Deep Learning-Based Digital Image Forgery Detection System
Abstract
:1. Introduction
- Active approach;
- Passive approach.
- Images are divided into blocks, and features are extracted from these blocks, as discussed in [1];
- Key points are identified from the image and these key point features are extracted.
- Detailed analysis between deep learning and hand-engineered techniques;
- Proposed ResNet50v2-based architecture for the authentication of original and forged images;
- Utilization of the transfer learning technique to effectively train our proposed model on benchmark datasets CASIA_v1 and CASIA_v2 [9];
- Discussion of the limitations and future directions of this research that can be carried forward.
2. Literature Review
3. Proposed System Architecture
Transfer Learning
4. Dataset
4.1. Preparation of Dataset
4.2. CASIA ITDE v1
- Forged set;
- Authentic set.
- Spliced image regions are either generated from the same authentic image or a combination of different authentic images.
- Spliced region shapes can be changed and customized using the Adobe Photoshop palette.
- Rotation, scaling, and other operations can be applied to cropped images before being added to spliced images.
- Spliced regions are generated with different spliced region sizes.
- The authentic set also contains texture images since forgery can easily be noticeable with text. Thus, we cropped a random region for texture images.
4.3. CASIA ITDE v2
- Photoshop was used to define realistic images as close to human vision as possible.
- Tampered images were generated either from two different authentic images or from the same authentic image.
- Cropped images were further processed with distortion, rotation, and scaling before being inserted to generate a realistic image.
4.4. Dataset Evaluation
5. Experimental Results and Discussion
5.1. System Specification
5.2. Results Discussion and Comparison
5.3. Future Work
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Fridrich, J.; Soukal, D.; Lukás, J. Detection of Copy-Move Forgery in Digital Images. Int. J. Comput. Sci. 2003, 3, 55–61. [Google Scholar]
- Yerushalmy, I.; Hel-Or, H. Digital Image Forgery Detection Based on Lens and Sensor Aberration. Int. J. Comput. Vis. 2011, 92, 71–91. [Google Scholar] [CrossRef]
- Dirik, A.E.; Memon, N. Image tamper detection based on demosaicing artifacts. In Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 7–10 November 2009; pp. 1497–1500. [Google Scholar] [CrossRef]
- Christlein, V.; Riess, C.; Jordan, J.; Riess, C.; Angelopoulou, E. An Evaluation of Popular Copy-Move Forgery Detection Approaches. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1841–1854. [Google Scholar] [CrossRef] [Green Version]
- Zampoglou, M.; Papadopoulos, S.; Kompatsiaris, Y. Large-scale evaluation of splicing localization algorithms for web images. Multimed. Tools Appl. 2016, 76, 4801–4834. [Google Scholar] [CrossRef]
- Varga, D. Multi-Pooled Inception Features for No-Reference Image Quality Assessment. Appl. Sci. 2020, 10, 2186. [Google Scholar] [CrossRef] [Green Version]
- Kawahara, J.; Bentaieb, A.; Hamarneh, G. Deep features to classify skin lesions. In Proceedings of the 2016 IEEE 13th International Symposium on Biomedical Imaging (ISBI), Prague, Czech Republic, 13–16 April 2016; pp. 1397–1400. [Google Scholar]
- Bai, X.; Yang, M.; Huang, T.; Dou, Z.; Yu, R.; Xu, Y. Deep-Person: Learning discriminative deep features for person Re-Identification. Pattern Recognit. 2020, 98, 107036. [Google Scholar] [CrossRef] [Green Version]
- Dong, J.; Wang, W.; Tan, T. CASIA Image Tampering Detection Evaluation Database. In Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China, 6–10 July 2013. [Google Scholar]
- Mahdian, B.; Saic, S. A bibliography on blind methods for identifying image forgery. Signal Process. Image Commun. 2010, 25, 389–399. [Google Scholar] [CrossRef]
- Farid, H. Image forgery detection. IEEE Signal Process. Mag. 2009, 26, 16–25. [Google Scholar] [CrossRef]
- Lanh, T.V.; Chong, K.; Emmanuel, S.; Kankanhalli, M.S. A Survey on Digital Camera Image Forensic Methods. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, 2–5 July 2007; pp. 16–19. [Google Scholar] [CrossRef] [Green Version]
- Barad, Z.; Goswami, M. Image Forgery Detection using Deep Learning: A Survey. In Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 March 2020; pp. 571–576. [Google Scholar]
- Wu, Y.; Abd-Almageed, W.; Natarajan, P. BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2018; pp. 170–186. [Google Scholar]
- Manjunatha, S.; Patil, M.M. Deep learning-based Technique for Image Tamper Detection. In Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 4–6 February 2021; pp. 1278–1285. [Google Scholar] [CrossRef]
- Schaefer, G.; Stich, M. UCID: An uncompressed color image database. Storage Retr. Methods Appl. Multimed. 2003, 5307, 472–480. [Google Scholar]
- Amerini, I.; Ballan, L.; Caldelli, R.; DEL Bimbo, A.; Serra, G. A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery. IEEE Trans. Inf. Forensics Secur. 2011, 6, 1099–1110. [Google Scholar] [CrossRef]
- Bayar, B.; Stamm, M.C. A deep learning approach to universal image manipulation detection using a new convolutional layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, Vigo, Spain, 20–22 June 2016; pp. 5–10. [Google Scholar]
- Rao, Y.; Ni, J. A deep learning approach to detection of splicing and copy-move forgeries in images. In Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates, 4–7 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Bi, X.; Wei, Y.; Xiao, B.; Li, W. RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection. In Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, 16–17 June 2019; pp. 30–39. [Google Scholar]
- Zhan, Y.; Chen, Y.; Zhang, Q.; Kang, X. Image Forensics Based on Transfer Learning and Convolutional Neural Network. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA, 20–22 June 2017. [Google Scholar] [CrossRef]
- Doegar, M.D.A.; Gaurav, K. CNN Based Image Forgery Detection Using Pre-trained AlexNet Model. Int. J. Comput. Intell. IoT 2019, 2, 6. [Google Scholar]
- Salloum, R.; Ren, Y.; Kuo, C.-C.J. Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN). J. Vis. Commun. Image Represent. 2018, 51, 201–209. [Google Scholar] [CrossRef] [Green Version]
- Cozzolino, D.; Poggi, G.; Verdoliva, L. Splicebuster: A new blind image splicing detector. In Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, 16–19 November 2015; pp. 1–6. [Google Scholar]
- Bishop, C.M. Neural Networks for Pattern Recognition; Oxford University Press: Oxford, UK, 1995. [Google Scholar]
- Lopes, R.d.l.F. Wild Data Part 3: Transfer Learning; Stratio Big Data Inc.: Madrid, Spain, 2018. [Google Scholar]
- Bayram, S.; Sencar, H.T.; Memon, N. An efficient and robust method for detecting copy-move forgery. In Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, Taiwan, 19–24 April 2009; pp. 1053–1056. [Google Scholar] [CrossRef]
- Qu, Z.; Qiu, G.; Huang, J. Detect Digital Image Splicing with Visual Cues. In Proceedings of the Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, 8–10 June 2009; Revised Selected Papers. Springer: Berlin, Germany, 2009; pp. 247–261. [Google Scholar]
- Wei, W.; Dong, J.; Tan, T. Effective image splicing detection based on image chroma. In Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 7–10 November 2009; pp. 1257–1260. [Google Scholar] [CrossRef]
- Corel Database. Available online: http://www.coreldraw.com/ (accessed on 4 August 2021).
- Wang, X.; Wang, H.; Niu, S.; Zhang, J. Detection and localization of image forgeries using improved mask regional convolutional neural network. Math. Biosci. Eng. 2019, 16, 4581–4593. [Google Scholar] [CrossRef] [PubMed]
- Bondi, L.; Lameri, S.; Guera, D.; Bestagini, P.; Delp, E.; Tubaro, S. Tampering Detection and Localization through Clustering of Camera-Based CNN Features. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 21–26 July 2017; pp. 1855–1864. [Google Scholar]
- Amerini, I.; Uricchio, T.; Ballan, L.; Caldelli, R. Localization of JPEG Double Compression through Multi-domain Convolutional Neural Networks. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 21–26 July 2017; pp. 1865–1871. [Google Scholar]
- Cozzolino, D.; Verdoliva, L. Single-image splicing localization through autoencoder-based anomaly detection. In Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates, 4–7 December 2016; pp. 1–6. [Google Scholar]
- Zhang, Y.; Goh, J.; Win, L.L.; Thing, V. Image Region Forgery Detection: A Deep Learning Approach. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC), Singapore, 14–15 January 2016; IOS Press: Singapore, 2016. [Google Scholar]
- Chen, J.; Kang, X.; Liu, Y.; Wang, Z.J. Median Filtering Forensics Based on Convolutional Neural Networks. IEEE Signal Process. Lett. 2015, 22, 1849–1853. [Google Scholar] [CrossRef]
Dataset | Distribution | Size | Format |
---|---|---|---|
CASIA_v1 | 46–54% distribution between authentic and forged images | 374 × 256 color image | JPEG |
CASIA_v2 | 55–45% distribution between authentic and forged images | from 320 × 240 to 800 × 600 color image | TIFF, JPET, BMP, |
Columbia (Uncompressed) | 50% distribution each for authentic and forged images | 1152 × 768 color images | TIFF |
Columbia (Compressed) | 52–48% distribution between authentic and forged images | 128 × 128 color images | BMP |
Category | Count | |
---|---|---|
JPEG Format | 921 | |
Source of Tampered Region(s) | Different images | 470 |
Same image | 451 | |
Preprocessing Manipulations | Resize | 206 |
Rotation | 25 | |
Resize and distortion | 27 | |
Rotation and distortion | 3 | |
Distortion | 53 | |
Rotation and resize | 45 | |
Rotation, distortion, and resize | 0 | |
Manipulations without pre-processing | 562 | |
Tampered Region Boundaries | Rectangular | 169 |
Circular | 114 | |
Arbitrary | 536 | |
Triangular | 102 |
Name | Details |
---|---|
Operating system | Windows 10 |
Programming language | Python |
Model | Asus ROG 702 VM |
RAM | 32 GB |
Cores | 16 |
Folds | Loss | Accuracy (%) |
---|---|---|
Fold 1 | 0.08 | 99.15 |
Fold 2 | 0.09 | 99.31 |
Fold 3 | 0.05 | 99.45 |
Fold 4 | 0.09 | 99.33 |
Fold 5 | 0.07 | 99.45 |
Average | 0.076 | 99.33 |
Study | Tampering Targeted | Methodology | Dataset | Advantages/Disadvantages | Accuracy |
---|---|---|---|---|---|
[19] | Cut/paste, copy/move | CNN | CASIA_v1, CASIA_v2, and Columbia DVMM | Advantage: The compressed feature of the test set is mined. A feature fusion technique is also used to attain good results. Disadvantage: Model complexity. | 98.04% |
[31] | Cut/paste, copy/move | Mask R-CNN, ResNet-101 | Columbia, Cover | Advantage: Better performance compared to other techniques. Disadvantage: Unable to follow contours. | 93% precision for Cover dataset and 97% precision for Columbia dataset |
[23] | Image splicing | MFCN, edge probability map, and surface probability | CASIA_v1 | Advantage: The proposed methodology performs better than current splicing. Disadvantage: Uses the training set for image assessment on new images. | 0.52 MCC score |
[32] | Cut/paste | CNN | Dresden database | Advantage: The proposed methodology uses a CNN for mining features using camera point hints. Disadvantage: Not able to identify localization and camera model traces. | Localization Accuracy is 81% and Detection Accuracy is 82% |
[33] | Cut/paste, JPEG double compression | Multi-domain CNN and RGB features of DCT | UCID | Advantage: The proposed methodology uses a CNN for localizing and categorizing patches of images that are compressed. Disadvantage: It does not make use of CNNs to perceive various types of compressions. | 95% |
[34] | Cut/paste | Autoencoder and landscapes with noise | Images taken from 7 electronic devices | Advantage: The proposed methodology uses obtains fair results. Disadvantage: It does not explore the use of several degrees of freedom. | 0.41 F-Measure |
[20] | Cut/paste | RRU-Net and Image residuals | Columbia, CASIA | Advantage: Attained somewhat good results on tamper detection without any preprocessing. Disadvantage: Latent discriminative features are not expressed. | 93.94% |
[35] | Copy/move, cut/paste | SAE and Daubechies wavelet decomposition | CASIA_v1, CASIA_v2 and Columbia | Advantage: Attained somewhat good results on tamper detection without any preprocessing. Disadvantage: The areas that need to be recognized must have to be manually inferred. There is not precise detection of the areas that have been inferred. | 90.09% |
[22] | Attacks that are a combination of transformations | AlexNet Model, CNN | MICC-F220 | Advantage: The proposed model uses SVM as a classifier to attain good accuracy. Disadvantage: Less suitable for other datasets. | 93.94% |
[18] | Median filtering, AWGN, Gaussian blurring | CNN and error filter predictions | Images taken from 12 unique cameras | Advantage: The proposed model uses a CNN for manipulation detection and attains good accuracy. | 99.10% |
[36] | Cut/paste and median filtering | CNN and Median filtering residuals | Boss base, UCID, Dresden, BOSS RAW, NRCS Gallery | Advantage: The proposed model gives considerably good results. Disadvantage: Less suitable for other datasets. | 85.14% |
Our Proposed Work | Image splicing | ResNet50v2 and YOLO weights | CASIA_v1, CASIA_v2 | Advantage: Reduces training time and uses ResNet-based architecture. | 99.3% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Qazi, E.U.H.; Zia, T.; Almorjan, A. Deep Learning-Based Digital Image Forgery Detection System. Appl. Sci. 2022, 12, 2851. https://doi.org/10.3390/app12062851
Qazi EUH, Zia T, Almorjan A. Deep Learning-Based Digital Image Forgery Detection System. Applied Sciences. 2022; 12(6):2851. https://doi.org/10.3390/app12062851
Chicago/Turabian StyleQazi, Emad Ul Haq, Tanveer Zia, and Abdulrazaq Almorjan. 2022. "Deep Learning-Based Digital Image Forgery Detection System" Applied Sciences 12, no. 6: 2851. https://doi.org/10.3390/app12062851
APA StyleQazi, E. U. H., Zia, T., & Almorjan, A. (2022). Deep Learning-Based Digital Image Forgery Detection System. Applied Sciences, 12(6), 2851. https://doi.org/10.3390/app12062851