Deep Learning-Based Technique For Image Tamper Detection: Manjunatha. S
Deep Learning-Based Technique For Image Tamper Detection: Manjunatha. S
Detection
Manjunatha. S Malini M Patil
Department of Information Science & Engineering. Department of Information Science & Engineering.
Global Academy of Technology J S S Academy of Technical Education
Bengaluru, 560 098, India Bengaluru, 560 060, India
[email protected] [email protected]
Abstract- The objective of the research work is to thoroughly claiming medical insurance with forged medical images and
study existing methodologies for detecting passive image also it may lead to false treatment. Hence, the determination in
tampering using deep learning techni ques. Here, survey is improved image forgery detection cannot be overlooked. In
conducted predominantly focusing on tampering detection using image composition, various techniques like copy -move,
deep learning techniques. Different image tampering datasets splicing, etc., are the most widespread manipulation practices
such as MICC, CAS IA, and UCID, etc. have been used by that are found in [1], [2], and [3]. These practices encompass a
existing tampering detection methodologies for validating merged image of two or more sections that create an altered
tampering detection accuracies. From the study, it is identified image. Figure.1 shows three different examples of an original
that not all method obtains good accuracies for all kind of attack
such as splicing, compression, rotation, resampling, copy-move,
image and its respective altered image.
etc. From the study it is identified for detecting tampering
efficiently it is important to design an efficient deep learning-
based feature extraction mechanism that learns correlation
among pixels more efficiently. In contrast with another recent
survey, this paper covers significant developments in passive
image forensic analysis methods adopting deep learning
techniques. Existing methodologies are studied concerning
benefit, limitation, the dataset used, and kind of attack
considered. The paper further highlights future challenges and
open issues, and also provides the possible future solution in
building efficient tampering detection mechanism using deep
learning technique. Experiment outcomes show good
performance in connection with TPR, FPR, and F1-S core.
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4
that attackers use is JPEG compression [5]. In this, after using ML [16] to mine the proper native features of the digital
implanting any info in the JPEG file and recompression, there image in both spatial and transform domains, which are used to
are native transformations in the belongings of JPEG train a classifier. Extract all the landscapes from the digital
compression. The pronounced procedures of implanting image that permits uninterrupted and consistent image forgery
alterations are the most common today, as shown by the detection. In its place, localization can be attained by running
enormous amount of publications aimed at evolving solutions in sliding-window modality and by proper confined score.
to detect such attacks. To find an answer to these issues, the These supreme discriminating features depend on high -order
researchers have suggested some methodologies that can be indicators of an image which is going to help enlightening
spatial irregularities created with the help of the existence of
categorized into Active and Passive technologies [6-8] as
imitations.
shown in Figure.2.
In the present modern era, DL based approaches have
become more important. Some initial papers, encouraged by
the achievement of residual-based ML approaches,
recommended CNN architectures, predestined to mine residual
feature records. For digital image forgery detection, there are
some models available in Deep Learning, like Convolutional
Neural Networks (CNN), Deep Neural Network (DNN), and
Recurrent Neural Network (RNN). Among those, CNN is the
most common DL models. The convolution layer of CNN will
perform as a discriminator and have an extractor. CNN's
abstract features support the state of the image instead of
extracting the features of the altered image. The google trends
are depicted in the following Fig. 3. It is observed that the
literature survey relating to the publications on image forgery
detection using deep learning methods are very sparse.
II. LIT ERAT URE SURVEY In [18], recommended a two-step DL approach to learn
features and a mechanism that detects manipulated digital
In recent times, the attentiveness about Deep Learning (DL)
images that may be in dissimilar image formats. Within the
has increased and many remarkable results are evolving. initiative, they separate the images into areas then the Loaded
Hence, forensic researchers try to apply DL to perceive the
Auto-encoder model is employed to find out the structures for
manipulation of images without human intrusion [13]. every spot. Within the next step, the appropriate data is added
Advancement of the technology in the graphics processing unit
to every spot to urge precise consequences. And they have also
and achievement of DL practices [15] in computer vision , suggested doing it by using other deep learning architectures
inspired a group of researchers to relate all available DL
such as DBN it can improve the performance. In [19],
models for image manipulation detection. These DL chains suggesting a unique CNN-based IFD technique that can
feature extraction and classification steps. This procedure is automatically learn how image altering can be done. The
data-driven and accomplished by spontaneously learning
convolutional layer in this acquires image alteration features by
complex and abstract structures, essential to detect interfered destroying the content of the image. This convolution layer
regions. It saves the energy and time needed to discover native
studies local operational association among pixels rather than
features of interfered digital images. On the other hand, the seeing the content of a picture since tampering alters some
training of DL models is inflexible and requires great
resident associations, it detects several tampering in an image.
computational power with an enormous size of data. The The main issue in the detection process is that frequent attacks
initiation of data-driven results established a substantial leap in
cannot give conventional results. Additionally, to trace the
execution and assured a broad view. Procedures were created
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4
interfered area, the majority of the effort is concluded by In DNN, the first branch is employed for the recognition of
pointing the JPEG images, which means that the altered section manipulated sections that accepts an image as an input, mining
is noticed using evidence left by several actions of JPEG all the features by using CNN, by using Mask Decoder the
compression. upsamples feature map is created and a binary classifier is used
to create a mask. Therefore, the next branch is employed to
In [20] suggested the response to concentrate image
detect the emulated sections which take the image as an input
splicing with the help of Multi-Task Fully Convolutional and it uses the CNN for mining the features. The Self-
Network. It is proved that Multi-Task Fully Connected
Correlation component to appear the features resemblance, to
Network attains better demonstration than single-task Fully
accumulate the suitable statistics the Percentile Pooling is used.
Connected Network because single-task Fully Connected Then this synthesis module takes input through two branches
Network delivers irregular output for localization for limited
and creates the ultimate copy-move forgery calculation.
cases. These authors also suggested Multi-Task Fully
Convolutional Network with a set of output branches. Among Bi et al. [27], are recommended a CNN-based method
these, one branch is engaged to acquire the surface label called RRU-Net (Ringed Residual U-Net,) where it is an end-
information, and the next one is engaged to acquire the to-end image segmentation network, for digital image splicing
interfered section edge. Better performance can be achieved detection. The RRU-Net goals to develop the learning
even this process has been exposed to show the degradation approach of CNN over recollection and association with the
among post-processing techniques. human brain mechanism. The outstanding propagat ion is
engaged to remember the input feature info to unravel the ruin
In [21] suggested CNN for a multi-domain-based approach issue within a deeper network. Finally, the remaining response
which is a combination of both special and frequency domains.
merges the response feature info to discriminate against the
This can use to categorize and limit single, uncompressed, and original and fake regions. This RRU-Net tested on two very
double compressed sections of images. The Spatial domain-
popular datasets i.e., CASIA and COLUMBIA.
based CNNs takes an input of n*n sized areas of RGB
channels. And it is collected of both convolutional chunks and Wang et al. [28], A novel model is employed to detect and
a set of fully connected layers. The Frequency domain -based also to locate the image manipulations. This novel method was
CNN takes DCT coefficients of an area as input. The tested on two datasets i.e., Columbia and Cover. This method
Frequency domain-based CNN's encompasses both the layers was skilled to find equally a copy-move and also splicing
trailed by a set of pooling layers with all three full links. The falsifications.
Multi-domain CNN links the output approaching from fully
Amit Doegar, et al, [29], is proposed to utilize the CNN
associated layers of both networks and this will categorize the
areas into one among all classes, double compressed or based pre-trained AlexNet model's deep structures without
devoting much time to training. The suggested approach also
uncompressed. From this work, we can notice that median
exploits the SVM as a classifier. The performance of these
filtering from a digital image is remarkably exciting work.
deep features mined from that proposed model is satisfactory,
In [22], suggested a Convolutional Network Networks even in the occurrence of geometrical and rotational
based approach will mine median filtering residuals in the transformation. Summary of Several DL Models in Image
digital images to handle the several challenges. The primary Forgery Detection is shown in Table.1.
layer in Convolutional Network Networks may be the filter
layer which will condense all interference that arises because of In the next section, the possible solution to overcome issues
of existing tampering detection method using deep learning
the existence of the textures and edges. This exclusion of
intervention supports the model to examine all the hints left by technique is discussed.
median filtering.
III. POSSIBLE SOLUT ION FOR IMAGE T AMPERING DET ECT ION
In [23], offered a CNN-based method to detect interfering
were the hints left by various camera models, which abstracts Recent image tampering work shows using deep learning
the features regarding the camera model from digital image techniques such as CNN aid in improving tampering detection
reinforcements. The Clustering system is employed to study accuracies. However, existing tampering detection
the mined structures and this will classify the digital image as methodologies predominantly focused on identifying a
either artificial or not. In [24], the author suggested using noise particular type of manipulations such as splicing, resampling,
residual structures for image manipulation detection with copy-move, etc. As a result, some method works well for
localization. CNN is used meant for mining the noise detecting one kind of attack; however, fails to detect another
remaining centered landscapes of the digital image and the kind of hybrid attack such as introducing resampling attack of
SVM is used for classifications. copy-move tampered segment. Along with that, it is practically
a difficult task to know the tampering type in advance. Then,
In paper [25], suggested CNN for digital image forgery segmenting only the tampering region is very difficult;
detection in copy-move and another one image splicing. The especially when there exist multiple forgeries of similar
primary convolution layer on CNN is involved in patterns within an image. CNN in object segmentation have
preprocessing operations to search for concerns formed by attained the very good result; CNN extracts hierarchical feature
altering processes. Here, the CNN was trained with from the different level to segment meaningful shape of
characterized path illustrations from training images. After this respective objects. Contrasting with meaningful segmentation,
pre-trained CNN was applied on trial images and for the the tampered segment can be copied segment for other portion
detection of tampering SVM classifier is used. of an image or it could be a removed object within an image. a
In [26], the authors proposed a way to perceive copy-move well-crafted tampered image generally exhibits a good
forgery, i.e., two branch DNN architecture called BusterNet, correlation between the authentic and tampered image. Thus,
this is having the capacity of making alteration concealment. for detecting tampering and segmenting tampered region
efficiently the following design is presented in Fig. 4.
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4
a camera Disadvantages:
1. They have not achieved a deep
investigation of the several
degrees of freedom of the
autoencoder configuration.
Advantage:
1. It mined compressed features
of test images, and a feature
Hierarchical CASIA v1.0,
Cut-paste, Copy- fusion technique is combined Accuracy
representation through CASIA v2.0,
[25] move to obtain the result with very 98.04%
color Images & CNN – and Columbia
good accuracy.
10 layers gray DVMM
Disadvantages:
1. Increased computational
complexity
Advantage:
1. They attained the tamper
detection without any pre-
processing & post-processing
Image residuals & CASIA, Accuracy 76%
[27] Cut-paste Disadvantages:
RRU-Net COLUMB
1. They have not visualized the
latent discriminative feature
between interfered and un-
tampered sections.
Advantage:
1. It has superior performance
over other state-of-the-art Avg precision
Cut-paste, Copy- image tampering detection 93%
ResNet-101 & Mask Cover,
[28] move approaches for Cover and
R-CNN Columbia
Disadvantages: 97%
1. Fail to follow the perfect and for Columbia
comprehensive contours of the
unique tamper area.
Advantage:
Combinations of 1. They exploited the SVM as a
geometrical and classifier with the best
CNN - pre-trained Dataset Accuracy
[29] transformations accuracy.
AlexNet Model MICC-F220 93.94%
attacks to the Disadvantages:
original image 1. Not more suitable for all data
sets
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4
(a) (b)
(c) (d)
Fig.4. Proposed CNN-based tampering detection methodologies.
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4
[25] Y. Rao and J. Ni, "A deep learning approach to detection of splicing and International Conference on Computational Intelligence & IoT
copy-move forgeries in images," 2016 IEEE International Workshop on (ICCIIoT ) 2018. https://www.ssrn.com/link/ijciiot -pip.html.
Information Forensics and Security (WIFS), Abu Dhabi, 2016, pp. 1 -6, [30] Raju, Priya & S. Nair, Madhu. Copy-move forgery detection using
DOI: 10.1109/WIFS.2016.7823911. binary discriminant features. Journal of King Saud University -
[26] Yue Wu, Wael Abd-Almageed, Prem Natarajan. BusterNet: Detecting Computer and Information Sciences. 10.1016/j.jksuci.2018.11.004,
Copy-Move Image Forgery with Source/T arget Localization. 2018.
Proceedings of the European Conference on Computer Vision (ECCV), [31] Huang, H., Ciou, A. Copy-move forgery detection for image forensics
2018, pp. 168-184. using the superpixel segmentation and the Helmert transformation. J
[27] X. Bi, Y. Wei, B. Xiao, and W. Li, "RRU-Net: The Ringed Residual U- Image Video Proc. 2019, 68 (2019). https://doi.org/10.1186/s13640-019-
Net for Image Splicing Forgery Detection," 2019 IEEE/CVF Conference 0469-9, 2019.
on Computer Vision and Pattern Recognition Workshops (CVPRW), [32] J. Li, X. Li, B. Yang, and X. Sun. Segmentation-based image copy-move
Long Beach, CA, USA, 2019, pp. 30-39, DOI: forgery detection scheme. IEEE Transactions on Information Forensics
10.1109/CVPRW.2019.00010. and Security, 10(3):507–518, 2015.
[28] Xinyi Wang, He Wang, Shaozhang Niu, and Jiwei Zhang. AIMS/MBE. [33] Marra, Francesco & Gragnaniello, Diego & Verdoliva, Luisa & Poggi,
http://www.aimspress.com/journal/MBE 16(5): 4581 –4593. Giovanni. A Full-Image Full-Resolution End-to-End-T rainable CNN
[29] Amit Doegara, Maitreyee Dutta, Gaurav Kumar. CNN based Image Framework for Image Forgery Detection, 2019.
Forgery Detection using pre-trained AlexNet Model. Proceedings of
Authorized licensed use limited to: City, University of London. Downloaded on May 17,2021 at 03:56:26 UTC from IEEE Xplore. Restrictions apply.