From the images, forgery detection is ahead noteworthy attention as there are numerous editing tools that facilitate to form the edition by means of removal or objects manipulation from the images. These editing tools not at all abscond any forgery trace as a result, growing the challenges of the system to identify the existence of the manipulations. Accordingly, this work presents a new forgery recognition approach which is on the basis of the supervised learning algorithm. This algorithm is presented concerning exploiting the BPNN and optimization is set up by exploiting the Particle Swarm Optimization (PSO) algorithm. The classification is done by exploiting the proposed classifier exploits the texture features attained from the GWTM descriptor so that the features are attained from the face-detected images retrieved by exploiting the Viola-Jones approach. By utilizing two datasets, the simulation is performed to show the efficiency of the proposed model. By utilizing the datasets the analysis shows that the proposed model obtained superior performance while evaluating with few conventional forgery detection systems
O. Mayer and M. C. Stamm, "Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration," IEEE Transactions on Information Forensics and Security, Volume. 13, issue. 7, page no. 1762- 1777, July 2018.
Y. Li and J. Zhou, "Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching," IEEE Transactions on Information Forensics and Security, Volume. 14, issue. 5, page no. 1307-1322, May 2019.
B. Chen, M. Yu, Q. Su, H. J. Shim and Y. Shi, "Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection," IEEE Access, Volume. 6, page no. 56637-56646, 2018.
K. M. Hosny, H. M. Hamza and N. A. Lashin, "Copy-for-duplication forgery detection in colour images using QPCETMs and sub-image approach," IET Image Processing, Volume. 13, issue. 9, page no. 1437-1446, 18 7 2019.
J. H. Bappy, C. Simons, L. Nataraj, B. S. Manjunath and A. K. Roy-Chowdhury, "Hybrid LSTM and Encoder– Decoder Architecture for Detection of Image Forgeries," IEEE Transactions on Image Processing, Volume. 28, issue. 7, page no. 3286-3300, July 2019.
S. Jia, Z. Xu, H. Wang, C. Feng and T. Wang, "Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics," IEEE Access, Volume. 6, page no. 25323-25335, 2018.
Bin Xiao, Yang Wei, Xiuli Bi, Weisheng Li, Jianfeng Ma," Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering", Information Sciences, Volume 511, page no 172- 191, February 2020.
Victor Schetinger, Massimo Iuliani, Alessandro Piva, Manuel M. Oliveira,"Image forgery detection confronts image composition",Computers & Graphics, Volume 68, page no 152-163, November 2017,.
M. C. Stamm, M. Wu, and K. J. R. Liu, “Information forensics: An overview of the first decade,” Access, IEEE, Volume. 1, page no. 167–200, 2013
A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” Signal Processing, IEEE Transactions on, Volume. 53, no. 2, page no. 758–767, 2005.
H. Farid, “Exposing digital forgeries from JPEG ghosts,” Information Forensics and Security, IEEE Transactions on, Volume. 4, issue. 1, page no. 154–160, 2009.
M. C. Stamm and K. J. R. Liu, “Forensic detection of image manipulation using statistical intrinsic fingerprints,” Information Forensics and Security, IEEE Transactions on, Volume. 5, issue. 3, page no. 492–506, 2010.
M. Kirchner and J. Fridrich, “On detection of median filtering in digital images,” in IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, page no. 754 110–754 110, 2010.
X. Kang, M. C. Stamm, A. Peng, and K. J. R. Liu, “Robust median filtering forensics using an autoregressive model,” IEEE Transactions on Information Forensics and Security, Volume. 8, issue. 9, page no. 1456–1468, 2013.
M. Chen, J. Fridrich, J. Luk´aˇs, and M. Goljan, “Imaging sensor noise as digital x-ray for revealing forgeries,” in Proceedings of the 9th International Conference on Information Hiding. Springer-Verlag, pp. 342–358, 2007.
J. Fridrich, D. Soukal, and J. Luk´aˇs, “Detection of copy-move forgery in digital images,” in in Proceedings of Digital Forensic Research Workshop. Citeseer, 2003.
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, “A SIFTbased forensic method for copy–move attack detection and transformation recovery,” Information Forensics and Security, IEEE Transactions on, Volume. 6, Issue. 3, page no. 1099–1110, 2011.
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, “A SIFTbased forensic method for copy–move attack detection and transformation recovery,” Information Forensics and Security, IEEE Transactions on, Volume. 6, Issue. 3, page no. 1099–1110, 2011.
Tiago José de Carvalho; Christian Riess; Elli Angelopoulou; Hélio Pedrini; Anderson de Rezende Rocha, "Exposing Digital Image Forgeries by Illumination Color Classification", IEEE Transactions on Information Forensics and Security, Volume.8, Issue.9, pp.1182 - 1194, 2013.
P. F. Felzenszwalb and D. P. Huttenlocher, “Efficient graph-based image segmentation ”, International Journal of Visual Computing, Volume.59, Issue.2, page no. 167–181, 2004.
G. Buchsbaum, “A spatial processor model for color perception,” Journal of Franklin Institute, Volume. 310, Issue. 1, page no. 1–26, Jul. 1980.
Mridul Kumar Mathur and Priyanka Bhati, "Face Objects Detection in still images using Viola-Jones Algorithm through MATLAB TOOLS" , International Journal of Innovative Research in Computer and Communication Engineering, Volume.5, Issue.1, February 2017.
Renjith Thomas & M. J. S. Rangachar, "Integrating GWTM and BAT algorithm for face recognition in lowresolution images", The Imaging Science Journal, Volume. 64, Issue. 8, 2016.
Yan L, Hu P, Li C, Yao Y, Xing L, Lei F, et al. The performance prediction of ground source heat pump system based on monitoring data and data mining technology. Energy Build; volume 127: page no. 1085–95, 2016.
J. Zhang, S. Member, A.C. Sanderson, JADE: Adaptive Differential Evolution with Optional External Archive, volume 13, page no 945-958, 2009.
Xiwen Cai, Liang Gao, Fan Li,"Sequential approximation optimization assisted particle swarm optimization for expensive problems", Applied Soft Computing, Volume 83, October 2019.