Abstract
A forged image is a major source of counterfeit news and is mostly used in a spiteful manner such as exciting targeted mob, identity theft, defaming individual, or misleading law bodies. Therefore, a technique is required to detect the tampered regions in a forged image. Deep learning is surpassing technology for prediction or classification tasks in images. Challenges in this technology are a variety of datasets to train the model and specific architecture for a specific application. In this paper, a deep learning model is extended for the localization of tampered regions in a forged image. This is an extension of the well-known U-Net segmentation model. In the proposed model, batch normalization layers and identity-blocks are placed at suitable places of the U-Net model to overcome the challenges such as overfitting and loss of information during max-pooling. To overcome the challenge of the dataset five different publicly available datasets are taken to train, validate and test the model. The trained model is also tested on four created forged images (not belong to the dataset) whose acquisition sources may different i.e. medical image, identity document, natural image, and scanned report. The result of the proposed model is compared with state-of-the-art techniques which show that the method works better than others.
Similar content being viewed by others
References
Agarwal S, Chand S (2015) Image forgery detection using multi scale entropy filter and local phase quantization. Int J Image Graph Signal Process 7 (10):78
Badrinarayanan V, Kendall A, Cipolla R (2017) Segnet: a deep convolutional encoder-decoder architecture for image segmentation. IEEE Trans Pattern Anal Mach Intell 39(12):2481–2495
Bappy JH, Simons C, Nataraj L, Manjunath B, Roy-Chowdhury AK (2019) Hybrid lstm and encoder–decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300
Bianchi T, De Rosa A, Piva A (2011) Improved dct coefficient analysis for forgery localization in jpeg images. In: 2011 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2444–2447
Chen B, Tan W, Coatrieux G, Zheng Y, Shi YQ (2020) A serial image copy-move forgery localization scheme with source/target distinguishment. IEEE transactions on multimedia
Chierchia G, Poggi G, Sansone C, Verdoliva L (2014) A bayesian-mrf approach for prnu-based image forgery detection. IEEE Trans Inf Forensics Secur 9(4):554–567
Cozzolino D, Verdoliva L (2019) Noiseprint: a cnn-based camera model fingerprint. IEEE Trans Inf Forensics Secur 15:144–159
De Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inf Forensics Secur 8(7):1182–1194
Dong J, Wang WC (2018) v1. 0 and casia v2. 0 image splicing dataset. Natl Lab Pattern Recognit., Inst Autom Chinese Acad Sci Corel Image Database. http://forensics.idealtest.org. Accessed 05 May 2018
Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566–1577
He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recognit 45 (12):4292–4299
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
Hosny KM, Hamza HM, Lashin NA (2018) Copy-move forgery detection of duplicated objects using accurate pcet moments and morphological operators. Imaging Sci J 66(6):330–345
Hosny KM, Hamza HM, Lashin NA (2019) Copy-for-duplication forgery detection in colour images using qpcetms and sub-image approach. IET Image Process 13(9):1437–1446
Hosny KM, Mortda AM, Fouda MM, Lashin NA (2022) An efficient cnn model to detect copy-move image forgery. IEEE Access 10:48622–48632
IFS T (2019) IEEE IFS-TC image forensics challenge database. https://signalprocessingsociety.org/newsletter/2014/01/ieee-ifs-tc-image-forensics-challenge-website-new-submissions. Accessed 12 Mar 2019
Iakovidou C, Zampoglou M, Papadopoulos S, Kompatsiaris Y (2018) Content-aware detection of jpeg grid inconsistencies for intuitive image forensics. J Vis Commun Image Represent 54:155–170
Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning. PMLR, pp 448–456
Iuliani M, Fabbri G, Piva A (2015) Image splicing detection based on general perspective constraints. In: 2015 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 1–6
Jaiswal AK, Srivastava R (2020) Time-efficient spliced image analysis using higher-order statistics. Mach Vis Appl 31(7):1–20
Jaiswal AK, Srivastava R (2021) Detection of copy-move forgery in digital image using multi-scale, multi-stage deep learning model. Neural Process Lett:1–26
Jaiswal AK, Srivastava R (2021) Forensic image analysis using inconsistent noise pattern. Pattern Anal Applic 24(2):655–667
Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on multimedia and security, pp 1–10
Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450–461
Kadam KD, Ahirrao S, Kotecha K, et al. (2022) Efficient approach towards detection and identification of copy move and image splicing forgeries using mask r-cnn with mobilenet v1. Comput Intell Neurosci 2022
Korus P, Huang J (2016) Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans Image Process 25(3):1312–1326
Li W, Yuan Y, Yu N (2009) Passive detection of doctored jpeg image via block artifact grid extraction. Signal Process 89(9):1821–1829
Li J, Li X, Yang B, Sun X (2014) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518
Li D, Dharmawan DA, Ng BP, Rahardja S (2019) Residual u-net for retinal vessel segmentation. In: 2019 IEEE International conference on image processing (ICIP). IEEE, pp 1425–1429
Li Q, Wang C, Zhou X, Qin Z (2022) Image copy-move forgery detection and localization based on super-bpd segmentation and dcnn. Sci Reports 12(1):14987
Liu Q, Cao X, Deng C, Guo X (2011) Identifying image composites through shadow matte consistency. IEEE Trans Inf Forensics Secur 6(3):1111–1122
Lyu S, Pan X, Zhang X (2014) Exposing region splicing forgeries with blind local noise estimation. Int J Comput Vision 110(2):202–221
Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503
Mezzofiore G (2023) No, Theresa May and her cabinet didn’t pose in front of ‘The Scream’ (2017). https://mashable.com/2017/07/31/theresa-may-cabinet-the-scream-munch/. Accessed 20 Aug 2021
Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995
NG A (2020) Slides of deeplearning.ai. https://www.coursera.org/specializations/deep-learning. Accessed 12 Jan 2020
Pan X, Zhang X, Lyu S (2012) Exposing image splicing with inconsistent local noise variances. In: 2012 IEEE International conference on computational photography (ICCP). IEEE, pp 1–10
Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 1–6
Reichman B, **g L, Akin O, Tian Y (2021) Medical image tampering detection: a new dataset and baseline. In: International conference on pattern recognition,. Springer, pp 266–277
Riess C, Unberath M, Naderi F, Pfaller S, Stamminger M, Angelopoulou E (2017) Handling multiple materials for exposure of digital forgeries using 2-d lighting environments. Multimed Tools Appl 76(4):4747–4764
Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted intervention. Springer, pp 234–241
Singh A, Singh G, Singh K (2018) A markov based image forgery detection approach by analyzing cfa artifacts. Multimed Tools Appl 77 (21):28949–28968
Swaminathan A, Wu M, Liu KR (2007) Nonintrusive component forensics of visual sensors using output images. IEEE Trans Inf Forensics Secur 2 (1):91–106
Tralic D, Zupancic I, Grgic S, Grgic M (2013) Comofod—new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, pp 49–54
Tutorials U Convolutional neural network. http://deeplearning.stanford.edu/tutorial/supervised/ConvolutionalNeuralNetwork/. Accessed 19 Feb 2020
Yao H, Wang S, Zhao Y, Zhang X (2011) Detecting image forgery using perspective constraints. IEEE Signal Process Lett 19(3):123–126
Zeng H, Zhan Y, Kang X, Lin X (2017) Image splicing localization using pca-based noise level estimation. Multimed Tools Appl 76(4):4783–4799
Zhang W, Cao X, Qu Y, Hou Y, Zhao H, Zhang C (2010) Detecting and extracting the photo composites using planar homography and graph cut. IEEE Trans Inf Forensics Secur 5(3):544–555
Zhu N, Li Z (2018) Blind image splicing detection via noise level function. Signal Process Image Commun 68:181–192
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jaiswal, A.K., Srivastava, R. Fake region identification in an image using deep learning segmentation model. Multimed Tools Appl 82, 38901–38921 (2023). https://doi.org/10.1007/s11042-023-15032-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15032-6