Detection of Image Tampering Using Deep Learning, Error Levels and Noise Residuals

被引:4
作者
Chakraborty, Sunen [1 ]
Chatterjee, Kingshuk [2 ]
Dey, Paramita [3 ]
机构
[1] Haldia Inst Technol, Dept Comp Sci & Engn, Haldia, India
[2] Govt Coll Engn & Ceram Technol, Dept Comp Sci & Engn, Kolkata, India
[3] Govt Coll Engn & Ceram Technol, Dept Informat Technol, Kolkata, India
关键词
Image tampering; Error level analysis; Spatial rich model; Deep learning; Convolutional neural networks; FORGERY DETECTION;
D O I
10.1007/s11063-024-11448-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Images once were considered a reliable source of information. However, when photo-editing software started to get noticed it gave rise to illegal activities which is called image tampering. These days we can come across innumerable tampered images across the internet. Software such as Photoshop, GNU Image Manipulation Program, etc. are applied to form tampered images from real ones in just a few minutes. To discover hidden signs of tampering in an image deep learning models are an effective tool than any other methods. Models used in deep learning are capable of extracting intricate features from an image automatically. Here we proposed a combination of traditional handcrafted features along with a deep learning model to differentiate between authentic and tampered images. We have presented a dual-branch Convolutional Neural Network in conjunction with Error Level Analysis and noise residuals from Spatial Rich Model. For our experiment, we utilized the freely accessible CASIA dataset. After training the dual-branch network for 16 epochs, it generated an accuracy of 98.55%. We have also provided a comparative analysis with other previously proposed work in the field of image forgery detection. This hybrid approach proves that deep learning models along with some well-known traditional approaches can provide better results for detecting tampered images.
引用
收藏
页数:16
相关论文
共 30 条
[1]  
[Anonymous], 2016, 2016 IEEE INT WORKSH, DOI [DOI 10.1109/WIFS.2016.7823911, 10.1109/WIFS.2016.7823911]
[2]  
[Anonymous], 2016, P 4 ACM WORKSHOP INF, DOI DOI 10.1145/2909827.2930786
[3]  
Boland F. M., 1995, Fifth International Conference on Image Processing and its Applications (Conf. Publ. No.410), P326, DOI 10.1049/cp:19950674
[4]   Tampering Detection and Localization through Clustering of Camera-Based CNN Features [J].
Bondi, Luca ;
Lameri, Silvia ;
Guera, David ;
Bestagini, Paolo ;
Delp, Edward J. ;
Tubaro, Stefano .
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, :1855-1864
[5]  
Chakraborty S., 2022, SN Comput Sci, V3, P1, DOI [10.1007/s42979-022-01311-w, DOI 10.1007/S42979-022-01311-W]
[6]   Median Filtering Forensics Based on Convolutional Neural Networks [J].
Chen, Jiansheng ;
Kang, Xiangui ;
Liu, Ye ;
Wang, Z. Jane .
IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (11) :1849-1853
[7]  
Chen LC, 2017, Arxiv, DOI [arXiv:1706.05587, 10.48550/arXiv.1706.05587]
[8]   DCU-Net: a dual-channel U-shaped network for image splicing forgery detection [J].
Ding, Hongwei ;
Chen, Leiyang ;
Tao, Qi ;
Fu, Zhongwang ;
Dong, Liang ;
Cui, Xiaohui .
NEURAL COMPUTING & APPLICATIONS, 2023, 35 (07) :5015-5031
[9]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[10]   Dual branch convolutional neural network for copy move forgery detection [J].
Goel, Nidhi ;
Kaur, Samarjeet ;
Bala, Ruchika .
IET IMAGE PROCESSING, 2021, 15 (03) :656-665