 2024, doi: 10.1016/j.asr.2024.09.071.
F. Marra, Di. Gragnaniello, L. Verdoliva, and G. Poggi, "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection," IEEE Access, vol. 8, pp. 133488–133502, 2020, doi: 10.1109/ACCESS.2020.3009877.
G. Horsman, "Defining principles for preserving privacy in digital forensic examinations," Forensic Science International: Digital Investigation, vol. 40, Mar. 2022, doi: 10.1016/j.fsidi.2022.301350.
J.-Y. Sun, S.-W. Kim, S.-W. Lee, and S.-J. Ko, "A novel contrast enhancement forensics based on convolutional neural networks," Signal Process Image Commun, vol. 63, pp. 149–160, 2018, doi: 10.1016/j.image.2018.02.001.
B. Bayar and M. C. Stamm, "Towards Open Set Camera Model Identification Using a Deep Learning Framework," 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)Pp. 2007–2011, 2018.
O. Mayer and M. C. Stamm, "Learned Forensic Source Similarity for Unknown Camera Models," in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Apr. 2018, pp. 2012–2016. doi: 10.1109/ICASSP.2018.8462585.
B. Bayar and M. C. Stamm, "On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection," in 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 2152–2156. doi: 10.1109/ICASSP.2017.7952537.
J. Bunk et al., "Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning," in 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017, pp. 1881–1889. doi: 10.1109/CVPRW.2017.235.
Y. Sun, "Exploration on Data Collection and Analysis System Based on Integrated SIFT Algorithm," in Procedia Computer Science, Elsevier B.V., 2024, pp. 388–395. doi: 10.1016/j.procs.2024.09.048.
S. Arooj, S. Altaf, S. Ahmad, H. Mahmoud, and A. S. N. Mohamed, "Enhancing sign language recognition using CNN and SIFT: A case study on Pakistan sign language," Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 2, Feb. 2024, doi: 10.1016/j.jksuci.2024.101934.
T. Lindeberg, "Image Matching Using Generalized Scale-Space Interest Points," J Math Imaging Vis, vol. 52, no. 1, pp. 3–36, May 2015, change: 10.1007/s10851-014-0541-0.
L. Daoud, M. K. Latif, H. S. Jacinto, and N. Rafla, "A fully pipelined FPGA accelerator for scale invariant feature transform keypoint descriptor matching," Microprocess Microsyst, vol. 72, Feb. 2020, doi: 10.1016/j.micpro.2019.102919.
T. P. Shiji, S. Remya, and V. Thomas, "Computer Aided Segmentation of Breast Ultrasound Images Using Scale Invariant Feature Transform (SIFT) and Bag of Features," in Procedia Computer Science, Elsevier B.V., 2017, pp. 518–525. doi: 10.1016/j.procs.2017.09.108.
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Muhammad Na'im Al Jum'ah, Hamid Wijaya
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.