An efficient method for image forgery detection based on trigonometric transforms and deep learning

Image forgery detection is the basic key to solve many problems, especially social problems such as those in Facebook, and court cases. The common form of image forgery is the copy-move forgery, in which a section of the image is copied and pasted in another location within the same image. In this type of image forgery, it is easy to perform forgery, but more difficult to detect it, because the features of the copied parts are similar to those of the other parts of the image. This paper presents an approach for copy-move forgery detection based on block processing and feature extraction from the transforms of the blocks. In addition, a Convolutional Neural Network (CNN) is used for forgery detection. The feature extraction is implemented with serial pairs of convolution and pooling layers, and then classification between the original and tampered images is performed with and without transforms. A comparison study between different trigonometric transforms in 1D and 2D is presented for detecting the tampered parts in the image. This comparison study is based on the completeness rate for the detection. This comparison ensures that the DFT in 1D or 2D implementations is the best choice to detect copy-move forgery compared to other trigonometric transforms. In addition, the paper presents a comparison study between ten cases using the CNN learning technique to detect the manipulated image. The basic idea is to use a CNN to detect and extract features. The proposed CNN approach can also be used for active forgery detection because of its robustness to detect the manipulation of digital watermarked images or images with signatures.

[1]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[2]  Hong-Yuan Mark Liao,et al.  An efficient expanding block algorithm for image copy-move forgery detection , 2013, Inf. Sci..

[3]  Ainuddin Wahid Abdul Wahab,et al.  Copy-move forgery detection: Survey, challenges and future directions , 2016, J. Netw. Comput. Appl..

[4]  Leida Li,et al.  Detecting copy-move forgery under affine transforms for image forensics , 2014, Comput. Electr. Eng..

[5]  K Nishanth Identification of Diabetic Maculopathy Stages using Fundus Images , 2015 .

[6]  SchmidhuberJürgen Deep learning in neural networks , 2015 .

[7]  DeLiang Wang,et al.  Deep Learning Based Phase Reconstruction for Speaker Separation: A Trigonometric Perspective , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Yun Zhang,et al.  Wavelet based image fusion techniques — An introduction, review and comparison , 2007 .

[9]  A. B. Patankar,et al.  Copy move forgery detection , 2016 .

[10]  Chaitali Chakrabarti,et al.  A Survey on Lifting-based Discrete Wavelet Transform Architectures , 2006, J. VLSI Signal Process..

[11]  S S.Patil,et al.  Digital Image Forgery Detection Using Basic Manipulations In Facebook , 2014 .

[12]  Martin D. Levine,et al.  Face Recognition Using the Discrete Cosine Transform , 2001, International Journal of Computer Vision.

[13]  Azadeh Mansouri,et al.  Adaptive matching for copy-move Forgery detection , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[14]  Phil Kim,et al.  MATLAB Deep Learning , 2017, Apress.

[15]  Alin C. Popescu,et al.  Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .

[16]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[17]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[18]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[19]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[20]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[21]  Marc'Aurelio Ranzato,et al.  Unsupervised Learning of Invariant Feature Hierarchies with Applications to Object Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[22]  Jun-Ho Huh,et al.  Automatic Emotion-Based Music Classification for Supporting Intelligent IoT Applications , 2019, Electronics.

[23]  S. Winograd On computing the Discrete Fourier Transform. , 1976, Proceedings of the National Academy of Sciences of the United States of America.

[24]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[25]  Jun-Ho Huh,et al.  Big Data Analysis for Personalized Health Activities: Machine Learning Processing for Automatic Keyword Extraction Approach , 2018, Symmetry.

[26]  Amara Lynn Graps,et al.  An introduction to wavelets , 1995 .

[27]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[28]  Bram van Ginneken,et al.  A survey on deep learning in medical image analysis , 2017, Medical Image Anal..

[29]  Muhammad Ghulam,et al.  Accurate and robust localization of duplicated region in copy–move image forgery , 2014, Machine Vision and Applications.

[30]  Marek R. Ogiela,et al.  Multimedia tools and applications , 2005, Multimedia Tools and Applications.

[31]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[32]  Jun-Ho Huh,et al.  A Novel on Transmission Line Tower Big Data Analysis Model Using Altered K-means and ADQL , 2019, Sustainability.

[33]  Christoph Meinel,et al.  Deep Learning for Medical Image Analysis , 2018, Journal of Pathology Informatics.

[34]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[35]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .