Next Article in Journal
Comparative Assessment of Shear Demand for RC Beam-Column Joints under Earthquake Loading
Previous Article in Journal
Research on a Wi-Fi RSSI Calibration Algorithm Based on WOA-BPNN for Indoor Positioning
Previous Article in Special Issue
Multimodal Biometric Template Protection Based on a Cancelable SoftmaxOut Fusion Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators

1
School of Computer Science and Engineering, Kyungpook National University, Daegu 41566, Korea
2
School of Engineering & Technology, Amity University, Noida 201301, Uttar Pradesh, India
3
Department of Cyber Security, Kyungil University, Gyeongsan 38424, Korea
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2022, 12(14), 7152; https://doi.org/10.3390/app12147152
Submission received: 30 May 2022 / Revised: 27 June 2022 / Accepted: 28 June 2022 / Published: 15 July 2022
(This article belongs to the Special Issue Real-Time Technique in Multimedia Security and Content Protection)

Abstract

:
Digital image forensics has become necessary as an emerging technology. Images can be adulterated effortlessly using image tools. The latest techniques are available to detect whether an image is adulterated by a particular operator. Most of the existing techniques are suitable for high resolution and manipulated images by a single operator. In a real scenario, multiple operators are applied to manipulate the image many times. In this paper, a robust moderate-sized convolutional neural network is proposed to identify manipulation operators and also the operator’s sequence for two operators in particular. The proposed bottleneck approach is used to make the network deeper and reduce the computational cost. Only one pooling layer, called a global averaging pooling layer, is utilized to retain the maximum flow of information and to avoid the overfitting issue between the layers. The proposed network is also robust against low resolution and JPEG compressed images. Even though the detection of the operator is challenging due to the limited availability of statistical information in low resolution and JPEG compressed images, the proposed model can also detect an operator with different parameters and compression quality factors that are not considered in training.

1. Introduction

Digital images are a victim of manipulation due to the ease of availability of high precision but uncomplicated image editing tools. Image forensics is needed to detect the source, processing history, and genuineness of the image. Numerous methods [1,2,3] are provided to find the source device of the image. The mismatch of source assists in image forgery detection as a fake image is created usually by using two or more images. Most of the fake images look realistic by applying multiple spatial operations. The detection of operations such as resampling [4,5], sharpening [6,7,8], and median filtering [9,10] can make uncovering the image forgery easy. Many universal methods [11,12,13,14,15,16,17,18,19,20,21] also exist to detect the image forgery operations simultaneously. However, universal methods can only effectively detect a single operation on an image. In the real scenario, more than one operation is applied to the image in general. In this paper, a sequence of operations can be detected perfectly to unfold the processing history of the image. Few techniques [22,23,24,25,26] exist that can detect the operations and the order of operations. Although the performance is not consistent according to different operations, JPEG compression has a significant role in the forensic analysis as the most common format. The performance in most of the existing techniques degrades while considering JPEG compression.
In the recent era of a deep learning network, a convolutional neural network has given propitious results in many applications. A convolutional neural network (CNN) is utilized in the detection of median filtering, resampling, universal image manipulation, multiple JPEG compression, contrast enhancement, image splicing, etc. Qiu et al. [11] discovered that some existing techniques, especially LBP [27] and SRM [28], can effectively detect different types of image operations such as Gaussian filtering, median filtering, image resizing, gamma correction, and compression history. The experiments are performed on large-size images, where the experimental analysis is limited as different compression qualities and filter sizes are combined in one data set. Bayar and Stamm [12] introduced the CNN for the detection of additive white Gaussian noise, Gaussian filtering, median filtering, and image resizing for the first time. In particular, a constrained design is applied in the first layer of the proposed CNN. Experimental results are given for 227 × 227 image blocks. However, no experimental analysis was given for low resolution and JPEG compressed images. The proposed idea of constraint is further extended with an improved CNN model [13], and JPEG compression is used in the experimental analysis. In the improved CNN architecture, a constrained convolutional layer is followed by four blocks, and each block contains a convolutional layer, batch normalization layer, ReLU layer, and pooling layer. Further, three softmax classification layers are used, and the outputs are classified using an extremely randomized tree classifier. The constrained convolutional layer filters can predict the errors by subtracting the resultant value from the central value of the filter window. The constraint is enforced during the training of each iteration. However, the performance of the improved CNN model falls in the most cases when two operators are applied consecutively on the image even on a large size image. Li et al. [14] selected some sub-models from SRM by calculating the out-of-bag error. The selection process can reduce the feature dimension noticeably. The results are analyzed for eleven image operations of several categories like spatial filtering, image enhancement, and JPEG compression. The proposed technique also claims good results in the detection of four anti-forensic operations such as JPEG compression, contrast enhancement, resampling, and median filtering. However, the performance degrades for small-size images. Boroumand and Fridrich [15] proposed a model using CNN and multilayer perceptron (MLP) for high-pass filtering, low-pass filtering, de-noising, and tonal adjustment that has four types of operations. Eight convolutional layers are utilized in the proposed CNN. The MLP classifies the images using moments that are extracted in the last part of the CNN model. The aforementioned method is also compared with the manual feature extraction method. The experiments are discussed for 512 × 512 size images only. Mazumdar et al. [16,17] utilized the Siamese network for pair-wise learning. Two identical networks are used to classify multiple operations—median filtering, Gaussian filtering, gamma correction, additive white Gaussian noise, and image resizing. The authors claim that the proposed method can detect a processed image for an unseen operation that is not included in the training. The choice of a two-stream CNN architecture gives better performance than analogous single-stream architecture [13]. However, the model capability decreases on unknown data sets abruptly. Chen et al. [18] discussed the densely connected CNN model for detecting eleven types of operations. Each dense block is followed by a transition layer and pooling layer. The transition layer performs 1 × 1 convolutions to reduce the number of feature maps and computation costs. The dataset of training and testing is the same which can make unbiased performance evaluation difficult. Xue et al. [19] applied the Siamese network for identifying some operations like as inclusion of text, logo, and black block in the image. Operations also include image resampling, Gaussian noise, and Gamma correction. The Siamese network utilized the AlexNet and ResNet-18. Uncompressed images are considered only in experiments. Singhal et al. [20] introduced a CNN model with two convolutional layers only to detect seven types of operations. DCT coefficients of median filter residual are used as input in the CNN network. Large-size filters are used in the convolutional layer. Barni et al. [21] detected image operations like median filtering, image resizing, and histogram equalization. The features are extracted using two neural networks [12,29]. A random feature selection approach is utilized to select the robust features from the CNN network, and an SVM classifier is applied to find the type of attack finally.
Detection of image operations order is also a great concern for a deep understanding of image processing history. Some efforts [22,23,24,25,26] are performed to detect the order of operations. In [22,23], an analysis is given to find the reasons for the non-detection of operator sequence order, where a framework based on mutual information is suggested. The methods are not able to detect some operator sequences. JPEG compressed images are not detectable using the previous model. Comesaña [24] discussed the theoretical possibilities of operator order detection. Bayar and Stamm [25] discussed a CNN with a constrained convolution layer for estimating the order of operations. Liao et al. [26] suggested two-stream CNN, to find out the operators and their respective orders. Though a customized preprocessing is required to apply for each operation, the method can detect operation even for an unknown parameter on the same operation using weight transfer.
In this paper, a non-reducing convolutional neural network is proposed that can assure the maximal flow of details between layers. The specific contributions of the proposed network can be outlined as follows:
  • The proposed non-reducing CNN can detect a dual-operated image and the operation sequence. Different types of operations such as median filtering, Gaussian blurring, image resizing, and un-sharp masking are detected successfully.
  • Multiple convolutional layers are inserted in the CNN network by adopting a bottleneck approach in the proposed method. The computational requirement of the proposed CNN is less due to fewer learning parameters. However, the proposed method has a performance improvement by the bottleneck approach.
  • To retain maximum statistical information, no pooling layer is interleaved between the convolutional layers. Since a pooling layer can reduce the computational cost with the sacrifice of relevant operation fingerprints that are inherited.
  • To avoid the overfitting issue and boost the performance, one global averaging pooling layer is utilized. An additional improvement of more than two percent in the detection accuracy can achieve by using a global averaging pooling layer in most of the cases.
  • The proposed method can ensure a better performance in challenging environments with low-resolution images and dual operators manipulation without specific preprocessing requirements.
The remaining paper is organized as follows. In Section 2, a problem is formulated for the dual operator manipulation detection in multiple scenarios. The proposed non-reducing CNN model is explained in Section 3. Detailed experimental analysis is performed in Section 4 with comparative analysis. The important advantages of the proposed scheme are highlighted in Section 5.

2. Detection of Image Processing Operator Sequence

In this section, three issues are discussed to address the importance of image forensics for operator sequence. In the first, the problem of detecting image operator sequence with its order is discussed. In the second, image processing history will be discovered for compressed images. In the third, a challenging detection scenario is discussed in which specification is dissimilar.

2.1. Problem Formulation

Assuming that there are two operators, α and β, in the image operation sequence, the detection of a dual operator sequence can be understood as a multiclass classification problem. The five classes according to processing history can be formulated:
  • Ω0: An image is not operated by any operator;
  • Ω1: An image is operated by α operator;
  • Ω2: An image is operated by β operator;
  • Ω3: The first image is operated by α then operated by β;
  • Ω4: The first image is operated by β then operated by α.
Image histograms can be visualized to recognize the detection complexity of dual operator sequence. Image histogram provides the summary of image pixels according to their intensity. The changes in the pixel intensity are unavoidable when applying any type of operator. A single image is considered to understand changes in the image after applying some operator. In Figure 1, a pristine image (ORI) with 128 × 128 pixels in BOSSbase [30] and a corresponding histogram are shown.
In Figure 2, histograms of the pristine image (Figure 1a) are displayed after applying a single operator and dual operator sequence. Four operators—Gaussian blurring with standard deviation 1.0 (GAU_1.0), median filtering with filter size 5 × 5 (MF5), un-sharp masking sharpening with radius 3.0 (SH_3.0), up-sampling with factor 1.5 (UP_1.5) and their two operator sequence from GAU_1.0 MF5 to UP_1.5 GAU_1.0 are considered. As discussed above, five classes are possible while considering two operators—GAU_1.0 and MF5 for example. There is a slight difference in the histograms of Ω1 (GAU_1.0), Ω2 (MF5), Ω3 (GAU_1.0 MF5), and Ω4 (MF5 GAU_1.0) as shown in Figure 2. A similar pattern is also followed by other operators. The histogram of the median filtered image is very similar to the pristine image histogram. It is due to the nonlinear behavior of the median filter. Further, the internal statistical information becomes limited while operated by dual operators.
One attempt [23] is made to detect the image resizing and Gaussian blurring operations pair. The image features are visualized in the frequency domain. However, the results are not encouraging for the operator sequence. The Ω3 and Ω4 operators sequence are not detectable. In spite that the strength of each operator varies, one operator artifacts in dual operators sequence can be suppressed by another operator.

2.2. Effectiveness on Compressed Images

JPEG is a common format to store the images. Most of the digital devices are using JPEG format as default in photos. In general, a fake photo is created using JPEG images. Multiple operations are applied to create fake photos. The fake photo is required to be stored again, which brings the double JPEG compression artifacts in the fake image. It is obvious that double JPEG compression has occurred in the sequence of fake image creation. Therefore, five possible classes according to JPEG quality factors Q1 and Q2 in the operator sequence of operator α and operator β can be defined as follows:
  • Ω0: Image is not operated by any operator and JPEG compressed with quality factor Q1;
  • Ω1: Image is JPEG compressed with quality factor Q1 and operated by α operator then JPEG compressed with quality factor Q2;
  • Ω2: Image is JPEG compressed with quality factor Q1 and operated by β operator then JPEG compressed with quality factor Q2;
  • Ω3: Image is operated by α then JPEG compressed with quality factor Q1, and again the image is operated by β then JPEG compressed with quality factor Q2;
  • Ω4: Image is operated by β then JPEG compressed with quality factor Q1, and again the image is operated by α then JPEG compressed with quality factor Q2.
JPEG compression diminishes the artifacts of operators. Multiple operators and double JPEG compression can raise the complexity of the problem.

2.3. Detection for Dissimilar Parameters and Compression

In existing techniques, the operator parameters of training and testing images are the same. However, the operator parameters can be mismatched still even operator is the same in a real scenario. In [29], an attempt is proposed to detect the various type of tonal adjustments for unknown parameters. The proposed deep CNN model works efficiently for JPEG compressed images. However, the results on unknown parameters of an operator are not encouraging for using existing universal operator detectors. The constrained CNN [25] is applied for two operator sequences—Gaussian blurring and resizing. The parameters of Gaussian blurring and resizing are a standard deviation of 0.7, and a scaling factor of 1.2 for training and a standard deviation of 1.0, and a scaling factor of 1.5 for testing, respectively. The possible five classes are not classified properly, as can be seen in the confusion matrix in the two operator sequences as shown in Figure 3.
The requirement of robustness against dissimilar parameters is more challenging. However, it is a more practical and real situation. In this paper, a universal operator detector is proposed in a more real situation, in other words, for dissimilar parameters. The proposed deep model is suitable for both single-operator and dual-operator sequences. The dissimilar parameters are considered in a particular range. The proposed technique can learn features for detecting operator sequences automatically by using bottleneck CNN. Bottleneck blocks required less computation cost, which can help in increasing the layers. In the proposed model, there is no need for handcrafted feature extraction and selection as required in traditional machine learning. In previous literature, customized preprocessing is needed for different operators. In the proposed techniques, images are not required to undergo any type of preprocessing. However, there is a need for preprocessing according to the operator in some previous works [20,26]. The proposed CNN can highlight the statistical anomaly and classify successfully the five classes discussed above.

3. Framework of the Proposed CNN

The CNN has proved its worthiness in many applications such as image classification, fake face detection, image forgery detection, etc. In this paper, a robust deep architecture is proposed to detect single and dual operators in the processed images. The proposed architecture is effective on both compressed and non-compressed images. The proposed CNN architecture can suppress the need for any preprocessing layer as used in some previous techniques [20,26]. In the previous techniques, exclusive preprocessing is required according to the operator, which is not feasible in a practical situation and restricted the network performance for particular operators. When two operations are applied simultaneously, the artifacts of the first operator can be diminished by the second operator. In Figure 4, some pairs of operators are considered to check the behavior of operations on the BOSSbase [30] image database. The normal distribution of image entropy is reflected in the plots. There is an overlap in some places for five possible cases of two operators, where the overlapping makes the problem challenging.
The proposed architecture can resist the problem of operator sequence in a better way. The CNN contains multiple layers and filters to classify the input into their respective classes. The CNN parameters like weight and biases are updated as the network learns. The image input layer is followed by seven blocks and four layers in the proposed CNN. The block diagram of the proposed CNN is shown in Figure 5.
Each block in the network has two convolutional layers, followed by the batch normalization (BN) layer and the ReLU layer. No padding is used in any layer of the proposed CNN to retain the maximum statistical information. The first convolution layer performs 1x1 point-wise convolution. The second convolution layer performs 3 × 3 depth-wise convolution. In steganalysis [31], 1 × 1 point-wise convolution improves the results when applied with a depth-wise convolution. The training parameters of the proposed seven CNN blocks are 113,728. However, training parameters become 175,680 while considering a 3 × 3 size filter instead of a 1 × 1 size filter in the first convolutional layer in each block. The computational complexity can reduce by using a 1 × 1 filter and a 3 × 3 filter, consecutively. The performance improvement is also noticed in experiments as shown in Figure 6. The detection accuracy using Conv 1 × 1 is 92.47% and 91.37% for Conv 3 × 3 in the first layer of each block for two operator sequences, where α = GAU_1.0 & β = MF5 with JPEG compression Q1 = 85 & Q2 = 75. The training time using Conv 1 × 1 is only one-third in comparison to Conv 3 × 3 training time and also has an improvement in the detection accuracy. Therefore, there are two considerable benefits of following the bottleneck approach.
The abstract diagram of the bottleneck approach and internal detail of blocks can be observed in Figure 7. The first and second convolution layer contains 64 filters of size 1 × 1 and 3 × 3 in blocks 1 and 5. Equal numbers of filters are considered as filter size 1 × 1 in 3 × 3 convolutional layers for every particular block. Convolutional layers are utilized 32 filters in block 2, block 4, and block 6. Convolutional layers are utilized 16 filters in block 3 and block 7. The stride of one is considered in each convolution layer. The batch normalization (BN) layer is used to increase the training pace and decrease the sensitivity to network initialization. The BN layer can diminish the inner covariant shift [32]. The learning parameters are updated according to the mean and variance of a mini-batch. After the training process is completed, the final values mean and variance of the BN layer are used for predicting the unseen data. The ReLU layer [33] replaces negative values with zero to improve the network performance.
Merely numbers of filters are changed in other blocks; the rest of the detail is similar to block 1. After the seven blocks, the global average pooling layer is followed by a fully connected layer, softmax layer, and classification layer. As the internal statistical information details are very crucial and the size of the image is also small, therefore only one global average pooling (GAP) layer is applied to prevent further information loss in the proposed network. In steganalysis [34,35], the global average pooling layer can enhance performance. Global average pooling is applied to achieve a single element from each feature map. The global average pooling layer increases the efficiency of the fully connected layer.
It is discovered in the experimental analysis that the GAP layer can increase the detection accuracy from 1% to 3%. The GAP is applied in the end only to retain the operation fingerprints. The GAP layer also reduces the overfitting issue [36]. The detection accuracy with the GAP layer is 92.47% and is 90.01% without the GAP layer for operator sequence GAU_1.0 and MF5 with JPEG compression Q1 = 85 & Q2 = 75. Therefore, there is a benefit of more than 2% in the detection accuracy after using the GAP layer. Additionally, as shown in Figure 8, the difference between validation and the testing accuracy is much less while using the GAP layer and without the GAP layer. The overfitting issue is well tackled by the GAP layer with a performance improvement.
Experiments are also performed with multiple pooling layers, however, they lead to poor performance in the end. Therefore, a single GAP layer is considered in the experiment analysis section. In the proposed CNN, the GAP layer produces 16 features, as the last convolutional layer has 16 filters. The fully connected layer combines all of the information learned from the previous layers. The input is multiplied by the weight matrix and the bias is added. The output size of the fully connected layer is five according to our problem, which has five classes. The output of the fully connected layer is processed by the softmax function. The softmax function is assigned the probability to every class. However, the sum of all probabilities should be 1. Finally, the classification layer assigns the exclusive class according to cross-entropy loss. Weight initialization of CNN is very crucial and can affect performance considerably. Additionally, random values are taken for network initialization in the previous step. However, it is not a practical solution and the performance of the network cannot be compared due to weight initialization. Glorot and Bengio [37] suggested a weight initialization strategy to give a better performance and fast convergence. The approach is more suitable for a less deep network like our proposed CNN. The weights are initialized according to the number of inputs and hidden nodes. The filter’s behavior can be understood by analyzing as in Figure 9. In the first column, two pristine images are shown and their corresponding filtered images are shown in 4 × 4 tiles in the second and third columns. Second column images filtered from layer 6 kernels displayed the coarse details, and third column images filtered from layer 15 kernels showed the fine details. The behavior of layer kernels is changed according to the position of the layer. The information provided by layers kernels becomes coarse to fine while traversing the network from start to end.
The proposed network parameters are tuned with the help of exhaustive experimental analysis. The following parameters are considered in the network design. The stochastic gradient descent (SGD) algorithm is applied to curtail the loss function. In each iteration, mini-batch SGD is used to calculate the gradient and revise the weight and biases. The softmax classifier is utilized to minimize the cross-entropy between the estimated class and true class, where the momentum quantity is taken as 0.9, the number of epochs is 30, L2-regularization is 0.0004, and the initial learning rate is 0.001. The data is shuffled to avoid any unfairness toward unseen data in each epoch.
In the next section, experimental results are discussed. Most of the experiments are performed to detect the dual operator sequence. Experiments are performed together for uncompressed and JPEG compressed images.

4. Experimental Results

Various experiments are performed to confirm the robustness and versatility of the proposed network. The first dataset is created using UCID [38], LIRMM [39], and Never-compressed (NC) [40] image databases, where UCID, LIRMM and NC contain 1338, 10,000 and 5150 uncompressed color images, respectively. The center block with 256 × 256 of each image is taken from databases. Further, 16 non-overlapping blocks of size 64 × 64 pixels are created. In the final, 263,808 image patches of size 64 × 64 pixels are generated and 30,000 patches of size 64 × 64 pixels are selected in each operator. Five operators—Gaussian blurring (GAU_P), median filtering of filter size 3 × 3 and 5 × 5 (MF3, MF5), un-sharp masking sharpening (SH_P), and up-sampling (UP_P) with different parameters P—are considered in experimental analysis. Symmetric padding is considered while applying the operator to the image. It is important to observe that 30,000 patches are selected randomly to get unbiased results for each operator. In the first dataset, 24,000 images are used for training and 6000 images for validation for each class. BOSSbase [30] dataset is considered for testing as a cross-database. It contains 10,000 uncompressed images of size 512 × 512. A similar approach is applied to create the image patches as in the first dataset and 160,000 image patches with 64 × 64 size are created. For each operator, 15,000 patches are used for testing. Experiments are performed using NVIDIA GTX1070 GPU with 24 GB RAM.
In the next part, the results of two operators with compressed and non-compressed images are discussed. Next, the results are shown for dissimilar parameters like compression, and the results are compared with some state-of-the-art methods.

4.1. Detection of Dual Operators Sequence for Similar Specification

In this section, the robustness of the proposed technique is discussed on two operator sequences under multiple parameters of operators. The specification is the same as used in CNN model training. The detection accuracy of the two operator sequences is given for the possible five classes as discussed in Section 2.1. Ω0 class denotes the pristine image, Ω1 class denotes images operated by operator α, Ω2 class denotes images operated by operator β, Ω3 class denotes images first operated by operator α than operator β, and Ω4 class denotes images first operated by operator β than operator α. There are 15,000 images of the five classes in the testing set. It can be noticed from the Confusion matrix of operators, Gaussian blurring with standard deviation 1.0 (GAU_1.0) sequence, and median filtering of filter size 3 × 3 (MF3) as shown in Figure 10, where the proposed CNN network can classify two operator sequence images with good accuracy. The experimental results show that 991 GAU_1.0 operated images out of 15,000 GAU_1.0 operated images are misclassified in class Ω4, which is first operated by MF3 and then operated by GAU_1.0.
The detailed results of the detection accuracy for different operator pairs are shown in Table 1. Gaussian blurring with standard deviation 0.7 (GAU_0.7), 1.0 (GAU_1.0), median filtering of filter size 3 × 3 (MF3), 5 × 5 (MF5), un-sharp masking sharpening with radius 2.0 (SH_2.0), 3.0 (SH_3.0), up-sampling with factor 1.2 (UP_1.2) and 1.5 (UP_1.5) operators are considered, where pairs of operators are represented in Table 1 for α and β. The average detection accuracy of five classes is more than 92% in all of the cases. The operator sequence with operator SH_2.0 or SH_3.0 is more challenging when compared with other operators, as shown in Table 1. The internal statistical information of an image is highly affected after applying un-sharp masking than other operators, as can be seen in Figure 4.
As shown in Figure 11, the behavior of operators can also be visualized in the plot of mini-batch loss. The curve of α = GAU_0.7 & β = UP_1.2 becomes stable shortly with fewer peaks and valleys in the curve if compared with α = GAU_0.7 and β = SH_2.0. Similar attributes of stability are also followed by UP_1.5.
The JPEG format is widely used when the visual quality remains good even after the compression in a real scenario as the default format. Therefore, three steps are considered in the detection of operator sequences in compressed images. In the first, the image is JPEG compressed with quality factor Q1. The operator sequence is applied to compressed images in step 2. In step 3, JPEG compression is applied with quality factor Q2. Detailed discussion regarding JPEG compression is given in Section 2.2. The confusion matrix of five class classifications on compressed images with Q1 = 75 and Q2 = 85 is shown in Figure 12. Two operators, Gaussian blurring with standard deviation 1.0 (GAU_1.0) and up-sampling with factor 1.5 (UP_1.5) are considered. The performance of the proposed CNN can degrade on compressed images in comparison to the uncompressed images. However, while considering the small image size (64 × 64) and low compression quality factors, the performance is satisfactory.
In Table 2, the results are shown for compressed images. The number of images for training, validation, and testing is similar to be considered in uncompressed images. Multiple compression quality factors are considered to visualize in the real scenario for Q1 = Q2, Q1 < Q2, and Q1 > Q2. The difference between quality factors Q1 and Q2 are also varied from 5 to 20. Compression omits the artifacts of the operator. Still, the average detection accuracy is nearly 90% in most of the cases. Even for α = GAU_0.8 and β = MF3, the detection accuracy is more than 95%. Two cases are considered for α = GAU_1.0 and β = MF5 on Q1 = 75 and Q2 = 85 as a first case and Q1 = 85 and Q2 = 75 as a second case. As can be seen in Table 2, the detection accuracy is 94.66 in the first case and 92.47 in the second. The high value of Q2 in the first case is the reason for its better detection accuracy in comparison to the second case. The artifacts of operators are better traceable for a high-quality factor compression.
In this paper, all experiments are performed for the detection of two operator sequences except for single operator detection, as shown in Table 3. In Set 1, pristine images and images operated with four different operations—un-sharp masking, up-sampling, median filtering, and Gaussian blurring—are classified. The average detection accuracies for uncompressed images and compressed images with Q = 85 are 97.09% and 88.62%, respectively. Set 2 is constructed with the same operators as in Set 1, but with different parameter settings. In Set 2, the performance is also up to the mark.

4.2. Detection of Dual Operators Sequence for Dissimilar Specification

Operators have the same parameter settings in training and testing for the experimental analysis above. However, operators may be the same, but the parameters of operators may vary in the real scenario. To assess the robustness of the proposed method against dissimilar specifications of operators, some experiments are performed. As can be seen in the first row of Table 4, four values of standard deviation for Gaussian blurring {0.7, 0.8, 0.9, 1.0} are considered for training. A total of 60,000 images are used in training operated by Gaussian blurring and 15,000 images are operated by the four Gaussian blurring parameters. A total of 40,000 images are used to test operated by Gaussian blurring for 1334 images and operated by 300 Gaussian blurring parameters like the range of the parameters from 0.701 to 0.900. Therefore, a total of 300,000 images are used for training, and 200,000 are used for testing the detection of five-class classification problems of two operator sequence. Similarly, parameters are defined in Table 4 for other operators. The performance of the proposed CNN model is also excellent in dissimilar specifications. One scenario of compressed images with Q1 = 80 and Q2 = 90 is also displayed in Table 4 for operators α = GAU and β = UP. There is some reduction in the detection accuracy even still it is greater than 94%.
Here, some results are discussed for dissimilar compression factors on training and testing images. In the first row of Table 5, the JPEG compression quality factors for training images are Q1 = 85 and Q2 = 75 and Q1 = 80 and Q2 = 75 for testing images. The other operator parameters are the same for training and testing. In that case, there is still 92.40% detection accuracy. However, the performance deteriorates when the compression quality factor difference is more than 5. The performance of the proposed model is robust for quality factor difference 5 in training and testing images.

4.3. Comparative Analysis

The proposed CNN can classify two operators and their sequence in low resolution, compressed, and uncompressed images. The detailed experimental analysis is discussed above. Here, the results of the proposed scheme are compared with some other state-of-the-art techniques. In the CNN model [13], a constrained convolutional layer is introduced, unlike other traditional models. Different size filters, 7 × 7, 5 × 5, and 3 × 3 are used in the convolutional layer. In our experimental analysis, small-size filters are more suitable for detecting an image processing operation as shown in Figure 13. Bayar and Stamm [25] applied a modified constrained convolution layer on image residual for better results. The results are improved after modification, but still, there is a gap in the performance due to a lower number of convolutional layers and large-size filters. Liao et al. [26] proposed the two-stream CNN model. The results of the two-stream model are impressive. The idea of detection of operator sequence is also a milestone in the research. The two-stream model can detect known as operators with unknown specifications. The computational cost is very high due to a large number of layers and customized preprocessing that need to be applied for the detection of different operators and compressed images. Our proposed network is moderate in size and requires less computation due to the bottleneck approach. The bottleneck approach can reduce the learning parameters and allow for increasing the network depth. Results are compared in Figure 13 for multiple scenarios. Both uncompressed and compressed types of images are considered in the comparison. The operators α, β, and compression status are shown in the first, second, and third row in Figure 13.
Further, a detailed comparative analysis is performed with the method [26] because it is comparable with the proposed method. The other compared methods [13,25] performance is quite low as displayed in Figure 13. In Table 6, the average classification error of five class classifications is presented. The performance of Liao et al. [26] is inferior to our proposed architecture due to several reasons. Primarily, Liao’s CNN contains multiple pooling layers that lose vital statistical information. Large size kernels have also reduced the performance. In the proposed CNN, a non-reducing approach is followed to retain inherited fingerprints as many as possible. The minimum reduction in classification error is for α = MF5 & β = UP_1.5, i.e., 2.25% and the highest reduction in classification error is for α = SH_2.0 & β = UP_1.2, i.e., 9.22% of the proposed scheme. Therefore, there is substantial improvement in detection performance.
In Table 7, a comparative analysis is given for JPEG compressed images. For uncompressed images, the performance of the proposed CNN is already found superior to Liao’s CNN. Multiple compression factors are considered for unbiased analysis. The bottleneck approach allows fourteen convolution layers without the extra burden on computational cost. The classification error of Liao et al. [26] is less than the proposed scheme only in one case, i.e., α = GAU_1.0 & β = UP_1.5. Otherwise, the proposed CNN outperforms with a good score. The average classification error of the proposed method is less and exclusive of specific preprocessing.

5. Conclusions

Digital images have turned out to be the most accepted representation of information. The latest technologies have empowered naive users to create fake images effortlessly. Though, multiple operations have been performed to construct a real-looking fake image. The detection of manipulation operations has assisted to find the fake image. At present, deep learning approaches have been taken into the place of handcrafted feature extraction methods. A convolutional neural network has been suggested to preserve the authenticity of images. Thus, most techniques have been suggested for single operator detection so far. Very few techniques have been discussed to identify the dual operators and the order of operators. The proposed deep learning model could detect consecutive dual operators on the image and its corresponding order precisely. The bottleneck approach has been applied in the model to increase the layers and reduced the parameters. Unlike previous networks, one single global averaging pooling layer has been utilized to reduce the information loss and overfitting problem. The proposed model has been performed robustly against challenging scenarios like low-resolution images and compression in the exhaustive experimental analysis.

Author Contributions

Each author discussed the details of the manuscript and contributed equally to its preparation. S.-H.C. designed and wrote the manuscript. S.A. implemented the proposed technique and provided the experimental results. S.-J.K. reviewed the article. K.-H.J. drafted and revised the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2021R1I1A3049788) and Brain Pool program funded by the Ministry of Science and ICT through the National Research Foundation of Korea (2019H1D3A1A01101687, 2021H1D3A2A01099390).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets used in this paper are publicly available and their links are provided in the reference section.

Acknowledgments

We thank the anonymous reviewers for their valuable suggestions that improved the quality of this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yang, P.; Ni, R.; Zhao, Y.; Zhao, W. Source Camera Identification Based on Content-Adaptive Fusion Residual Networks. Pattern Recognit. Lett. 2019, 119, 195–204. [Google Scholar] [CrossRef]
  2. Ding, X.; Chen, Y.; Tang, Z.; Huang, Y. Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning. IEEE Access 2019, 7, 25878–25890. [Google Scholar] [CrossRef]
  3. Yang, P.; Baracchi, D.; Ni, R.; Zhao, Y.; Argenti, F.; Piva, A. A Survey of Deep Learning-Based Source Image Forensics. J. Imaging 2020, 6, 9. [Google Scholar] [CrossRef] [Green Version]
  4. Peng, A.; Wu, Y.; Kang, X. Revealing Traces of Image Resampling and Resampling Antiforensics. Adv. Multimed. 2017, 2017, 7130491. [Google Scholar] [CrossRef]
  5. Qiao, T.; Zhu, A.; Retraint, F. Exposing Image Resampling Forgery by Using Linear Parametric Model. Multimed. Tools Appl. 2018, 77, 1501–1523. [Google Scholar] [CrossRef]
  6. Wang, P.; Liu, F.; Yang, C.; Luo, X. Blind Forensics of Image Gamma Transformation and Its Application in Splicing Detection. J. Vis. Commun. Image Represent. 2018, 55, 80–90. [Google Scholar] [CrossRef]
  7. Sun, J.-Y.; Kim, S.-W.; Lee, S.-W.; Ko, S.-J. A Novel Contrast Enhancement Forensics Based on Convolutional Neural Networks. Signal Process. Image Commun. 2018, 63, 149–160. [Google Scholar] [CrossRef]
  8. Wang, P.; Liu, F.; Yang, C. Thresholding Binary Coding for Image Forensics of Weak Sharpening. Signal Process. Image Commun. 2020, 88, 115956. [Google Scholar] [CrossRef]
  9. Tang, H.; Ni, R.; Zhao, Y.; Li, X. Median Filtering Detection of Small-Size Image Based on CNN. J. Vis. Commun. Image Represent. 2018, 51, 162–168. [Google Scholar] [CrossRef]
  10. Zhang, J.; Liao, Y.; Zhu, X.; Wang, H.; Ding, J. A Deep Learning Approach in the Discrete Cosine Transform Domain to Median Filtering Forensics. IEEE Signal Process. Lett. 2020, 27, 276–280. [Google Scholar] [CrossRef]
  11. Qiu, X.; Li, H.; Luo, W.; Huang, J. A Universal Image Forensic Strategy Based on Steganalytic Model. In Proceedings of the IH and MMSec 2014—Proceedings of the 2014 ACM Information Hiding and Multimedia Security Workshop, Salzburg, Austria, 11–13 June 2014; pp. 165–170. [Google Scholar]
  12. Bayar, B.; Stamm, M.C. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security—IH&MMSec ’16, Vigo Galicia, Spain, 20–22 June 2016; pp. 5–10. [Google Scholar]
  13. Bayar, B.; Stamm, M.C. Constrained Convolutional Neural Networks: A New Approach towards General Purpose Image Manipulation Detection. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2691–2706. [Google Scholar] [CrossRef]
  14. Li, H.; Luo, W.; Qiu, X.; Huang, J. Identification of Various Image Operations Using Residual-Based Features. IEEE Trans. Circuits Syst. Video Technol. 2018, 28, 31–45. [Google Scholar] [CrossRef]
  15. Boroumand, M.; Fridrich, J. Deep Learning for Detecting Processing History of Images. In Proceedings of the IS and T International Symposium on Electronic Imaging Science and Technology, Burlingame, CA, USA, 28 January–1 February 2018. [Google Scholar]
  16. Mazumdar, A.; Singh, J.; Tomar, Y.S.; Bora, P.K. Universal Image Manipulation Detection Using Deep Siamese Convolutional Neural Network. arXiv 2018, arXiv:1808.06323 2018. [Google Scholar]
  17. Mazumdar, A.; Singh, J.; Tomar, Y.S.; Bora, P.K. Detection of Image Manipulations Using Siamese Convolutional Neural Networks. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2019; Volume 11941, pp. 226–233. ISBN 9783030348687. [Google Scholar]
  18. Chen, Y.; Kang, X.; Shi, Y.Q.; Wang, Z.J. A Multi-Purpose Image Forensic Method Using Densely Connected Convolutional Neural Networks. J. Real-Time Image Process. 2019, 16, 725–740. [Google Scholar] [CrossRef]
  19. Xue, H.; Liu, H.; Li, J.; Li, H.; Luo, J. Sed-Net: Detecting Multi-Type Edits of Images. In Proceedings of the 2020 IEEE International Conference on Multimedia and Expo (ICME), London, UK, 6–10 July 2020; pp. 1–6. [Google Scholar]
  20. Singhal, D.; Gupta, A.; Tripathi, A.; Kothari, R. CNN-Based Multiple Manipulation Detector Using Frequency Domain Features of Image Residuals. ACM Trans. Intell. Syst. Technol. 2020, 11, 1–26. [Google Scholar] [CrossRef]
  21. Barni, M.; Nowroozi, E.; Tondi, B.; Zhang, B. Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors against Adversarial Examples. In Proceedings of the ICASSP 2020—2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 4–8 May 2020; pp. 2977–2981. [Google Scholar]
  22. Stamm, M.C.; Chu, X.; Liu, K.J.R. Forensically Determining the Order of Signal Processing Operations. In Proceedings of the Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, 18–21 November 2013. [Google Scholar]
  23. Chu, X.; Chen, Y.; Liu, K.J.R. Detectability of the Order of Operations: An Information Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 2016, 11, 823–836. [Google Scholar] [CrossRef]
  24. Comesaña, P. Detection and Information Theoretic Measures for Quantifying the Distinguishability between Multimedia Operator Chains. In Proceedings of the WIFS 2012—Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Costa Adeje, Spain, 2–5 December 2012. [Google Scholar]
  25. Bayar, B.; Stamm, M.C. Towards Order of Processing Operations Detection in JPEG-Compressed Images with Convolutional Neural Networks. Electron. Imaging 2018, 30, art00009. [Google Scholar] [CrossRef] [Green Version]
  26. Liao, X.; Li, K.; Zhu, X.; Liu, K.J.R. Robust Detection of Image Operator Chain with Two-Stream Convolutional Neural Network. IEEE J. Sel. Top. Signal Process. 2020, 14, 955–968. [Google Scholar] [CrossRef]
  27. Shi, Y.Q.; Sutthiwan, P.; Chen, L. Textural Features for Steganalysis. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2013; Volume 7692, pp. 63–77. ISBN 9783642363726. [Google Scholar]
  28. Fridrich, J.; Kodovsky, J. Rich Models for Steganalysis of Digital Images. IEEE Trans. Inf. Forensics Secur. 2012, 7, 868–882. [Google Scholar] [CrossRef] [Green Version]
  29. Barni, M.; Costanzo, A.; Nowroozi, E.; Tondi, B. Cnn-Based Detection of Generic Contrast Adjustment with JPEG Post-Processing. In Proceedings of the International Conference on Image Processing (ICIP), Athens, Greece, 7–10 October 2018; pp. 3803–3807. [Google Scholar]
  30. Bas, P.; Filler, T.; Pevný, T. Break Our Steganographic System: The ins and outs of organizing BOSS. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2011; Volume 6958, pp. 59–70. ISBN 9783642241772. [Google Scholar]
  31. Xu, G.; Wu, H.-Z.; Shi, Y.-Q. Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Process. Lett. 2016, 23, 708–712. [Google Scholar] [CrossRef]
  32. Ioffe, S.; Szegedy, C. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on Machine Learning (ICML), Lille, France, 6–11 July 2015; pp. 448–456. [Google Scholar]
  33. Nair, V.; Hinton, G.E. Rectified Linear Units Improve Restricted Boltzmann Machines. In Proceedings of the ICML 2010—27th International Conference on Machine Learning, Haifa, Israel, 21–24 June 2010. [Google Scholar]
  34. Xu, G. Deep Convolutional Neural Network to Detect J-UNIWARD. In Proceedings of the IH and MMSec 2017—2017 ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA, 20–21 June 2017. [Google Scholar]
  35. Yedroudj, M.; Comby, F.; Chaumont, M. Yedroudj-Net: An Efficient CNN for Spatial Steganalysis. In Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, 15–20 April 2018; Volume 2018, pp. 2092–2096. [Google Scholar]
  36. Lin, M.; Chen, Q.; Yan, S. Network in Network. In Proceedings of the 2nd International Conference on Learning Representations, ICLR 2014—Conference Track Proceedings, Banff, AB, Canada, 14–16 April 2014. [Google Scholar]
  37. Xavier Glorot, Y.B. Understanding the Difficulty of Training Deep Feedforward Neural Networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, 13–15 May 2010; pp. 249–256. [Google Scholar]
  38. Schaefer, G.; Stich, M. UCID: An Uncompressed Color Image Database. In Storage and Retrieval Methods and Applications for Multimedia, Proceedings of the Electronic Imaging, San Jose, CA, USA, 18–22 January 2004; Yeung, M.M., Lienhart, R.W., Li, C.-S., Eds.; SPIE: Bellingham, WA, USA, 2004; Volume 5307, pp. 472–480. [Google Scholar]
  39. Abdulrahman, H.; Chaumont, M.; Montesinos, P.; Magnier, B. Color Image Steganalysis Based on Steerable Gaussian Filters Bank. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security—IH&MMSec ’16, Vigo Galicia, Spain, 20–22 June 2016; pp. 109–114. [Google Scholar]
  40. Liu, Q.; Chen, Z. Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images. ACM Trans. Intell. Syst. Technol. 2015, 5, 1–30. [Google Scholar] [CrossRef]
Figure 1. Pristine image and histogram.
Figure 1. Pristine image and histogram.
Applsci 12 07152 g001
Figure 2. Image histogram for a single operator and dual operators.
Figure 2. Image histogram for a single operator and dual operators.
Applsci 12 07152 g002
Figure 3. Confusion matrix for α = GAU_0.7 and β = UP_1.5.
Figure 3. Confusion matrix for α = GAU_0.7 and β = UP_1.5.
Applsci 12 07152 g003
Figure 4. Normal distribution of entropy after applying operator on the image set.
Figure 4. Normal distribution of entropy after applying operator on the image set.
Applsci 12 07152 g004
Figure 5. Block diagram of proposed CNN.
Figure 5. Block diagram of proposed CNN.
Applsci 12 07152 g005
Figure 6. Analysis of Conv 1 × 1 vs. Conv 3 × 3.
Figure 6. Analysis of Conv 1 × 1 vs. Conv 3 × 3.
Applsci 12 07152 g006
Figure 7. Bottleneck approach and details of blocks.
Figure 7. Bottleneck approach and details of blocks.
Applsci 12 07152 g007
Figure 8. GAP layer effect on validation and testing accuracy.
Figure 8. GAP layer effect on validation and testing accuracy.
Applsci 12 07152 g008
Figure 9. Filtered images of layer 6 and 15 kernels.
Figure 9. Filtered images of layer 6 and 15 kernels.
Applsci 12 07152 g009
Figure 10. Confusion matrix of GAU_1.0 and MF3 operator sequence.
Figure 10. Confusion matrix of GAU_1.0 and MF3 operator sequence.
Applsci 12 07152 g010
Figure 11. Mini-batch loss analysis.
Figure 11. Mini-batch loss analysis.
Applsci 12 07152 g011
Figure 12. Confusion matrix of GAU_1.0 and UP_1.5 operator sequence with Q1 = 75, Q2 = 85.
Figure 12. Confusion matrix of GAU_1.0 and UP_1.5 operator sequence with Q1 = 75, Q2 = 85.
Applsci 12 07152 g012
Figure 13. Comparative analysis in multiple scenarios.
Figure 13. Comparative analysis in multiple scenarios.
Applsci 12 07152 g013
Table 1. Operator sequence detection with similar specifications.
Table 1. Operator sequence detection with similar specifications.
α =GAU_1.0GAU_1.0GAU_1.0GAU_1.0GAU_1.0GAU_1.0GAU_0.7GAU_0.7GAU_0.7GAU_0.7GAU_0.7GAU_0.7
β =MF3MF5SH_2.0SH_3.0UP_1.2UP_1.5MF3MF5SH_2.0SH_3.0UP_1.2UP_1.5
Ω099.5199.4595.4798.0699.7799.7998.6198.5994.6493.4199.3399.17
Ω193.2998.4591.1695.8482.9794.9098.1599.0794.9794.4794.4099.59
Ω299.0594.3993.0890.4199.1399.5794.0282.3790.8791.4795.2395.53
Ω397.6597.7199.7499.9099.8599.8994.3092.3398.4396.9999.3699.31
Ω498.9599.0781.9483.7993.6796.4199.6699.7886.5690.1399.8699.86
Average Accuracy97.6997.8192.2893.6095.0798.1196.9594.4393.0993.3097.6398.69
α =MF3MF3MF3MF3MF5MF5MF5MF5SH_2.0SH_2.0SH_3.0SH_3.0
β =SH_2.0SH_3.0UP_1.2UP_1.5SH_2.0SH_3.0UP_1.2UP_1.5UP_1.2UP_1.5UP_1.2UP_1.5
Ω094.9794.4985.0393.0188.3392.2471.7183.1293.4196.0698.2996.51
Ω199.4399.3099.8299.8799.4598.7699.6599.6995.9594.3490.5692.81
Ω292.9192.9598.6898.8193.1593.5799.6599.5787.7695.0591.3783.06
Ω396.7797.1399.6999.5791.9995.5699.6799.7994.3778.0590.5995.59
Ω485.3687.6391.0698.8379.0685.2780.2387.3799.9199.8099.7699.00
Average Accuracy93.8994.3094.8598.0290.4093.0890.1893.9194.2892.6694.1193.39
Table 2. Operator sequence detection on compressed images with similar specifications.
Table 2. Operator sequence detection on compressed images with similar specifications.
αβCompressionΩ0Ω1Ω2Ω3Ω4Average Accuracy
GAU_1.0MF5Q1 = 90, Q2 = 7099.1392.5686.8991.9692.8092.67
GAU_1.0MF5Q1 = 75, Q2 = 8598.9194.2788.1492.8599.1394.66
GAU_1.0MF5Q1 = 85, Q2 = 7596.4490.0789.0390.5896.2492.47
GAU_1.0UP_1.5Q1 = 75, Q2 = 8598.9384.0998.7797.6068.2189.52
GAU_1.0UP_1.5Q1 = 85, Q2 = 8597.2973.1497.8391.5881.5288.27
GAU_0.9UP_1.2Q1 = 70, Q2 = 9099.8189.8797.5593.3266.2389.35
GAU_0.8MF3Q1 = 70, Q2 = 9099.5995.7694.6795.7291.4595.44
MF5UP_1.5Q1 = 75, Q2 = 8597.2878.2298.3596.2979.2189.87
MF5UP_1.5Q1 = 85, Q2 = 7597.3976.7097.9796.7971.8988.15
SH_2.0UP_1.2Q1 = 80, Q2 = 9097,6395.2394,8284.1790.1289.84
SH_3.0UP_1.5Q1 = 80, Q2 = 9098.2196.9794.5683.6789.4592.57
SH_3.0UP_1.5Q1 = 75, Q2 = 8598.2298.2396.2585.4580.4191.71
Table 3. Single operator detection.
Table 3. Single operator detection.
SetSingle OperatorUncompressedCompression Q = 85
Set 1ORI89.1585.93
SH_2.097.0182.14
UP_1.299.9183.37
MF599.8198.82
GAU_7.099.5692.84
Average Accuracy97.0988.62
Set 2ORI97.3990.81
SH_3.090.7083.08
UP_1.599.9990.92
MF399.8195.11
GAU_1.099.9395.17
Average Accuracy97.5691.02
Table 4. Detection for dissimilar operator specifications.
Table 4. Detection for dissimilar operator specifications.
OperatorTraining TestingCompressionΩ0Ω1Ω2Ω3Ω4Average Accuracy
αGAU = {0.7, 0.8, 0.9, 1.0}GAU = {0.701, 0.702, …, 0.899, 0.900}No99.1196.7599.4799.7395.0798.02
βUP = {1.5, 1.6, 1.7, 1.8}UP = {1.500, 1.501, …, 1.799, 1.800}
αGAU = {0.7, 0.8, 0.9, 1.0}GAU = {0.701, 0.702, …, 0.899, 0.900}Q1 = 8099.3996.4986.0694.1696.3594.49
βUP = {1.5, 1.6, 1.7, 1.8}UP = {1.500, 1.501, …, 1.799, 1.800}Q2 = 90
αGAU = {0.7, 0.8, 0.9, 1.0}GAU = {0.701, 0.702, …, 0.899, 0.900}No99.5988.3298.7298.5296.6396.36
βMF3, MF5MF3, MF5
αGAU_1.0GAU_1.0No99.8495.3098.1796.7199.0997.82
βUP = {1.4, 1.5, …, 1.9}UP = {1.400, 1.401, …, 1.899, 1.900}
Table 5. Detection for dissimilar JPEG compression quality factors.
Table 5. Detection for dissimilar JPEG compression quality factors.
OperatorCompressionΩ0Ω1Ω2Ω3Ω4Average Accuracy
αβTrainingTesting
GAU_1.0MF5Q1 = 85, Q2 = 75Q1 = 80, Q2 = 7594.7391.1789.2590.4496.4192.40
GAU_1.0MF5Q1 = 75, Q2 = 85Q1 = 85, Q2 = 7594.2676.2587.8456.5684.9079.96
GAU_1.0MF5Q1 = 85, Q2 = 75Q1 = 90, Q2 = 7597.2290.5589.0488.3191.5991.34
GAU_1.0UP_1.5Q1 = 85, Q2 = 85Q1 = 75, Q2 = 8587.0372.2299.5191.4480.7786.19
GAU_1.0UP_1.5Q1 = 75, Q2 = 85Q1 = 85, Q2 = 8591.9579.0192.7897.9665.5785.45
MF5UP_1.5Q1 = 85, Q2 = 75Q1 = 75, Q2 = 8578.5480.4198.1570.9796.6284.94
SH_3.0UP_1.5Q1 = 80, Q2 = 90Q1 = 75, Q2 = 8590.6499.3061.3983.9386.0184.26
SH_3.0UP_1.5Q1 = 75, Q2 = 85Q1 = 80, Q2 = 9093.5886.7899.0869.6369.9283.80
Table 6. Comparative analysis for uncompressed images.
Table 6. Comparative analysis for uncompressed images.
OperatorClassification Error (%)OperatorClassification Error (%)
αβProposedLiao et al. [26]αβProposedLiao et al. [26]
GAU_1.0MF302.3107.39MF3SH_2.006.1114.24
GAU_1.0MF502.1905.98MF3SH_3.005.7013.81
GAU_1.0SH_2.007.7213.25MF3UP_1.205.1510.83
GAU_1.0SH_3.006.4011.49MF3UP_1.501.9807.49
GAU_1.0UP_1.204.9308.79MF5SH_2.009.6018.02
GAU_1.0UP_1.501.8903.77MF5SH_3.006.9215.49
GAU_0.7MF303.0508.26MF5UP_1.209.8213.37
GAU_0.7MF505.5708.01MF5UP_1.506.0908.34
GAU_0.7SH_2.006.9113.31SH_2.0UP_1.205.7214.94
GAU_0.7SH_3.006.7012.70SH_2.0UP_1.507.3411.67
GAU_0.7UP_1.202.3706.23SH_3.0UP_1.205.8913.54
GAU_0.7UP_1.501.3105.95SH_3.0UP_1.506.6110.84
Table 7. Comparative analysis of compressed images.
Table 7. Comparative analysis of compressed images.
OperatorCompressionClassification Error (%)
αβProposedLiao et al. [26]
GAU_1.0UP_1.5Q1 = 75, Q2 = 8510.4809.80
GAU_1.0UP_1.5Q1 = 85, Q2 = 8511.7314.68
GAU_1.0MF5Q1 = 90, Q2 = 7007.3316.35
GAU_1.0MF5Q1 = 75, Q2 = 8505.3411.82
GAU_1.0MF5Q1 = 85, Q2 = 7507.5315.93
GAU_0.9UP_1.2Q1 = 70, Q2 = 9010.6514.12
MF5UP_1.5Q1 = 75, Q2 = 8510.1313.25
MF5UP_1.5Q1 = 85, Q2 = 7511.8521.75
MF3GAU_0.8Q1 = 70, Q2 = 9004.5612.70
SH_2.0UP_1.2Q1 = 80, Q2 = 9010.1614.65
SH_3.0UP_1.5Q1 = 80, Q2 = 9007.4313.55
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cho, S.-H.; Agarwal, S.; Koh, S.-J.; Jung, K.-H. Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators. Appl. Sci. 2022, 12, 7152. https://doi.org/10.3390/app12147152

AMA Style

Cho S-H, Agarwal S, Koh S-J, Jung K-H. Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators. Applied Sciences. 2022; 12(14):7152. https://doi.org/10.3390/app12147152

Chicago/Turabian Style

Cho, Se-Hyun, Saurabh Agarwal, Seok-Joo Koh, and Ki-Hyun Jung. 2022. "Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators" Applied Sciences 12, no. 14: 7152. https://doi.org/10.3390/app12147152

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop