2,645 research outputs found

    Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries

    Full text link
    With advanced image journaling tools, one can easily alter the semantic meaning of an image by exploiting certain manipulation techniques such as copy-clone, object splicing, and removal, which mislead the viewers. In contrast, the identification of these manipulations becomes a very challenging task as manipulated regions are not visually apparent. This paper proposes a high-confidence manipulation localization architecture which utilizes resampling features, Long-Short Term Memory (LSTM) cells, and encoder-decoder network to segment out manipulated regions from non-manipulated ones. Resampling features are used to capture artifacts like JPEG quality loss, upsampling, downsampling, rotation, and shearing. The proposed network exploits larger receptive fields (spatial maps) and frequency domain correlation to analyze the discriminative characteristics between manipulated and non-manipulated regions by incorporating encoder and LSTM network. Finally, decoder network learns the mapping from low-resolution feature maps to pixel-wise predictions for image tamper localization. With predicted mask provided by final layer (softmax) of the proposed architecture, end-to-end training is performed to learn the network parameters through back-propagation using ground-truth masks. Furthermore, a large image splicing dataset is introduced to guide the training process. The proposed method is capable of localizing image manipulations at pixel level with high precision, which is demonstrated through rigorous experimentation on three diverse datasets

    A vision-based fully automated approach to robust image cropping detection

    Get PDF
    The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content that is quite insensitive to image processing operations, such as compression and resizing, typical of social media platforms. Robust computer vision techniques are employed throughout, so as to cope with large sources of noise in the data and improve detection performance. The method leverages a novel metric based on robust statistics, and is also capable to decide autonomously whether the image at hand is tractable or not. The results of an extensive experimental evaluation covering several cropping scenarios demonstrate the effectiveness and robustness of our approac

    Analysis Manipulation Copy-Move on Image Digital using SIFT Method and Histogram Color RGB

    Get PDF
    The application of the SIFT (Scale Invariant feature transform) algorithm and the RGB color histogram in Matlab can detect the suitability of objects in digital images and perform tests accurately. In this study, we discuss the implementation to obtain object compatibility on digital images that have been manipulated using the SIFT Algorithm method on the Matlab source, namely by comparing the original image with the manipulated image. The suitability of objects in digital images is obtained from the large number of keypoints obtained, other additional parameters, namely comparing the number of pixels in the analyzed image, as well as changes in the histogram in RGB color in each analyzed image. The purpose of this research is how to apply the SIFT (Scale Invariant feature transform) Algorithm and RGB color histogram to detect the suitability of objects in digital images and perform tests accurately. This study discusses the implementation to obtain object compatibility in digital images that have been manipulated using the SIFT Algorithm method on Matlab sources, namely by comparing the original image with the manipulated image. The suitability of objects in digital images is obtained from the large number of keypoints obtained, other additional parameters, namely comparing the number of pixels in the analyzed image, as well as changes in the histogram in RGB color in each analyzed imag

    Texture based Image Splicing Forgery Recognition using a Passive Approach

    Get PDF
    With the growing usage of the internet in daily life along with the usage of dominant picture editing software tools in creating forged pictures effortlessly, make us lose trust in the authenticity of the images. For more than a decade, extensive research is going on in the Image forensic area that aims at restoring trustworthiness in images by bringing various tampering detection techniques. In the proposed method, identification of image splicing technique is introduced which depends on the picture texture analysis which characterizes the picture areas by the content of the texture. In this method, an image is characterized by the regions of their texture content. The experimental outcomes describe that the proposed method is effective to identify spliced picture forgery with an accuracy of 79.5%

    Deep neural networks based error level analysis for lossless image compression based forgery detection.

    Get PDF
    The proposed model is implemented in deep learning based on counterfeit feature extraction and Error Level Analysis (ELA) techniques. Error level analysis is used to improve the efficiency of distinguishing copy-move images produced by Deep Fake from the real ones. Error Level Analysis is used on images in-depth for identifying whether the photograph has long passed through changing. This Model uses CNN on the dataset of images for training and to test the dataset for identifying the forged image. Convolution neural network (CNN) can extract the counterfeit attribute and detect if images are false. In the proposed approach after the tests were carried out, it is displayed with the pie chart representation based on percentage the image is detected. It also detects different image compression ratios using the ELA process. The results of the assessments display the effectiveness of the proposed method

    Image and Video Forensics

    Get PDF
    Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity

    Resampling Forgery Detection Using Deep Learning and A-Contrario Analysis

    Full text link
    The amount of digital imagery recorded has recently grown exponentially, and with the advancement of software, such as Photoshop or Gimp, it has become easier to manipulate images. However, most images on the internet have not been manipulated and any automated manipulation detection algorithm must carefully control the false alarm rate. In this paper we discuss a method to automatically detect local resampling using deep learning while controlling the false alarm rate using a-contrario analysis. The automated procedure consists of three primary steps. First, resampling features are calculated for image blocks. A deep learning classifier is then used to generate a heatmap that indicates if the image block has been resampled. We expect some of these blocks to be falsely identified as resampled. We use a-contrario hypothesis testing to both identify if the patterns of the manipulated blocks indicate if the image has been tampered with and to localize the manipulation. We demonstrate that this strategy is effective in indicating if an image has been manipulated and localizing the manipulations.Comment: arXiv admin note: text overlap with arXiv:1802.0315

    Multimedia Forensics

    Get PDF
    This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
    • …
    corecore