Affiliation:
1. Department of Computer Techniques Engineering Dijlah University College Baghdad Iraq
2. Computer Engineering College of Engineering Al‐Iraqia University Baghdad Iraq
Abstract
AbstractFace image manipulation detection (FIMD) is a research area of great interest, widely applicable in fields requiring data security and authentication. Existing FIMD schemes aim to identify manipulations in digital face images, but they possess individual strengths and limitations. Most schemes can only detect specific manipulations under certain conditions, leading to variable success rates across different images. The literature lacks emphasis on detecting manipulations involving multiple faces. This paper introduces a novel blind tamper detection and localization scheme specifically designed for multiple faces in digital images. The proposed multiple faces manipulation detection (MFMD) scheme consists of two stages: face detection and selection, and image watermarking. Through extensive experiments, the MFMD scheme's performance has been evaluated on various multiple‐face images, considering embedding capacity, payload, watermarked image quality, time complexity, and manipulation detection ability. The results demonstrate the MFMD scheme's efficacy in detecting different types of manipulations for multiple faces in images. Furthermore, the watermarked images exhibit high visual quality, even when multiple faces are present. The scheme's efficiency recommends it for practical applications, especially in sharing personal images over unsecured networks. This research advances FIMD techniques by addressing the neglected area of multiple‐face manipulation detection. With improved accuracy, faster processing times, and resilience against various manipulations, the MFMD scheme offers valuable capabilities for enhancing data security and authentication in real‐world scenarios.
Publisher
Institution of Engineering and Technology (IET)
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Signal Processing,Software
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献