DEEP LEARNING BASED APPROACH
FOR IMAGE TAMPERING LOCALIZATION
IN IMAGE FORENSICS
Keerthi Prem R.
Reg no: TVE22ECAEI05
Guided by : Dr. Alex Raj S. M.
College of Engineering Trivandrum
Applied Electronics and Instrumentation
AGENDA
Introduction
01
Selection of topic
Problem Statement
02
Reason for choosing this problem
03 Research Objective
Objective of the research
General Workflow
04
Workflow diagram
PRESENTATION
2 TITLE
Literature Survey
05
Literature review on this area
WorkPlan
06
Plan of implementation
Work Done so far..
07
Whats done so far
Conclusion
08
Conclusion of the project
References
09
Papers referred for the implementation of the research.
3
PRESENTATION TITLE
Introduction Working Work so far Conclusion
Appx 5 min Appx 18 min Appx 5 min Appx 5 min
01
Introduction
INTRODUCTION
• The availability of various image-editing software and tools such as
Photoshop, GIMP, etc., has made it possible to create forgeries with minimal
effort.
• Today, it is quite easy to produce a manipulated media that looks indifferent
to the human eyes. Various types of digital image forgeries have evolved, the
major ones include copy-move, morphing, etc.
• But there is no reliable way of detecting and localize these changes. We can
create a model using Deep Learning to tackle this problem.
02
Research Objective
RESEARCH OBJECTIVE
• To find effective and efficient techniques to accurately detect and identify manipulated
images.
• To detect various types of image forgeries such as copy-move, splicing, and retouching.
03
General Workflow
Workflow Diagram
OUR WORKFLOW
ELA Algorithm Forgery
Preprocessing CNN Training/ Real/Fake? localization
Testing
IMAGE FORGERY
Image Forgery
Dataset ELA Algorithm Learning
Output- Image
Fake/Real?? Tampering Localization
Authentic Image after performing ELA
Algorithm
Forged Image after performing ELA
Algorithm
TEST RESULTS OF TAMPERING DETECTION
Authentic Image tested and predicted as authentic
TEST RESULTS OF TAMPERING DETECTION
06
WorkPlan
WORK PLAN
Activity Estimated Date
Guide Assigned 3rd week of March 2023
Area Selection 1st week of November 2023
Topic Selection 1st week of November 2023
1st Presentation 2nd week of November 2023
Pre-processing 1st week of December 2023
Feature implementation 2nd week December 2023
WORK PLAN
Activity Estimated Date
Localization Method 3rd week of December 2023
2nd Presentation 3rd week of December 2023
Error Debugging 4th week of December 2023
DTFT implementation 1st week of January 2024
3rd Presentation 2nd week of January 2024
Update & Status Shared 3rd week of February 2024
WORK PLAN
Activity Estimated Date
4th Presentation 2nd March 2024
5th Presentation 20 March 2024
07
Work Done so far..
WORK DONE FOR FORGERY DETECTION
1. Conducted literature surveys and have tried to implement various methods of Forgery
detection like Segmentation, classification etc.
2. Finally concluded to proceed with ELA Algorithm.
3. Various dataset available for this was CASIO, SEAM,CMFD etc.. Downloaded dataset of
CASIA 2 from Kaggle .Added few extra samples to the dataset.
4. With the help of library functions like numpy,pandas,keras,matplotlib and sklearn
implemented with python in Anaconda.
5. With the help of ELA algorithm performed ELA analysis on Forged and Un-Forged
images.
6. Compared the output of both of them and algorithm when implemented with CNN was
able to perform accurately and correctly classified them as forged and unforged.
WORK DONE FOR FORGERY LOCALIZATION
1. Conducted literature surveys and have tried to implement various methods of Forgery
localization technique like PRNU, softlight, DCT with Log filter etc..
2. Found out one of the effective localization to be implemented with PIL library function
in python.
3. Tried to make a superimposition model created by combination of ELA components and
the original image with accuracy.
4. Done segmentation and dilation based method and kmeans clustering based method
for the ELA image.
Expected Output:
Obtained Outputs:
Segmentation and Dilation Based Method
Kmeans Clustering
08
Conclusion
CONCLUSION
• In the proposed system, we are implemented different concepts of
image forgery detection with ELA algorithm and CNN based method with
CASIO 1&2 datasets.
• The system is capable of taking input image and give out suitable
outputs to solve the obstacle of forged images.
• The system can be used in law and enforcements and cyber security to
help the user to differentiate between legitimate and tampered images.
09
References
REFERENCES
1. N. Wang, L. Yi, G. Wang and X. Liu, "MemAU-Net: Memory-Enhanced Attention U-Net for Medical Image
Forgery Localization," 2023 International Joint Conference on Neural Networks (IJCNN), Gold Coast, Australia,
2023, pp. 1-7, doi: 10.1109/IJCNN54540.2023.10191370.
2. Yogitha, R. P, B. B. S, M. Reddy and R. Reddy, "Copy-Move Forgery Localization Using DCT With LoG Filter,"
2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar,
India, 2023, pp. 658-664, doi: 10.1109/ICSCCC58608.2023.10176525.
3. P. Buchana, I. Cazan, M. Diaz-Granados, F. Juefei-Xu and M. Savvides, "Simultaneous forgery identification and
localization in paintings using advanced correlation filters," 2016 IEEE International Conference on Image
Processing (ICIP), Phoenix, AZ, USA, 2016, pp. 146-150, doi: 10.1109/ICIP.2016.7532336.
4. F. Zeng, W. Wang, M. Tang and Z. Cao, "Exposing Blurred Image Forgeries through Blind Image Restoration,"
2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow,
Poland, 2015, pp. 466-469, doi: 10.1109/3PGCIC.2015.50.
5. N. K. Hebbar and A. S. Kunte, "Image Forgery Localization Using U-Net based Architecture and Error Level
Analysis," 2021 3rd International Conference on Advances in Computing, Communication Control and
Networking (ICAC3N), Greater Noida, India, 2021, pp. 1992-1996, doi: 10.1109/ICAC3N53548.2021.9725373.
6. Kuznetsov, Andrey. (2019). Digital image forgery detection using deep learning approach. Journal of
REFERENCES
Physics: Conference Series. 1368. 032028. 10.1088/1742-6596/1368/3/032028.
7. Yogitha, R. P, B. B. S, M. Reddy and R. Reddy, "Copy-Move Forgery Localization Using DCT With LoG
Filter," 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC),
Jalandhar, India, 2023, pp. 658-664, doi: 10.1109/ICSCCC58608.2023.10176525.
8. Yang, Jiachen & Xiao, Shuai & Li, Aiyun & Lan, Guipeng & Wang, Huihui. (2021). Detecting fake images
by identifying potential texture difference. Future Generation Computer Systems. 125.
10.1016/j.future.2021.06.043.
9. Ahmad, Mohassin & Khurshid, Farida. (2022). Detection and localization of image tampering in digital
images with fused features. Concurrency and Computation: Practice and Experience. 34.
10.1002/cpe.7191.
10. S. Manjunatha. and M. M. Patil, "Deep learning-based Technique for Image Tamper Detection," 2021
Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks
(ICICV), Tirunelveli, India, 2021, pp. 1278-1285, doi: 10.1109/ICICV50876.2021.9388471.
THANK YOU
PRESENTATION TITLE 30