A Survey of Deep Learning-Based Source Image Forensics

Image source forensics is widely considered as one of the most effective ways to verify in a blind way digital image authenticity and integrity. In the last few years, many researchers have applied data-driven approaches to this task, inspired by the excellent performance obtained by those techniques on computer vision problems. In this survey, we present the most important data-driven algorithms that deal with the problem of image source forensics. To make order in this vast field, we have divided the area in five sub-topics: source camera identification, recaptured image forensic, computer graphics (CG) image forensic, GAN-generated image detection, and source social network identification. Moreover, we have included the works on anti-forensics and counter anti-forensics. For each of these tasks, we have highlighted advantages and limitations of the methods currently proposed in this promising and rich research field.

[1]  Bo Wang,et al.  Source camera model identification based on convolutional neural networks with local binary patterns coding , 2018, Signal Process. Image Commun..

[2]  Michele Nappi,et al.  Mobile Iris Challenge Evaluation (MICHE)-I, biometric iris dataset and protocols , 2015, Pattern Recognit. Lett..

[3]  A. Piva An Overview on Image Forensics , 2013 .

[4]  Roberto Caldelli,et al.  Adversarial image detection in deep neural networks , 2018, Multimedia Tools and Applications.

[5]  Dong-Ming Yan,et al.  Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks , 2018, IEEE Transactions on Information Forensics and Security.

[6]  Qing Wang,et al.  Double JPEG compression forensics based on a convolutional neural network , 2016, EURASIP J. Inf. Secur..

[7]  Yao Zhao,et al.  Source camera identification based on content-adaptive fusion residual networks , 2017, Pattern Recognit. Lett..

[8]  Alex ChiChung Kot,et al.  Image Recapture Detection with Convolutional and Recurrent Neural Networks , 2017, Media Watermarking, Security, and Forensics.

[9]  Thirapiroon Thongkamwitoon,et al.  An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Roberto Caldelli,et al.  Image Origin Classification Based on Social Network Provenance , 2017, IEEE Transactions on Information Forensics and Security.

[11]  James Butcher,et al.  When seeing is no longer believing , 2019, Nat. Mach. Intell..

[12]  Yann LeCun,et al.  Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[13]  Marco Fontani,et al.  VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.

[14]  Bo Zhang,et al.  Recent Advances of Generative Adversarial Networks in Computer Vision , 2019, IEEE Access.

[15]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[16]  Luisa Verdoliva,et al.  On the vulnerability of deep learning to adversarial attacks for camera model identification , 2018, Signal Process. Image Commun..

[17]  Belhassen Bayar,et al.  Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[18]  Gang Wang,et al.  Multi-Task CNN Model for Attribute Prediction , 2015, IEEE Transactions on Multimedia.

[19]  Anderson Rocha,et al.  Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach , 2013, J. Vis. Commun. Image Represent..

[20]  Jukka Komulainen,et al.  Face Spoofing Detection Using Colour Texture Analysis , 2016, IEEE Transactions on Information Forensics and Security.

[21]  Paolo Bestagini,et al.  Forensic Camera Model Identification: Highlights from the IEEE Signal Processing Cup 2018 Student Competition [SP Competitions] , 2018, IEEE Signal Processing Magazine.

[22]  Hany Farid,et al.  Digital doctoring: how to tell the real from the fake , 2006 .

[23]  Ming He,et al.  Distinguish computer generated and digital images: A CNN solution , 2018, Concurr. Comput. Pract. Exp..

[24]  Wei Zhang,et al.  Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning , 2018, Sensors.

[25]  Fei Peng,et al.  Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis , 2017 .

[26]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[27]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[28]  Xinghao Jiang,et al.  Computer Graphics Identification Combining Convolutional and Recurrent Neural Networks , 2018, IEEE Signal Processing Letters.

[29]  Xinghao Ding,et al.  Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning , 2019, IEEE Access.

[30]  Yao Zhao,et al.  Security Consideration For Deep Learning-Based Image Forensics , 2018, IEICE Trans. Inf. Syst..

[31]  Jingsha He,et al.  Identification of the source camera of images based on convolutional neural network , 2018 .

[32]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[33]  Tiago Carvalho,et al.  Exposing Computer Generated Images by Using Deep Convolutional Neural Networks , 2017, Signal Process. Image Commun..

[34]  Modesto Castrillón Santana,et al.  Deep learning for source camera identification on mobile devices , 2017, Pattern Recognit. Lett..

[35]  Paolo Bestagini,et al.  A Preliminary Study on Convolutional Neural Networks for Camera Model Identification , 2017, Media Watermarking, Security, and Forensics.

[36]  Paolo Bestagini,et al.  First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.

[37]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[38]  Ting Liu,et al.  Recent advances in convolutional neural networks , 2015, Pattern Recognit..

[39]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[40]  Ming Xu,et al.  Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network , 2018, IEEE Access.