Affiliation:
1. Government College of Engineering & Ceramic Technology
Abstract
Abstract
Images once were considered as a reliable source of information. However, when photo-editing software started to get noticed it gave rise to illegal activities that is called image tampering. These days we can came across innumerable tampered images across the internet. Software such as Photoshop, GNU Image Manipulation Program, etc. are applied to form tampered images from real ones in just a few minutes. When it comes to discover hidden signs of tampering in an image deep learning models are far more effective than any other methods. Models used in deep learning are capable of extracting intricate features from an image automatically. To differentiate between authentic and tampered images we presented a dual-branch Convolutional Neural Network (CNN) in conjunction with Error Level Analysis (ELA) and noise residuals from Spatial Rich Model (SRM). For our experiment we utilized the freely accessible CASIA dataset. After training the dual-branch network for 16 epochs, it generated an accuracy of 98.55%. We have also provided a comparative analysis with other previously proposed work in the field of image forgery detection. This experiment is done to prove that deep learning models along with some well known traditional approaches can provide better results for detecting tampered images.
Publisher
Research Square Platform LLC
Reference25 articles.
1. Boland FM, O'Ruanaidh JJ, Dautzenberg C. Watermarking digital images for copyright protection. InFifth International Conference on Image Processing and its Applications, 1995. 1995 Jul 4. pp. 326–330. https://doi.org/10.1049/cp:19950674.
2. Popescu AC, Farid H. Exposing digital forgeries by detecting duplicated image regions. 2004. https://digitalcommons.dartmouth.edu/cs_tr/254/. Accessed on 07 Sep 2021.
3. Fang Z, Wang S, Zhang X. Image splicing detection using color edge inconsistency. In2010 International Conference on Multimedia Information Networking and Security 2010 Nov 4. pp. 923–926. https://doi.org/10.1109/MINES.2010.196.
4. Chen J, Kang X, Liu Y, Wang ZJ. Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters. 2015 Jun 1. 22(11). pp.1849–1853. https://doi.org/10.1109/LSP.2015.2438008.
5. Krawetz N, Solutions HF. A picture’s worth. In: Black Hat Briefings USA. 2007. https://www.blackhat.com/presentations/bh-usa-07/Krawetz/Whitepaper/bh-usa-07-krawetz-WP.pdf. Accessed on 07 Sep 2021.