Image Forgery Detection and Deep Learning Techniques: A Review

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2020)

IEEE Xplore Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2

Image Forgery Detection and Deep Learning


Techniques: A Review
1st Ritu Agarwal 2nd Deepak Khudaniya 3rd Abhinav Gupta
Department of Information technology Department of Information technology Department of Information technology
Delhi Technological University Delhi Technological University Delhi Technological University
Shahbad Daulatpur, Main Bawana Road Shahbad Daulatpur, Main Bawana Road Shahbad Daulatpur, Main Bawana Road
Delhi 110042, India Delhi 110042, India Delhi 110042, India
ritu.jeea@gmail.com deepakkhudaniya bt2k16@dtu.ac.in gupta.abhinav2010@gmail.com

4th Khyati Grover


Department of Computer Engineering
Delhi Technological University
Shahbad Daulatpur, Main Bawana Road
Delhi 110042, India
khyati.grover@yahoo.com

Abstract—Due to the easily available software for tampering of forged images, many types of research have been done to
images, image manipulation has become quite common. Since the detect manipulated images. Active approaches for forgery
tampered images are non-distinguishable by the naked eye, they detection which include digital signatures and watermarking
are being circulated on various platforms giving rise to rumors
and misleading many. This has led researchers to work on suffer fro m the drawback of inserting the watermark or the
various techniques for the detection of manipulated images with signature beforehand in the image which limits the scenarios
improved accuracy. Traditional works on image forgery detection where this technique would work. Various approaches have
are mostly based on extracting simple features that are specific been proposed for passive based forgery detection. Popescu
for detecting some particular type of forgery. Recently, works on Farid [10] described a method for detecting duplicate regions
forgery detection based on neural networks have proved to be
very efficient in detecting image forgery. Neural networks are
present in an image by apply ing PCA to blocks of images and
capable of extracting complex hidden features of an image, thus then sorting the blocks lexicographically. Amerini et al.
giving better accuracy. Contrary to the traditional methods of [1] has used a SIFT based approach that solves the two-fold
forgery detection, a deep learning model automatically builds the purpose of detecting the copy move forgery and to fetch the
required features, hence it has become the new area of research in geometric transformation applied to build the forged image.
image forgery. The paper initially discusses various types of image
forgery techniques and later on compares different approaches Wei et al. [12] proposed a rotation angle estimation method
involving neural networks to identify forged images. that can detect splicing forgery. The algorithm is capable of
Index Terms—Copy move forgery, Image splicing, blind detection of geometrical operations performed and to
Convolutional neural network, Deep neural network detect foreign areas present in t h e forged image. Ke et al.
[7] used a technique to detect forged images by determin ing
I. INT RODUCT ION the consistency of shadow. It assumes that the tampered image
The emergence and widespread usage of social media has an inconsistent shadow due to splicing. The method has a
platforms like Instagram, WhatsApp, Youtube, etc. have shortcoming that it only works for forged images with shadow.
increased the number of images being uploaded and shared on Another method to identify forgery in images with reflect ions
these platforms. These images are used to spread informat ion is developed by Farid [9] which detects geometrical
to a widespread audience and hence helps to form public inconsistencies based on 3-Dimensional geo metry, reflection,
opinion on a large scale. Due to this underlying property of and projection rules. Most of these methods involve the use of
forming mass opinions and easily available photo and video structural or geo metrical properties of images to ext ract
editing tools, many false images are circulated on these features. Image forgery detection methods that involve the use
platforms daily. Not only on social media, but tampered of deep learning techniques have become very popular
images are also used in courtrooms, scientific journals, nowadays. These approaches do not consider any statistical or
literature works, etc. Image forgery is a term that refers to geometrical calculations but tend to construct a model that
man ipulating or tampering the original image to hide some automatically ext racts useful features to perform the
useful information or to showcase some false information. The classification. The use of convolution neural networks has
purpose behind creating forged images could range from shown very good results over image manipulation detection.
earning money, spreading rumors, or making false claims in The paper presents an overview of basic concepts of image
one’s favor. Due to t h e widespread use of images and forgery and various research methodologies involving deep
serious consequences learning adopted so

978-1-7281-4876-2/20/$31.00 ©2020 IEEE 1096

Authorized licensed use limited to: University of Exeter. Downloaded on June 20,2020 at 08:03:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2020)
IEEE Xplore Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2

far for image forgery detection. The paper is div ided into the image sources. However, more than two image sources can
following sections. Section 2 discusses various techniques of also exist.
image forgery detection. Section 3 presents an overview and
general structure of the Convolutional Neural Network (CNN).
Various research approaches for manipulat ion detection using
CNN are co mpared and contrasted in section 4. The
conclusion of the paper is presented in Section 5.

II. IMAGE FORGERY T E CHNIQUES


To check an image for its originality, it is impo rtant to
understand various existing techniques of image forgery. These
techniques are broadly classified into active and passive
techniques that are further classified.

Fig. 1. Image forgery techniques

A. Active approach
In the active approach of fo rgery detection, the image is
pre-processed and some cipher key is inserted in the image.
The received image is authenticated by the use of that key
[11]. So me examp les of act ive approaches include digital
watermarking and signatures.

B. Passive approach
In this type of forgery detection method, no pre-processing
of the image is required. It is based on the fact that tampering
the original image results in producing inconsistencies within
Fig. 2. Image Splicing
its statistical properties or pixel intensities. These
inconsistencies are detected to find whether the image has
tampered or not. This technique is more popular than an active Copy move forgery
approach because of the non-requirement of any prior
As the name itself indicates, this type of forgery involves
informat ion of the image. This is further classified into two
copying one part of image and pasting it in some other
types-forgery independent and forgery dependent. Forgery location. The purpose is main ly to hide some important
dependent methods detect a specific type of forgeries whereas information in the image.
forgery independent methods detect forgery independent of
their type. 2) Forgery independent: Image retouching
1) Forgery dependent: These techniques are classified into This is the most widely used and most easy to do form
copy-move and image splicing. of image tampering wherein the features of the image are
Image splicing changed in order to produce tampered image. Th is may involve
Splicing refers to cutting out a part of one image and putting rotation, resizing, changing the brightness, sharpness, color
it in the other, thus the tampered image is produced by a contrast etc of the image.
combination of two images. The produced image has two

978-1-7281-4876-2/20/$31.00 ©2020 IEEE 1097

Authorized licensed use limited to: University of Exeter. Downloaded on June 20,2020 at 08:03:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2020)
IEEE Xplore Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2

III. BASIC CNN A RCHIT ECT URE


CNN has recently become very popular due to their ability
to learn the features of an image. They are widely being
emp loyed in image recognition and image processing tasks.
Hence, many types of research for identifying image forgery
are based on CNN.

Fig. 5. Basic CNN Architecture

CNN has recently become very popular due to their ability


to learn the features of an image. They are widely being
emp loyed in image recognition and image processing tasks.
Hence, many types of research for identifying image forgery
are based on CNN. Most CNN architectures are formed by a
combination o f one input and output layer, few convolution
Fig. 3. Copy move forgery
layers, and fu lly connected layers. Fig 5 shows a basic CNN
architecture. The input image is visualized as a matrix of
pixels. The matrix values are fed to the input layer which is
composed of many units. Before feeding the matrix values to
the input layer, these values are multiplied by the filter values
and then summed up. The filter slides over the input image to
produce the input matrix. While sliding, the corresponding
cells in the input matrix and filter are mu ltip lied and their sum
is fed into the output matrix. After this, a pooling operation is
done. The pooling can be max-pooling, average-pooling, or
global-pooling. The process is shown in fig 6.
In this way, the feature map is generated which is fed into
the input layer and the output is generated by applying the
activation function to the input. Activation functions such as
relu, sig moid, tanh, etc are widely used. CNN uses a pooling
layer which reduces the dimension of the data and serves the
dual purpose of reducing the enormous amount of output to be
fed into the next input layer and by losing some in formation,
the problem of overfitting is solved. After passing through a
series of hidden layers and pooling layers, the data goes into
mu ltip le fu lly connected layers where classification is
performed. Finally, in the output layer, the error is calculated
which is then propagated backward in the network to update
the weights of the filter. Thus, a series of feedforward and
backpropagation is done to minimize the error and train the
network.
I V. COMPARAT IVE ST UDY OF FORGERY IDENT IFICAT ION
Fig. 4. Image Retouching T E CHNIQUES USING NEURAL NET WORKS
The research method involves the use of CNN for the
detection of spliced, retouching, and recomp ressed images [6].
The CNN

978-1-7281-4876-2/20/$31.00 ©2020 IEEE 1098

Authorized licensed use limited to: University of Exeter. Downloaded on June 20,2020 at 08:03:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2020)
IEEE Xplore Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2

T ABLE I

Paper T argeted Forgery Features Layers Dataset Performance


Accuracy
Huang et al., Splicing, Retouching, and 5 Convolution Layers 95%(Spliced)
2018 [6] Recompressing Softmax Classifier CASIA v1.0 93%(Retouched)
2 Fully Connected Layers
71%(R ec om press)
Kim & Lee Median Filtering, Gaussian 2 Convolution Layers
Blurring, AWG N, High Pass Filter 2 Pooling Layers 1000 Images of Accuracy:95%
(2017) [8] Boss Base 1.01
Image Resizing 2 Fully Connected Layers.
Bayar & Median Filtering, Gaussian 1 newly proposed Collected from 12
Prediction Error 2 convolution layers
Stamm Blurring, AWGN, different camera Accuracy:99.10%
Filters 2 max pooling
(2017) [2] Resampling models.
3 fully connected layers.
Zhang et al. Distinguishes forged and original Works well on low- Accuracy:
2 Convolution Layers CASIA 2.0 85.35%(JPEG)
(2018) [13] edges of images resolution images. 2 Fully Connected Layers
82.93%(TIFF)
Hema Rajni Uses BDCT and CASIA v1.0 Accuracy(99.03%)
Copy move and Splicing —- T PR(98.91%)
(2019) [5] ZM Polar CASIA v2.0
TNR( 99.16% )
CASIA v1.0 Accuracy:
Zhou et al. Effective in JPG 7 Convolution Layers CASIA v2.0 97.62%(CASIA v1.0)
(2017) [14] Splicing Compression Columbia Image
2 Pooling Layers 97.87%(CASIA v2.0)
Forgery Database 96.38%(Columbia dataset)

produced by median filtering. Hence, some researches [8,2]


use additional filters or additional layers along with CNN to
extract the hidden features in an image. One approach using a
High Pass filter [8]. A high pass filter, wh ich is capable of
extracting hidden features from the image is applied to the
input image before feeding it into the input layer of CNN.
Also, the Local response normalizat ion (LRN) layer is applied
after the pooling layer to standardize the brightness. Another
approach involves using a new convolution layer along with
the traditional convolution layer [2]. Manipulation of an image
changes the local structural relat ionships of the pixels if not the
content of the image. Hence, a new convolution layer is used
to draw out those structural features which are independent of
Fig. 6. Convolution operation and max-pooling the image’s content. Bayar & Stamm [2] used prediction error
filters to specifically draw out manipulation detection features.

The above approaches work well on high-resolution images


architecture is co mposed of 5 convolution layers, 2 fully but are not as effective on low-resolution images because
connected layers along with a softmax classifier. For g radient these approaches rely on sharpness of edges or resampling
descent, stochastic gradient descent with mo mentu m (SGDM) features [13]. Thus, a novel approach based on fast shallow
optimizer was chosen. The method observes an accuracy of CNN is proposed in [13] for detecting the boundaries of
95%, 93%, and 71% accuracy in detecting spliced, retouched, forged images in low-resolution images. The main difference
and recompressed images when trained and tested over CASIA has tampered and original low- resolution images are in their
v1.0 [3] dataset. The dataset was divided into training and chroma and saturation. Since the research focuses only on the
testing set and accuracy was determined as how many edges, the CNN model has co mposed of two convolutions and
percentages of testing images were classified correctly. two fully connected layers along with skipping the pooling
However, some researchers [2, 4] suggest using only CNN for layer. Also, 20% of the filters use Laplacian kernels to ext ract
image forgery detection is not effective because CNN only resampling features and informat ion fro m edges. To localize
learns semantics or the content of the image. It is unable to the tampered region, the basic approach is to use sliding
identify forged images that do not change the content of the window detection which ext racts patches fro m the orig inal
image. For examp le, when forged images are p roduced by image and feed them into the Shallow Convolutional Neural
algorith ms such as Median Filter, Gaussian Blur, Additive Network (SCNN), but this has a high time co mplexity,
white Gaussian noise addition (AWGN), and Re-Samp ling in therefore fast SCNN approach as discussed in [13] feeds entire
which contents of the image remain the same, using CNN image in convolution layers to get feature vectors and then
alone doesn’t give the desired results. This effect was observed extract patches fro m the feature vectors to input into fully
in [4] where CNN alone was not able to detect forged images connected layers and constructing probability map.
However, this kind

978-1-7281-4876-2/20/$31.00 ©2020 IEEE 1099

Authorized licensed use limited to: University of Exeter. Downloaded on June 20,2020 at 08:03:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2020)
IEEE Xplore Part Number:CFP20K74-ART; ISBN: 978-1-7281-4876-2

of approach works for only low-resolution images. REFERENCES


Another approach proposes the use of CNN co mb ined with [1 ] Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra,
ZM-polar (Zernike mo ment) and block discrete cosine G. (2011). A SIFT-based forensic method for copy-move at-
transform (BDCT) in fo rgery detection and classification of tack detection and transformation recovery. IEEE T ransactions on
Information Forensics and Security, 6(3 PART 2), 1099–1110.
the type of forgery [5]. The image is converted to YCbCr form https://doi.org/10.1109/TIFS.2011.2129512
and to which de -correlation and BDCT are applied to generate [2 ] Bayar, B., & Stamm, M. C. (2016). A deep learning approach
feature vector set for the first CNN which classifies the image to universal image manipulation detection using a new convolu-
tional layer. IH and MMSec 2016 - Proceedings of the 2016
as original or fo rged. Another CNN model is trained to classify ACM Information Hiding and Multimedia Security Workshop, 5–10.
the image as copy-move or spliced. In the case of copy-move, https://doi.org/10.1145/2909827.2930786
features are ext racted using a circular hough transform (CHT), [3 ] Box, P. O. (2013). CASIA IMAGE TAMPERING DETECTION EVAL-
UATION DATABASE Jing Dong , Wei Wang and T ieniu Tan Institute
and the CNN model is trained using the patch method. Zhou et of Automation , Chinese Academy of Sciences. 422–426.
al. [14] have used a block-based rich model convolution [4 ] Chen, J., Kang, X., Liu, Y., & Wang, Z. J. (2015).
Median Filtering Forensics Based on Convolutional Neural
neural network (rCNN) method for spliced images. The entire Networks. IEEE Signal Processing Letters, 22(11), 1849–1853.
image is cut into blocks and these blocks are fed to an rCNN https://doi.org/10.1109/LSP.2015.2438008
model for processing. The rCNN model consists of 7 [5 ] Hema Rajini, N. (2019). Image forgery identification using convolution
convolution layers to extract the desired features. The neural network. International Journal of Recent Technology and Engi-
neering, 8(1 Special Issue 4), 311–320.
processed blocks are combined to form a feature vector of the [6 ] Huang, N., He, J., & Zhu, N. (2018). IEEE International Conference
original image. To solve the prob lem of different sizes of On Big Data Science And Engineering A Novel Method for Detecting
reconstructed features and loss of informat ion during Image Forgery Based on Convolutional Neural Network. 2018 17th
IEEE International Conference On Trust, Security And Privacy In Com-
reconstruction, resizing and pooling operations are performed. puting And Communications/ 12th IEEE International Conference On
The feature matrices are then reshaped to a one-dimensional Big Data Science And Engineering (TrustCom/BigDataSE), 1702–1705.
https://doi.org/10.1109/TrustCom/BigDataSE.2018.00255
feature vector which acts as input to the SVM classifier to
[7 ] Ke, Y., Qin, F., Min, W., & Zhang, G. (2014). Exposing image forgery by
classify images as forged or original. This method also proves detecting consistency of shadow. The Scientific World Journal, 2014(d),
its robustness for JPEG compressed images. 1–9. https://doi.org/10.1155/2014/364501
[8 ] Kim, D. H., & Lee, H. Y. (2017). Image manipulation detection
using convolutional neural network. International Journal of Applied
V . RESULT S AND D I SCUSSI ON Engineering Research, 12(21), 11640–11646.
[9 ] O’Brien, J. F., & Farid, H. (2012). Exposing photo manipulation with
The major outcomings of our analysis of different research inconsistent reflections. ACM Transactions on Graphics, 31(1), 1–11.
papers are:- https://doi.org/10.1145/2077341.2077345
[10 ] Popescu, A. C., & Farid, H. (2004). Exposing Digital
1. Deep Learning methods perform far better than traditional Forgeries by Detecting Duplicated Image Regions. Technical
methods as they can extract hidden features, thus they give Report, T R2004-515, Department of Computer Science,
higher levels of accuracy. Dartmouth College, Hanover, New Hampshire, 2000, 1–11.
http://os2.zemris.fer.hr/ostalo/2010 marceta/Diplomski files/102.pdf
2. These methods are flexible and can be modified a little to
[11 ] Prayla Shyry, S., Meka, S., & Mogant I, M. (2019). Dig-
be used for different types of forgery detection. ital image forgery detection. International Journal of Recent
A summary of review papers on forgery detection using Technology and Engineering, 8(2 Special Issue 3), 658–661.
deep learning techniques is presented in Table 1. https://doi.org/10.35940/ijrte.B1121.0782S319
[12 ] Wei, W., Wang, S., Zhang, X., & Tang, Z. (2010). Estimation
of image rotation angle using interpolation-related spectral signa-
V I. CONCL USION tures with application to blind detection of image forgery. IEEE
Transactions on Information Forensics and Security, 5(3), 507–517.
The paper presented the classification of various types of https://doi.org/10.1109/TIFS.2010.2051254
image forgery techniques. Tradit ional approaches of forgery [13 ] Zhang, Z., Zhang, Y., Zhou, Z., & Luo, J. (2018). Boundary-based Image
Forgery Detection by Fast Shallow CNN. Proceedings - International
detection use handcrafted features for tampering detection. Conference on Pattern Recognition, 2018-Augus(February), 2658–2663.
Instead, newer approaches based on deep neural networks https://doi.org/10.1109/ICPR.2018.8545074
(DNN) can outperform t raditional methods due to their ability [14 ] Zhou, J., B, J. N., & Rao, Y. (2017). Block-Based Convolutional Neural
Network. 65–76. https://doi.org/10.1007/978-3-319-64185-0
to extract co mplex features fro m the image. The paper
discusses basic CNN architecture which is used by most deep
learning approaches. Further, a comparative analysis of various
deep learning methods, their effectiveness, and their
limitat ions are discussed. Some methods classify the image as
original or tampered whereas some methods can detect the
tampered region also. Hence, we conclude that while DNN
approaches have their shortcomings and need further
improvement, but still they can perform better than the
traditional approaches. However, most of the deep learning
approaches detect an only specific types of forgeries. Hence,
in the future, there is a need to build more generalized
algorith ms that can detect various types of forgeries
simultaneously.

978-1-7281-4876-2/20/$31.00 ©2020 IEEE 1100

Authorized licensed use limited to: University of Exeter. Downloaded on June 20,2020 at 08:03:09 UTC from IEEE Xplore. Restrictions apply.

You might also like