1 Introduction

Nowadays, in digital publishing and printing fields, image forgery is considered as a major issue. Accepting the legitimacy of pictures is kind of tough as most of the digitally printed images are forged before publication. For example in political rallies typically numbers of listeners are digitally modified to point out several attendees. Thus image forensic with forger detection has become a serious challenge. Image conferred as digital evidence can be forged and thus is hard for being considered as valid. There are some previous works in the direction that depends upon detection copy paste forgery only. Image forgery is that the approach of modification the imaging data from the pictures using image-processing software packages like Photoshop, alternative image editor tools. It’s also strategies for manipulating the initial data by using varied transformation techniques like addition of noise, scaling, blurring, resizing and rotation, adding and removing any object and applying numerous alternative types of manipulation for hiding the real information within the image to produce a digital image as evidence proof for any criminal case, there’s a demand of the identification of the genuineness of the image. Image tampering will be divided into as a copy move forgery and as a non copy move forgery. During a copy move forgery, some portion of the image is derived and further in any other place of the image so that there are no modifications like resizing, blurring etc.

Altering digital pictures via intuitive software is an operation of simpleness with terribly low cost in today’s image forgery. Therefore each individual will synthesize a pretend image. For the wide accessible web, the false data disseminates extremely quick. As a consequence, the facts are also distorted and the public opinion is also affected, yielding negative social influence. It will be even worse within the justice once pictures are conferred as proof. Therefore, there’s a strong demand need for valid and robust authentication methodology to distinguish whether or not an image is original or not.

Generally, two schemes are used to form a forgery like 1. Copy-Move technique and 2. Splicing Scheme. Within the former case, a region of an image is duplicated then glued onto alternative regions to hide any unwanted portion inside an equivalent picture [1]. Within the latter case, tampered image consists of 2 sources and retains the majority of one image for detail [1]. Earlier, some scientists and researchers have introduced several strategies [2] to reveal such meant manipulations. Passive forensic methods fulfill the task without extra data aside from the image itself, therefore showing benefits over active algorithms like watermarking and alternative signature schemas. Therefore, most analysis work is absorbed in developing blind authentication strategies.

The forged image leaves some clues which may be wont to find the manipulated regions. In that situation, copy-move operation is followed due to the pasted space, although it may probably be altered geometrically, shares some similar features with the original region that is duplicated; finding out analogous features abstracted from local area is a potential solution. SIFT feature may be used to find clone areas [3, 4]. For splicing tampered image detection, considering that there are some discrepancies between the host image and also the spliced region makes an attempt to search out the distinction to reveal that forgeries make sense. The proposed scheme goal is to automatically observe copy-move within a single method without any earlier information concerning the forgery type of the uncertain image. In this paper, IRVM based forgery detection has been proposed with Biorthogonal Wavelet Transform based Singular Value Decomposition (BWT-SVD). Initially, the input color image has been converted into grey scale. After that, BWT is used to reduce noise and extract the feature. Then, the, the feature vectors are sorted in lexicographically and the duplicate vectors are identified by similarity between two successive vectors. To decide the similarity of vectors, Minkowski distance and Threshold value is used. Finally, the Improved RVM has been carried out with GSO algorithm to detect the forgery and classified as authentic image and forged image. Experimental results show the effectiveness of the proposed work in terms of accuracy, sensitivity, specificity, precision, recall, f-measure and g-mean compared than existing SVM forgery detection method. The remainder sections of this paper are organized as: copy-move image forgery detection based existing scheme has been reviewed in Sect. 2, Sect. 3 explained the proposed methodology, Sect. 4 shows the evaluation results and Sect. 5 concludes this work and provides future enhancement.

2 Related Work

In this section, copy-move image forgery detection based existing scheme has been reviewed. In 2016, Chauhana et al. [5] surveyed on key-point based forgery detection schemes on the basis of various parameters. Various copy move detection methods has been studied and concluded that the Scale Invariant Feature Transform (SIFT) was efficient scheme and it was detected forgery within a single or multiple regions of an image. The SIFT results demonstrate that it was effective for both geometric transformation and plain copy-move forgery. The geometric transformation functions are rotation, scaling and transformation. It has high computation efficient, But, low accuracy.

In 2016, Malviya et al. [6] presented efficient feature extraction based copy move detection for forgery detection. Three types of feature extraction algorithm have been introduced like color moment, HSV histogram, and auto color Correlogram for forgery detection. The simulation results show that the proposed feature extractions have been accurately detected the forged region and effective in some attacks like rotation and scaling. But, it has computation time complexity.

In 2016, Al-Qershi et al. [7] proposed a k-means clustering based new matching scheme for reduced the detection time and increased the detection accuracy. Initially, the image blocks are clustered and then Locality Sensitive Hashing (LSH) was used for matched the blocks based Zernike moments. The simulation results demonstrate that the proposed scheme reduced the 10% of processing rime and enhanced detection accuracy.

In 2016, Ustubioglu et al. [8] proposed a copy-move forgery detection method that can calculate threshold automatically. To limit the range of the feature vector elements, the Discrete Cosine Transform (DCT) has been introduced. Also, to establish the compression history of the image under test, Benford’s generalized law has been used. Element-by-element equality was introduced between the feature vectors for find similarity between blocks. It uses compression history to establish the threshold value for the current test image automatically. The simulation results show that the proposed scheme was very efficient to detect copied regions under various scenarios and attained high accuracy. It’s not suitable for real time data.

In 2015, Kaushik et al. [9] presented a statistical moments and 2D-Discrete Cosine Transform (DCT) based approach for detecting copy-move forgery in digital images. First, slide a window centered on every pixel of the suspicious image, and then to attain the quantized coefficient matrix, each window was passed through 2D–DCT. Obtained the low dimensional statistical feature vector of each quantized coefficient matrix and then arranged in a feature matrix. Four types were extracted in this scheme. After that, the adjacent pairs of feature vectors are used for detect the copy-move forgery. The simulation results show that this scheme attained low computational complexity and lower dimension feature vector. But, the system reliability was not good.

In 2015, Isaac et al. [10] proposed a Support Vector Machine (SVM) based image forgery detection scheme for copy-move forgery detection by taking texture information of the image. The texture information was extracted by using Gabor wavelets (GW) and Local Phase Quantization (LPQ). These extracted features are transferred to SVM as an input and it classifies the forgery image and non-forgery image. The simulation results show that this scheme attained high accuracy on both CASIA v1 and the DVMM color dataset. But, the SVM training time was high.

In 2015, Pun et al. [11] presented feature point matching and adaptive over-segmentation based approach for detecting copy-move forgery detection. It has been used both keypoint-based forgery and block-based detection methods. Initially, the input image was segmented irregular blocks and non-overlapping adaptively. After that, extracted the feature points from each block, and then extracted features are matched between one another to locate the labeled feature points. The simulation results show that this scheme attained much better detection results under various scenarios compared than existing scheme. But, it has computational complexity.

In 2015, Ardizzone et al. [12] presented a hybrid of block and point based scheme for detection of copy-move forgery. Initially, extracted the Interest points from image and modeled the objects as a set of attached triangles built onto these points. After that, according to content color information, shapes inner angles and local feature the triangles are matched and compared with point based scheme. As well as the keypoint based approaches used to hide object in a scene. The simulation results show that this hybrid scheme attained better performance compared than existing algorithms. The accuracy and system reliability was not good.

In 2014, Anand et al. [13] presented a comparative study based on three copy-move detection methods such as Dyadic Wavelet Transform (DyWT), discrete wavelet Transform (DWT) and DyWT with SIFT.DyWT (b).DWT and SIFT (c). DyWT and SIFT. The DWT couldn’t shift variant but DyWT can be done, therefore DyWT was attained more accurate detection result in analysis of data. To extract more numbers of key points, the DyWT was combined with SIFT and produced more accurate results. The simulation results show that this scheme attained high accuracy compared than other scheme. It has high computation cost and time complexity.

In 2013, Amerini et al. [14] proposed a J-Linkage algorithm based new scheme for localization detection of copy-move forgery. In the space of the geometric transformation, the clustering has been done and it increased the accuracy, reliability and precision of the system. The experimental result shows that it has high performance compared than other algorithms. It has computational complexity. In 2013, Hashmi et al. [15] proposed a hybrid approach based on DWT and SIFT for detection of copy-move image forgery. The experimental results show that it attained good results and has high reliability. But, the system accuracy was not good. In 2013, Al-Qershi et al. [16] presented a survey of passive detection of copy-move forgery in digital images. It has discussed various detection methods and provides key idea for developing robust passive detection scheme for copy-move forgery.

In 2012, Christlein, et al. [17] compared and evaluated the various features results for copy-move detection. Here, 15 most prominent feature sets are examined and analyzed the detection performance on a per-pixel basis and on a per-image basis. The simulation results demonstrate that the keypoint-based features are sensitive to repetitive image content and low-contrast regions and block-based methods only improved the detection results. It has computational time complexity.

In 2011, Amerini et al. [18] proposed Scale Invariant Features Transform (SIFT) based novel methodology for forgery detection. This method was identified if copy-move attacks has occurred as well as perform cloning to recover the geometric transformation. The simulation results show that this scheme attained high reliability. It has high computation cost and time complexity.

In 2011, Muhammad et al. [19] proposed a dyadic DyWT based blind and robust technique for forgery detection. This scheme has good results compared than DWT. Initially, the input image was decomposed into approximation and detail subbands. After that, these subbands are splitting into overlapping blocks and measure the similarity between blocks. The similarity between the copied and moved blocks are measured by using thresholding, and then matched pair’s obtained from the sorted list as copied and moved blocks. The simulation results show that this scheme attained high reliability and high accuracy. It has high computation cost and time complexity.

3 Proposed Methodology

In this section, the proposed IRVM based Copy-Move Forgery Detection (CMFD) algorithm has been discussed. In the field of digital image forensics, the CMFD is one of the emerging problems [20,21,22,23]. Earlier, to address this problem, many techniques have been proposed. These methods can be able to identify the duplicated image regions, but the image was affected by the common image processing operations like noise addition, compression and rotation. So, it’s considered as a one of the main issues of these techniques as well as the computational time was considered as another challenge, which attained high time when considering the large databases. So, to solve the above problems, the efficient feature extraction and classification scheme have been introduced in this system. The step by step procedure of proposed scheme has been discussed in given below sub sections.

3.1 System Overview

The proposed system accumulates various processes to implement. The Fig. 1 shows the overall architecture of proposed Copy-Move Forgery Detection (CMFD) using IRVM with BWT-SVD.

Fig. 1
figure 1

Overall architecture of proposed CMFD using IRVM with BWT

It illustrates the phases of proposed scheme such as preprocess, feature extraction and detection. Initially, if the input image is color, then it converted to grey image and this converted into various overlapping sub-blocks of fixed sizes. At that point, the BWT is used to every block and extracted a feature vector having unique singular values for every image sub-block. Utilizing these feature vectors, they discovered the blocks which are matching Minkowski distance and Threshold value [24,25,26,27,28,29,30]. They utilized a threshold value in order to increase the sturdiness and as well wipe out pseudo matching. Finally, the IRVM used for detection of forgery and classification of images like authentic image and forged image. In IRVM, the RVM parameters are optimized by Glowworm Swarm Optimization (GSO) to improve the prediction accuracy.

3.1.1 Symbols Used in Proposed System

Mathematical model of proposed system have various symbolic notations. Table 1 depicted all symbols used in proposed system with their meaning.

Table 1 Symbols used in proposed system

3.2 Noise Reduction and Feature Extraction

The input dataset has been downloaded from website. So, it contains some unwanted data’s and some noises. To reduce the noise and remove unwanted data, as well as, efficient feature extraction [31,32,33,34,35,36], the proposed system has been used  BWT.

3.2.1 Biorthogonal Wavelet Transform (BWT)

To improve the image quality and extract the features from images like variance, mean, skewness, energy etc. generally, in BWT, biorthogonal filters are developed for providing symmetric property instead of using two filters. In this proposed scheme, The BWT is used to denoising the image and extract [37,38,39] the features and it has the property of linear phase. To solve the problem of phase distortion the BWT is designed and it contains spline wavelets [40]. Here, Finite Impulse Response filters are used to reconstruct the image. Wavelet transform fusion is predicted via considering the wavelet transforms \(wt\) of two registered input images \({\text{I}}1\left( {{\text{x}},{\text{y}}} \right)\) and \(I2\left( {x,y} \right)\) with \(\mu\)-fusion rule. The fused image reconstruction is defined as

$${\text{I}}\left( {\text{x,y}} \right) = {\text{w}} - 1\left( {\upmu\left( {{\text{wt}}\left( {{\text{I}}1\left( {\text{x,y}} \right)} \right),\quad {\text{wt}}\left( {{\text{I}}2\left( {\text{x,y}} \right)} \right)} \right)} \right)$$
(1)

After that, the fused image is passed by bilateral filter. It defined as a non-linear, smoothing filter, edge preserving and adaptive histogram equalization. To enhance the contrast in the image, this filter is used and produced a good quality [41,42,43,44]. The final fused image is splitting into overlapping blocks.

3.2.2 Singular Value Decomposition (SVD)

SVD can preserve the useful features of the original image and use less storage space of memory [45]. In SVD, each singular value indicates the luminance of an image layer while the corresponding pair of singular vectors denotes the geometry of the image. In SVD, every real matrix A can be decomposed into a product of 3 matrices defined as:

$$A = USV^{T}$$
(2)

where \(U\;and\;V \to\) orthogonal matrices, \(U^{T} U = I,\;V^{T} V = I,\) and \(S = diag \left( {\lambda_{1} , \lambda_{2} , \ldots \lambda_{r} } \right)\) [45]. The diagonal entries of S are defined as the singular values of A, the right singular vectors of A is defined as the columns of V, and the columns of U are defined the left singular vectors of A. This decomposition is called as the Singular Value Decomposition (SVD) of A, and it defined as

$$A = \lambda_{1} U_{1} V_{1}^{T} , \lambda_{2} U_{2} V_{2}^{T} , \ldots \lambda_{r} U_{r} V_{r}^{T}$$
(3)

where \(r \to\) the rank of matrix A.

3.3 Image Forgery Detection and Classification Using Improved Relevance Vector Machine (IRVM)

Generally, RVM [46] has been used for decision making purpose. In this proposed system, it is used for forgery detection and classification process. In RVM, the weight parameter is optimized by using Glowworm Swarm Optimization, and it will improve the RVM performance. Therefore, this combined algorithm named as Improved RVM (i.e. IRVM). The extracted features are given as input in RVM training process. The training inputs denoted as \(\left\{ {F_{i} , t_{i} } \right\}_{i = 1}^{n}\), \(F_{i} \in R^{n} ,t_{i} \in \left\{ {0,1} \right\}\) and \(n\)-defines the number of features. For new inputs \(\hat{F}\), RVM makes prediction based on SVM function. RVM takes a linear combination of basic kernel functions remodeled by a logistic sigmoid function

$$y\left( {\hat{F},w} \right) = \sigma \left( {\mathop \sum \limits_{i = 1}^{n} \omega_{i} k\left( {F_{i} ,\hat{F}} \right)} \right) = \sigma \left( {w^{T} K} \right)$$
(4)

where K is defined as the kernel function vector of \(k\left( {\hat{F}} \right) = \left[ {k\left( {F_{1} ,\hat{F}} \right) \ldots k\left( {F_{n} ,\hat{F}} \right)} \right]^{T}\), \(w\) indicates the weight vector of \(\left( {\omega_{1} \ldots \omega_{n} } \right)^{T}\), and \(\sigma \left( . \right)\) represented logistic sigmoid function and is given below (Eq. 5),

$$\sigma \left( a \right) = \frac{1}{{1 + { \exp }\left( { - a} \right)}}$$
(5)

The logistic sigmoid function satisfies the symmetry property and is given below

$$\sigma \left( { - a} \right) = 1 - \sigma \left( a \right)$$
(6)

So, RVM can be used as the posterior probability. For the input feature \(\hat{F}\), the posterior probability of class \(c_{1}\) can be defined as

$$p\left( {t = 1 |\hat{F}} \right) = y\left( {\hat{F},w} \right)$$
(7)

Correspondingly, the posterior probability of class \(c_{2}\) can be defined as

$$p\left( {t = 0 |\hat{F}} \right) = 1 - y\left( {\hat{F},w} \right)$$
(8)

RVM can be treated as the posterior probability, because, to train the model, it can be adopts a Bayesian probabilistic framework. Also, it using the key feature of Automatic Relevance Determination (ARD) prior over the weight vector \(w\), which is used to separated the hyper parameter \(\alpha_{i}\) for each weight \(\omega_{i}\) parameter. During the deduction process, a lot of the hyper parameters are driven to large values, therefore that equivalent weights are efficiently forced to zero. Accordingly, the corresponding kernel functions can be pruned out in a sparse model result [47,48,49,50]. The inputs \(F_{i}\) equivalent to the remaining nonzero weights are known as relevance vectors.

The RVM decision model for an input vector \(\hat{F}\), based on the \(w_{MP}\) and RVS vectors Eq. (4) can be rewritten as

$$y\left( {\hat{F},w_{MP} } \right) = \sigma \left( {\mathop \sum \limits_{{F_{i} \in RVS}} \omega_{i} k\left( {F_{i} ,\hat{F}} \right) + \omega_{0} } \right)$$
(9)

In the RVM decision model, kernel function plays a significant role. In this improved RVM, the Elliptical Radial Basis Function (ERBF) can be used for kernel function.

$$\left( {F,z} \right) = exp\left( { - \mathop \sum \limits_{i = 1}^{D} \left( {F_{i} - z_{i} } \right)^{2} /\left( {\sigma_{i}^{2} .r^{2} } \right)} \right)$$
(10)

where \(x = \left( {x_{1} , \ldots ,x_{D} } \right)^{T}\) and \(z\left( {z_{1} , \ldots ,z_{D} } \right)^{T}\)) are defined as the D-dimension feature vectors, r represented as scale factor and \(\sigma_{i}^{2}\) defined variance. To improve the detection accuracy, the hyper parameter of weight can be optimized by Glowworm Swarm Optimization (GSO) approach.

3.3.1 Glowworm Swarm Optimization (GSO)

The GSO [51] is a swarm intelligence based optimization algorithm [52,53,54,55]. It is works based on the behavior of glowworm. Basically, it has four steps like deployment, luciferin-update, movement and local-decision domain update. In deployment step, to allow the glowworms to be scattered in the entire objective space as well as each and every glowworm contain identical quantity and sensor range of luciferin. In luciferin-update step, according to the objective function, glowworm changes luciferin location value and the luciferin update rule is defined as

$$l_{i} \left( {t + 1} \right) = \left( {1 - \rho } \right)l_{i} \left( t \right) + \gamma j_{i} \left( {t + 1} \right)$$
(11)

where \(\rho (0 < \rho < 1)\) is defined as the luciferin decay constant, \(j_{i} \left( t \right)\) indicates the objective function value at glowworm i’ s location at time t and \(\gamma\) is represented as the luciferin enhancement constant.

In Movement step, each and every glowworm chooses a neighbor, which has higher luciferin value and then using a probabilistic mechanism moves toward it. The probability of glowworms \(p_{j} \left( t \right)\) moving towards a neighbor \(nb\) is based on the Eq. (11) at iteration t

$$p_{j} \left(t \right) = \frac{{\left({l_{j} \left(t \right) - l_{i} \left(t \right)} \right)}}{{\mathop \sum \nolimits_{{k\epsilon n_{i} \left(T \right)}} \left({l_{k} \left(t \right) - l_{i} \left(t \right)} \right)}}$$
(12)

where \(l_{i} \left( t \right)\) defined as the luciferin value of glowworm i, d(i, j) represents the Euclidian distance between glowworms i and j. The glowworms i movement is defined as

$$F_{i} \left( {t + 1} \right) = F_{i} \left( t \right) + s\left( {\frac{{F_{j} \left( t \right) - F_{i} \left( t \right)}}{{\left\| {F_{j} \left( t \right) - Fx_{i} \left( t \right)} \right\|}}} \right)$$
(13)

where \(s\) is indicates the step-size. F-is the input of glowworm.

In Local-decision domain update step, if the number of neighbor modifies, then at each of iteration, local-decision domain needs updating and is defined as

$$r_{d}^{i} \left( {t + 1} \right) = min\left\{ {r_{s} ,max\left\{ {0,r_{d}^{i} \left( t \right) + \beta \left( {n_{t} - \left| {N_{i} \left( t \right)} \right|} \right)} \right\}} \right\}$$
(14)

where \(r_{d}^{i} \left( {t + 1} \right)\) is indicates the local-decision domain of glowworm i at the t + 1 iteration, \(\beta\) is represent a constant parameter and changes the rate of alter of the neighbor domain, \(n_{t}\) is indicates a threshold and is used to manage the number of neighbors. Based on these four steps, the fitness value has been estimated. Based on these steps, the hyper parameter of optimized [35,36,37,38,39] weight value has been predicted and is used in RVM and improved the forgery detection accuracy. Pseudo-code of the IRVM is given in Algorithm 1.

figure d

The proposed IRVM based CMFD step by step process has been given below.

Copy-Move Forgery Detection (CMFD) Process:

The general process of a CMFD system consists of the following steps.

Step 1 :

Pre-processing—if the input image is a color image (RGB), it is converted to gray-scale image based on the RGB to gray-scale conversion technique. The gray scale image is then tiled into overlapping blocks of fixed size

Step 2 :

Feature Extraction—in this step, BWT is applied to each block in each node and the average value of each block is used as the feature vector for block comparison and matching

Step 3 :

Produce feature vectors from blocks

Step 4 :

Sort the feature vectors in lexicographically

Step 5 :

Find duplicated vectors—Image Block Similarity Matching—based on the singular value feature vectors obtained in step 5, the Euclidean distance measure is computed between each block in each node. The minimum d measure corresponds to maximum match. Let \(m\) and \(n\) corresponds to n-dimensional singular value feature vector of blocks \(b_{i}\) and \(b_{j}\) respectively,

$$m = \left( {m_{1} ,m_{2} , \ldots ,m_{n} } \right)^{T}$$
(15)
$$n = \left( {n_{1} ,n_{2} , \ldots ,n_{3} } \right)^{T}$$
(16)
$$sim = \left( {\left( {m - n} \right)^{T} \left( {m - n} \right)} \right)^{{\left( {1/2} \right)}} = \mathop \sum \limits_{i = 1}^{k} \left( {m_{i} - n_{i} } \right)^{2}$$
(17)

If d (m, n) is greater than a threshold parameter then, such block pairs are discarded as they non-matching. The remaining block pairs can be candidates of suspected blocks.

Step 6 :

Consider the block matching

Step 7 :

Detect the forgery and classified the image by using IRVM

The proposed system classifies CMFD algorithms in groups based on the variation of different techniques used in different steps.

  • With and without transformations (Step 2).

  • The main differences in algorithms are the way to create feature vectors which is from Step 1 to Step 3.

  • The method to compare vectors and look for the block matching at Step 5 and Step 6, respectively.

The proposed IRVM detected forgery with high accuracy [21,22,23,24,25,26] due to the efficient optimization and effective feature extraction process. The performance is evaluated in Sect. 4.

4 Results and Discussion

In this section, the proposed IRVM based forgery detection performance has been evaluated and compared with existing SVM [10] and HMM-SVM [56]. At first, CoMoFoD database images are trained and then tested. In training process, 250 authentic images and 250 forged images are used for proposed IRVM model and the images are selected as randomly. In testing, the whole 500 images are divided into 5 sets of images and each set consists of 100 images. Each and every set is trained and tested with IRVM. The performance is evaluated in terms of sensitivity, F-measure, specificity, G-mean, precision and accuracy. The simulation results are evaluated by using MATLAB.

4.1 Input Database: CoMoFoD

CoMoFoD database [57] has 260 image sets, 200 images in small image category size of 512 × 512, and 60 images in large image category size of 3000 × 2000. In CoMoFoD database images, the given below transformations are applied to check the image quality.

  • In translation, without performing any transformation, a copied region is only transformed to the new location,

  • In rotation, rotated a copied region and transformed to the new location,

  • In scaling, scaled a copied region and transformed to the new location,

  • In distortion, distorted a copied region and transformed to the new location,

  • In combination, applied a two or more transformation on a copied region before moving it to the new location.

In this proposed system, small image category (512 × 512) has been used for evaluation. It is downloading from http://www.vcl.fer.hr/comofod/download.html

4.2 Evolution Parameter for Measuring Forgery

In this paper, some appropriate measures are used to evaluate the performance of the IRVM based copy-move detection method. The measures [58] like sensitivity (i.e. \(Sen\)), specificity (i.e. \(Spc\)), accuracy (i.e. \(Acc\)) and precision (p), recall (r), f-measure and g-mean are used. The \(p\) and \(r\) are checked for varying block sizes. At the whole image level, let \(T_{p}\) indicates the value of true positive rate of images, \(F_{p}\) mentions the value of false positive rate of images, \(T_{n}\) indicates the value of true negative of images and \(F_{n}\) mentions the value of false negative rate of images. These measures are computed individually for every image and on average for the all test images

$$Sen = T_{p} /\left( {T_{p} + F_{n} } \right)$$
(18)
$$Spc = T_{n} /\left( {T_{n} + F_{p} } \right)$$
(19)
$$Acc = \left( {T_{p} + T_{n} } \right)/\left( {T_{p} + F_{n} + T_{n} + F_{p} } \right)$$
(20)

Precision (p) could be a measure for the likelihood that a detected forgery is really a forgery. It denotes the accuracy of the strategy.

$$p = T_{p} /\left( {T_{p} + F_{p} } \right)$$
(21)

Recall (r) is a measure for the probability that the forged image is detected. It denotes the completeness of the method.

$$r = T_{p} /\left( {T_{p} + F_{n} } \right)$$
(22)

F-Measure is calculated based on the given formula

$$F = 2 \cdot \frac{p.r}{p + r}$$
(23)

Positive Predictive Value (i.e. PPV) is calculated based on the given formula

$$PPV = T_{p} /\left( {T_{p} + F_{p} } \right)$$
(24)

Negative Predictive Value (i.e. NPV) is calculated based on the given formula

$$NPV = T_{N} /\left( {T_{N} + F_{N} } \right)$$
(25)

False Positive Rate (i.e. FPR) is calculated based on the given formula

$$FPR = 1 - specificity$$
(26)

False Negative Rate (i.e. FNR) is calculated based on the given formula

$$FNR = 1 - sensitivity$$
(27)

4.3 Training and Classification Procedure and Result

In CoMoFoD database, all Images is modeled through estimate the parameters of the images for IRVM. During training process, a set of images are used and it contains authentic and tampered images. Initially, the image is process and extracted the feature vectors. The features are given as input into IRVM. It processed the inputs based sigmoid kernel function and then selected the best weight values from GSO process. Based on this weight value the training values are predicted efficiently. Based on these training values, the test images are tested and classified as authentic image and forgery images. RVM is machine learning algorithms that use a high dimensional feature space and estimate differences among classes (i.e. authentic class and forgery class) of given data to generalize unseen data. In this system, 500 images are trained and tested. Figures 2 and 3 shows samples of authentic and forged images.

Fig. 2
figure 2

Images used for testing and correctly detected as authentic

Fig. 3
figure 3

Images used for testing and detected correctly as tampered

The proposed system performance is evaluated for all set of images (Set 1 to Set 5) and the numerical values are predicted in Table 2. It illustrates that, the number of images increases means the performance of proposed values also increases.

Table 2 Performance measures value for proposed method

The set of images were tested and trained and their parameters values are predicted and their average values also predicted and is shown in Table 3, 4 and 5.

Table 3 Evaluation of proposed method parameters numerical results
Table 4 Evaluation of existing HMM + SVM method parameters numerical results
Table 5 Evaluation of existing SVM method parameters numerical results

From the Table 3, 4 and 5 shows the evaluation of parameters numerical results for proposed IRVM and existing HMM + SVM and SVM methods. These tables illustrate the proposed IRVM attained best results compared than existing schemes due to efficient feature selection and efficient training process with optimized weights.

4.4 Performance Evaluation

Figures 4, 5, 6, 7, 8, 9, 10 and 11 shows that the overall performance [20, 36, 47, 54] of proposed IRVM and existing HMM + SVM, SVM forgery detection schemes for CoMoFoD database. The figures illustrate the performance of accuracy value is high in proposed IRVM due to the optimal weight prediction and BWT based decomposition. This reduce noise of image in proposed scheme. So, it increased the performance of proposed scheme. So, it increased the performance of the proposed scheme.  The sensitivity, specificity values are high in proposed scheme, when increase the number of image, the performance also increased. The proposed system ha low false positive rate and low positive negative rate, and these measures are predicted from precision and recall values. The f-measure and Geometrical means (G-mean) measures also have high value in proposed IRVM compared than existing HMM + SVM and SVM methods.

Fig. 4
figure 4

Accuracy comparison

Fig. 5
figure 5

Sensitivity comparison

Fig. 6
figure 6

Specificity comparison

Fig. 7
figure 7

F-measure comparison

Fig. 8
figure 8

G-mean comparison

Fig. 9
figure 9

Precision comparison

Fig. 10
figure 10

Recall comparison

Fig. 11
figure 11

Overall performance prediction for all classification methods

The evaluation of other parameters like precision, recall, PPV, NPV, FPR and FNR are evaluated for all classifiers and their evaluation results are showed in Table 6. It shows the proposed IRVM attained high results compared than existing schemes.

Table 6 Evaluation of other parameters numerical results for all classifiers

From the Table 7, only the HMM + SVM method has ability to manage a sensitivity with rate of 90% but it has attained low specificity compared than proposed scheme due to the high training time of SVM. The SVM also has attained less accuracy compared than proposed scheme due to the computational complexity.

Table 7 Overall performance numerical values of forgery detection methods

As well as, the proposed IRVM scheme attained high performance with high accuracy rate of 92.22%, sensitivity rate of 88.4%, specificity rate of 97.6%, F-measure rate of 92.24%, G-mean rate of 92.31%, precision rate of 96.87% and recall rate of 88.4% compared than existing scheme and their comparative Bar-chart is shown in Fig. 11.

5 Conclusion

In this paper, IRVM based copy-move forgery detection has been proposed with BWT. The main contribution of this work is that it carries out copy-move detection in image bocks, which significantly narrows comparison of the similar blocks, thus reducing the computational complexity. Initially, the input color image has been converted into grey scale. After that, the Biorthogonal Wavelet Transform (BWT) is used to reduce noise and extract the feature. Then, the, the feature vectors are sorted in lexicographically and the duplicate vectors are identified by similarity between two successive vectors. To decide the similarity of vectors, Minkowski distance and Threshold value is used. Finally, the Improved RVM has been carried out with GSO algorithm to detect the forgery. Experimental results show the effectiveness of the proposed IRVM scheme attained high performance with high accuracy rate of 92.22%, sensitivity rate of 88.4%, specificity rate of 97.6%, F-measure rate of 92.24%, G-mean rate of 92.31%, precision rate of 96.87% and recall rate of 88.4% compared than existing, also its robustness against after-copying operations, and detection of multiple copy-move forgery. In future, some other machine learning or neural network based forgery detection will focus with same texture instead of the whole image.