A Detailed Analysis of Image Forgery Detection Techniques and Tools
A Detailed Analysis of Image Forgery Detection Techniques and Tools
Abstract—Nowadays, we can see there is a surge in image randomly initialising the weights as is typical in CNN.
tampering. In addition, to remove any traces of tampering, Kernel weights based on 30 high-pass filters make up the
post-processing is carried out, which makes it challenging for first layer, which hides the image's content and detects the
the analyzer to find the fake. With the goal of leaving no signs minute artefacts that the tampering activities have
for human visual detection, image forging can be carried out in introduced. There are a total of 10 layers in the CNN
a variety of ways by conducting different operations such as architecture that is being utilised to automatically learn the
adding, removing, or copying specific elements of a picture features. A pre-trained CNN extracts dense patch-based
within an image or to another image. Image tampering can be features from the test picture, which are then fused using the
used to dilute, defame, and slander an individual or
feature fusion approach to produce the final discriminative
organization. Since digital images are frequently used as
evidence in the media, in court, and for long-term record
features. Using the SVM classifier, these final discriminative
keeping, it is crucial to develop approaches to detect forgeries features are employed for binary classification
in images used by the mainstream press, in court hearings, and (authentic/forged).
for maintaining visual records. The proposed paper focuses on A SFCN and a MFCN are the two techniques for the
various image forgery detection methods and tools. It also gives image splicing localization problem that are proposed by
a comparative analysis between the various methods, their pros Salloum, Ren & Jay Kuo [2]. The authors have made several
and cons, and the results obtained using various tools.
adjustments, such as batch normalisation, skip connections,
Keywords—Image forensic, Image forgery detection, Image
and class weighting in the network, to the algorithms, which
manipulation, Features, Techniques, Tools are based on the VGG-16 network. SFCN is trained using
ground truth masks from the CASIA v2.0 datasets, which
I. INTRODUCTION produces good classification results but can occasionally
cause a coarse localization issue. As a result, the ground truth
Images in communication media are now very helpful.
mask and the edge of the spliced region are used to train the
There is a saying that the visual conveys more significance
multi-task learning network (MFCN). On the CASIA v1.0,
about the incident or circumstance than the words do. In the
Columbia, Nimble 2016 SCI, and Carvalho datasets, both
modern technological world, digital photographs are crucial
methods (SFCN & MFCN) achieve good performance.
in many different industries. They are primarily highlighted
in media, news, defence, and health-related employment. A There are numerous alternative techniques for detecting
digital image can currently be viewed as an essential piece of copy-move and splicing forgeries, including those employed
knowledge due to developments in digital image technology, by Cozzolino et al. (2017), Ouyang et al. (2017), Wu et al.
such as improvements in camera gear, software, and (2018), [4] using transfer learning, [5] using CNN feature
computer systems, as well as rising usage of internet media. extractors utilising the VGG16 model, and Liu et al (2018).
Because of technological advancements, the accessibility of
inexpensive hardware and software modification tools, and While a lot of the literature focuses on finding and
the creation of advanced manipulating tools that make image locating particular types of picture tampering, in reality, an
alteration simpler and require less effort. The forging of image can be altered by a number of different tampering
images gets worse and worse every day. techniques. Consequently, a global technique for image
tampering detection is required. For universal image
II. LITERATURE SURVEY alteration detection, several techniques are utilised, including
Bappy et al. (2019), [6] which utilises Long Short-Term
Due to technical advancements, the availability of low- Memory LSTM-EnDec and Mazumdar et al. (2018), [7]
cost hardware and software modification tools, and the which uses Deep Siamese CNN.
creation of sophisticated manipulating tools that make image
alteration simpler and require less effort. The forging of The identification of Joint Photographic Experts Group
images gets worse and worse every day. compression in photographs is a well-known issue in the
multimedia detection research. Typically, photos are stored
Rao and Ni demonstrate a novel technique for explicitly and sent using the JPEG format. A compressed image is
identifying splicing and copy-move fraud using the deep regarded as a forged image, whereas an uncompressed image
learning model [1]. According to their methodology, a is believed to be an authentic image from the source. In order
supervised Convolutional Neural Network learns the to categories the tampered and untampered areas, a CNN is
hierarchical factors based on manipulations made to the RGB constructed to automatically learn features using the discrete
input image. A high-pass channel set used in the estimate of cosine transform (DCT) coefficients, as proposed by Peng et
residual maps in the SRM is used in this method rather than al., 2019 [9], Verma et al., 2018, and others.
2
ed licensed use limited to: CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING - CDAC - KOLKATA. Downloaded on January 05,2024 at 07:55:14 UTC from IEEE Xplore. Restriction
B. Classification of Digital Forensics
Overall, Digital Forensics branches out into many
different domains. The broad categories for digital forensics
are shown by the block diagram in fig. 2. Digital image
forensics is a subset of digital forensics that focuses on
verifying the authenticity of images.In which the following
Fig. 4. General architecture of image forgery detection and localization
two significant issues are [12] covered: [11]
x The description of the camera used to take the picture
x Input Image: An image that is taken into account
x The identification of forgery traces, or image when executing subsequent procedures.
tampering.
x Image Preprocessing: An input image may go through
a variety of operations, such as DWT or DCT,
cropping, and RGB image transformation into the
proper colour space, to improve classification
performance.
x Feature Extraction: To highlight the data's key
information, the extracting feature aims to extract a
particular representation of the data. This method
used redundant information, which decreased the
classifier's effectiveness.
x Feature Selection: The goal of feature selection,
which is based on the features chosen, is to choose
the fewest possible features, eliminating duplication
Fig. 2. Classification of Digital Forensics [12] and boosting the efficiency of the classifier.
C. General Concepts Related to Image Forensic x Classification: Naive Bayes, LDA, SVM, FLDA,
As shown in the fig. 3, there are several subcategories of FLD, logistic regression, and other classifiers are
image manipulation, including steganography in image, used for classification. The classifier's objective is to
image forging, and generating the images [13]. distinguish between genuine and fake images.
x Localization: The goal of localization, a post-
processing procedure, is to identify the fabricated
component within the host image.
E. Classification of Image Forgery: Active and Passive
Image Forensic
Solutions for image authentication can be divided into
two categories [13]. 1) Active; and 2) blind or passive as
shown in fig. 5.
3
ed licensed use limited to: CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING - CDAC - KOLKATA. Downloaded on January 05,2024 at 07:55:14 UTC from IEEE Xplore. Restriction
Therefore, the ability of these techniques to images. Image splicing is one of the straightforward and
authenticate the images is limited. widely used methods of altering images. One essential
component of image phony detection is the detection of
x Passive: Without the sender's signature or watermark image splicing. In the case of splicing, a portion of the image
on the original image, passive or blind forgery is copied and pasted onto an image other than the source
detection techniques simply evaluate the received image as illustrates in fig. 8.
image's integrity or authenticity. The three kinds of
passive approaches are tampering operations, natural
and computer graphic images, and intrinsic
regularities and inconsistencies [10]. And the further
classification is show in the figure. In this paper, we'll
look at a few passive methods for spotting fake digital
images.
F. Image Forgery Detection Technique
We will talk about a few passive methods for finding
fake images in this section.
1) Copy-move or region duplication forgery
4
ed licensed use limited to: CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING - CDAC - KOLKATA. Downloaded on January 05,2024 at 07:55:14 UTC from IEEE Xplore. Restriction
tamper detection. Since JPEG uses a lossy compression 3) Retrieve hidden JPEG images
techniques, and an image is compressed each time it is 4) Utilize compression signature analysis to find
stored. In addition, whenever an image is altered, a certain modified images
compression form is added to the image file. Due to this 5) Provide each image's metadata (EXIF)
aspect of JPEG compression, it is therefore possible to
6) Processing files in batches
estimate how often this image has been stored. A compressed
images are considered as a fake images, whereas an 7) Installation is not needed
uncompressed image is believed to be a legitimate images or
image taken directly from the source. By re-compressing the
test images using all practical quality factors and compared it
to all of the compressed versions, forgery can be identified.
IV. IMAGE TAMPERING DETECTION TOOLS
Image manipulation is becoming simpler to accomplish
and more difficult to detect thanks to modern tools. New
technologies for identifying altered photographs have been
made available, though, due to advancements in computer
forensics. This section highlights four well-known
technologies for detecting image tampering and goes into
great detail about each key component.
A. Fotoforensics
Anyone can use Fotoforensics, a free online forensic tool,
to detect the altered portions of an image and ascertain
whether it has been digitally altered. fig. 10 shows the
findings of the Fotoforensics tool. It leverages Error Level
Analysis (ELA) to pinpoint areas of an image that have
different levels of compression. With JPEG images, the level Fig. 11. A sample result obtained by the JPEGsnoop tool
of distortion should be consistent throughout the entire
image. A digital change is probably indicated if a large C. Forensically
portion of the image has a different error level. This tool Forensically is available as a free digital image forensics
incorporates following: tool that includes functions like information extraction and
clone identification. By enlarging the size and colour of the
1) Error Level Analysis
pixels, the tool's magnification, or zoom factor, helps
2) Metadata Analysis analysts explore the hidden patterns in an image. The
3) Last-Save Quality magnifier detects using the three components auto contrast
4) Color Adjustments by channel, auto contrast, and histogram
5) Parasite Identification equalization. Forensically's clone detector recognises altered
regions of two or more image files, as shown in fig. 12. This
tool incorporates following:
1) Clone Detection
2) Error Level Analysis
3) Noise Analysis
4) Principal Component Analysis(PCA)
B. JPEGsnoop
A free Windows application called JPEGsnoop analyses
and decodes the intricate details of JPEG, MotionJPEG AVI,
and photoshop files. The output from the JPEGsnoop tool is
displayed in fig.11 Additionally, JPEGsnoop has the ability
to analyse the image's source to extract data from
compressed images, such as the quality factors, and report on
data such as chrominance & luminance quantization matrix, Fig. 12. A sample result obtained by the Forensically tool
estimation of JPEG quality factors, Huffman tables, and
histograms for RGB images [15]. This tool incorporates D. Amped Authenticate
following:
Software called Amped Authenticate is used to
1) Decode PSD, JPEG and AVI (MJPG) images authenticate and detect tampering with digital photos. fig. 13
2) MCU analysis with detailed decode is a sample result produced by the Amped Authenticate tool.
5
ed licensed use limited to: CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING - CDAC - KOLKATA. Downloaded on January 05,2024 at 07:55:14 UTC from IEEE Xplore. Restriction
This tool offers a number of applications that can determine ACKNOWLEDGMENT
whether an image is the result of an original creation by a I take this opportunity to extend my deepest gratitude to
specific device, an original creation that has not been altered, my guide and mentor, Mrs. Puja Padiya, for her precious
or the result of an alteration that has been made using an guidance and support. And I really admire my parents for
image processing tool and is not admissible as evidence. their unwavering support and frequent encouragement.
REFERENCES
[1] Y. Rao, J. Ni, “A deep learning approach to detection of splicing and
copy move forgeries in images,” 8th IEEE Int. Work. Inf. Forensics
Secur. WIFS 2016. (2017)
[2] R. Salloum, Y. Ren, C.C. Jay Kuo, “Image Splicing Localization
using a Multi-task Fully Convolutional Network (MFCN),” J. Vis.
Commun. Image Represent., 2018
[3] D. Cozzolino, G. Poggi, L. Verdoliva, “Recasting residual-based local
descriptors as convolutional neural networks: An application to image
forgery detection,” IH&MMSec - Proc. 2017 ACM Work. Inf.
Hiding Multimed. Secur., 2017
[4] J. Ouyang, Y. Liu, M. Liao, “Copy-move forgery detection based on
deep learning,” 10th Int. Congr. Image Signal Process. Biomed. Eng.
Informatics, CISP-BMEI, 2017
[5] Y. Wu, W. Abd-Almageed, P. Natarajan, “Image copy-move forgery
detection via an end- to-end deep neural network,” IEEE Winter
Conf. Appl. Comput. Vision, WACV, 2018
[6] J.H. Bappy, C. Simons, L. Nataraj, B.S. Manjunath, A.K. Roy
Chowdhury, “Hybrid LSTM and Encoder-Decoder Architecture for
Detec tion of Image Forgeries,” IEEE Trans. Image Process, 2019
[7] A. Mazumdar, J. Singh, Y.S. Tomar, P.K. Bora, “Universal Image
Fig. 13. A sample result obtained by the Amped Authenticate tool Manipulation Detection using Deep Siamese Convolutional Neural
Network,” http://arxiv.org/abs/1808.06323.nal Neural Network. 1-6.
Retrieved, 2018
The number of tools widely available for digital image
forensics is much higher than these four. Because there are [8] V. Verma, N. Agarwal, N. Khanna, “DCT-domain deep convolutional
neural networks for multiple JPEG compression classification,”
so many potential tools, we can readily find and identify Signal Process.: Image Commun., Elsevier, 2018
tampering. [9] P. Peng, T. Sun, X. Jiang, K. Xu, B. Li, Y. Shi, “Detection of Double
JPEG Compression with the Same Quantization Matrix Based on Con
V. CONCLUSION AND FUTURE WORK volutional Neural Networks,” Proceedings, APSIPA Annual Summit
We have reviewed various deep learning-based active and Conference , 2018
and passive algorithms for digital image forensics, taking [10] G.K. Birajdar, V.H. Mankar, “Digital image forgery detection using
passive techniques : A survey,” Elsevier, 2013
into account the differences between them. Along with that
[11] Amandeep Kaur, Navdeep Kanwal and Lakhwinder Kaur, “A
we have included an overview of the detection of digital Comparative Review of Various Techniques for Image Splicing
image tampering as well as references for existing passive Detection and Localization,” Springer, 2020
methods. After classifying various image forgery detection [12] Renu Gopal Mani, Rahul Parthasarathy, Sivaraman Eswaran and
methods, the general structure of an image forgery detection Prasad Honnavalli, “A Survey on Digital Image Forensics: Metadata
is described in this article/paper. Then, evaluated the and Image forgeries,” PES University Bengaluru, India, 2022
effectiveness of certain common image phony detection [13] Rahul Thakur, Rajesh Rohilla, “Recent Advances in Digital Image
methods. The majority of approaches are designed to spot Manipulation Detection Techniques: A brief Review,” Elsevier, 2020
image alteration, and most of them can even pinpoint where [14] Mohammad Farukh Hashmi, Aaditya Hambarde, Vijay Anand and
the forged portions are located. Avinash Keskar, “Passive Detection of Copy-Move Forgery using
Wavelet Transforms and SIFT Features,” Journal of Information
Finally, we believe that this paper will help scholars Assurance and Security, 2014
working on digital image fraud detection come up with fresh [15] Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang
concepts, directly advancing the field of digital image Raymond Choo, “A survey of machine learning techniques in
adversarial image forensics,” Elsevier, 2021
forensics.
6
ed licensed use limited to: CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING - CDAC - KOLKATA. Downloaded on January 05,2024 at 07:55:14 UTC from IEEE Xplore. Restriction