Advertisement

On Efficiency of Scrambled Image Forensics Service Using Support Vector Machine

  • Sahibzada Muhammad Shuja
  • Raja Farhat Makhdoom Khan
  • Munam Ali Shah
  • Hasan Ali KhattakEmail author
  • Assad Abbass
  • Samee U. Khan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11517)

Abstract

Images can be a very good evidence during investigation of a crime scene. At the same time they can also contain very personal information which should not be exposed without the consent of the involved people. In this paper, We have presented here a practical approach to protect privacy of under investigation images with the use of Arnold’s Transform (AT) scrambling and Support Vector Machine, We also provide a new approach towards the whole forensics service provided by the designated agencies with the help of implementation of our approach. We enhanced the security of AT and provided privacy preserving mechanism to ensure protection of privacy. In literature only policies are defined to protect the privacy and lack of a solid approach which we have tried to resolve with a proof of concept implementation. In short, we have provided a full image forensics framework for illegal image detection while preserving the privacy.

Keywords

Digital forensics Privacy ORB Arnold’s Transform SVM Guns trafficking Image forensics 

Notes

Acknowledgment

The work of Samee U. Khan is based upon work supported by (while serving at) the National Science Foundation. Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

References

  1. 1.
    Min, L., Ting, L., Yu-Jie, H.: Arnold transform based image scrambling method. In: Proceedings of 3rd International Conference on Multimedia Technology (ICMT 2013) (2013).  https://doi.org/10.2991/icmt-13.2013.160
  2. 2.
    Lowe, D.: Object recognition from local scale-invariant features. In: Proceedings of the Seventh IEEE International Conference on Computer Vision (1999).  https://doi.org/10.1109/iccv.1999.790410
  3. 3.
    Rublee, E., Rabaud, V., Konolige, K., Bradski, G.: ORB: an efficient alternative to SIFT or SURF. In: 2011 International Conference on Computer Vision (2011).  https://doi.org/10.1109/iccv.2011.6126544
  4. 4.
    Peter, A., Hartmann, T., Muller, S., Katzenbeisser, S.: Privacy preserving architecture for forensic image recognition. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (2012).  https://doi.org/10.1109/wifs.2012.6412629
  5. 5.
    Srinivasan, S.: Security and privacy in the computer forensics context. In: 2006 International Conference on Communication Technology (2006).  https://doi.org/10.1109/icct.2006.341936
  6. 6.
    Law, F.Y., et al.: Protecting digital data privacy in computer forensic examination. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (2011).  https://doi.org/10.1109/sadfe.2011.15
  7. 7.
    Ito, I., Kiya, H.: Phase scrambling for blind image matching. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (2009).  https://doi.org/10.1109/icassp.2009.4959885
  8. 8.
    A comprehensive survey on image scrambling techniques. Int. J. Sci. Res. (IJSR) 4(12), 813–818 (2015).  https://doi.org/10.21275/v4i12.nov152034
  9. 9.
    Shelke, R., Metkar, S.: Image scrambling methods for digital image encryption. In: 2016 International Conference on Signal and Information Processing (IConSIP) (2016).  https://doi.org/10.1109/iconsip.2016.7857449
  10. 10.
    Hsu, C., Lu, C., Pei, S.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21(11), 4593–4607 (2012).  https://doi.org/10.1109/tip.2012.2204272MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3951, pp. 404–417. Springer, Heidelberg (2006).  https://doi.org/10.1007/11744023_32CrossRefGoogle Scholar
  12. 12.
    Karami, E., Prasad, S., Shehata, M.: Image matching using SIFT, SURF, BRIEF, and ORB: performance comparison for distorted images. In: Proceedings of the 2015 Newfoundland Electrical and Computer Engineering Conference. St. Johns, Canada (2015)Google Scholar
  13. 13.
    Wu, L., Zhang, J., Deng, W., He, D.: Arnold transformation algorithm and anti-arnold transformation algorithm. In: 2009 First International Conference on Information Science and Engineering (2009).  https://doi.org/10.1109/icise.2009.347
  14. 14.
    Support vector machine, 21 June 2018. https://en.wikipedia.org/wiki/Support_vector_machine
  15. 15.
    Baryamureeba, V., Tushabe, F.: The enhanced digital investigation process model. In: The Digital Forensic Research Conference (2004)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Sahibzada Muhammad Shuja
    • 1
  • Raja Farhat Makhdoom Khan
    • 1
  • Munam Ali Shah
    • 1
  • Hasan Ali Khattak
    • 1
    Email author
  • Assad Abbass
    • 1
  • Samee U. Khan
    • 2
  1. 1.COMSATS University IslamabadIslamabadPakistan
  2. 2.North Dakota State UniversityFargoUSA

Personalised recommendations