Image forgery detection by transforming local descriptors into deep-derived features

被引:4
作者
Anwar, Muhammad Aqib [1 ,2 ]
Tahir, Syed Fahad [1 ,2 ]
Fahad, Labiba Gillani [3 ]
Kifayat, Kashif [1 ,2 ]
机构
[1] Air Univ, Dept Comp Sci, Islamabad, Pakistan
[2] Air Univ, NCFL Natl Ctr Cyber Secur NCCS, Natl Cybercrime & Forens Lab, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Dept Comp Sci, Islamabad, Pakistan
关键词
Forgery detection; Local descriptors; Deep derived features; Support vector machine; SPLICING DETECTION; LOCALIZATION; IDENTIFICATION;
D O I
10.1016/j.asoc.2023.110730
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image forgery is the intentional alteration of digital images, either manually using image editors or through deep fake techniques, for the purpose of disseminating fake information. We propose a forgery detection approach that efficiently detects copy-move and splicing attacks of varying scales in digital images. Our goal is to identify the homogeneous region(s) inconsistent with the rest of the image. This region property has been typically employed in object detection and classification, while we exploit this property to detect forgery in images. Thus, we generate the deep-derived features from the existing hand-crafted features in forgery detection as input to the VGG16, a deep learning method, trained for object classification. We use a binary class SVM trained on the obtained deep-derived features to determine whether an image is real or fake. We perform extensive experiments on three publicly available image manipulation datasets, DVMM, Casia and Korus to validate the effectiveness of the proposed methodology. The results show a better accuracy compared to the state-of-the-art methods.& COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:14
相关论文
共 69 条
[1]   Exploiting Spatial Structure for Localizing Manipulated Image Regions [J].
Bappy, Jawadul H. ;
Roy-Chowdhury, Amit K. ;
Bunk, Jason ;
Nataraj, Lakshmanan ;
Manjunath, B. S. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :4980-4989
[2]  
Bayar B., 2016, P 4 ACM WORKSHOP INF, P5, DOI DOI 10.1145/2909827.2930786
[3]   RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection [J].
Bi, Xiuli ;
Wei, Yang ;
Xiao, Bin ;
Li, Weisheng .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019), 2019, :30-39
[4]   Tampering Detection and Localization through Clustering of Camera-Based CNN Features [J].
Bondi, Luca ;
Lameri, Silvia ;
Guera, David ;
Bestagini, Paolo ;
Delp, Edward J. ;
Tubaro, Stefano .
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, :1855-1864
[5]   The devil is in the details: an evaluation of recent feature encoding methods [J].
Chatfield, Ken ;
Lempitsky, Victor ;
Vedaldi, Andrea ;
Zisserman, Andrew .
PROCEEDINGS OF THE BRITISH MACHINE VISION CONFERENCE 2011, 2011,
[6]   A Serial Image Copy-Move Forgery Localization Scheme With Source/Target Distinguishment [J].
Chen, Beijing ;
Tan, Weijin ;
Coatrieux, Gouenou ;
Zheng, Yuhui ;
Shi, Yun-Qing .
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 23 :3506-3517
[7]   Determining image origin and integrity using sensor noise [J].
Chen, Mo ;
Fridrich, Jessica ;
GoIjan, Miroslav ;
Lukas, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :74-90
[8]  
Chen S, 2021, AAAI CONF ARTIF INTE, V35, P1081
[9]   Image splicing detection using 2-D phase congruency and statistical moments of characteristic function [J].
Chen, Wen ;
Shi, Yun Q. ;
Su, Wei .
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
[10]   A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection [J].
Chierchia, Giovanni ;
Poggi, Giovanni ;
Sansone, Carlo ;
Verdoliva, Luisa .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :554-567