Professional Documents
Culture Documents
Fraudulent Face Image Detection: ICACC-2020
Fraudulent Face Image Detection: ICACC-2020
Fraudulent Face Image Detection: ICACC-2020
https://doi.org/10.1051/itmconf/20203203005
ICACC-2020
Abstract. Due to the growing advancements in technology, many software applications are being developed to
modify and edit images. Such software can be used to alter images. Nowadays, an altered image is so realistic
that it becomes too difficult for a person to identify whether the image is fake or real. Such software applications
can be used to alter the image of a person’s face also. So, it becomes very difficult to identify whether the image
of the face is real or not. Our proposed system is used to identify whether the image of a face is fake or real.
The proposed system makes use of machine learning. The system makes use of a convolution neural network
and support vector classifier. Both these machine learning models are trained using real as well as fake images.
Both these trained models will take an image as an input and will determine whether the image is fake or real.
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution
License 4.0 (http://creativecommons.org/licenses/by/4.0/).
ITM Web of Conferences 32, 03005 (2020) https://doi.org/10.1051/itmconf/20203203005
ICACC-2020
2
ITM Web of Conferences 32, 03005 (2020) https://doi.org/10.1051/itmconf/20203203005
ICACC-2020
available for different applications. The proposed system 4.3 Choosing a Model
makes use of a convolution neural network and support
The proposed system makes use of a convolution neural
vector classifier. Both models give their results for the in-
network and an SVC-based machine learning model. CNN
put image. The proposed system makes use of a convolu-
model is generally used for image recognition and process-
tion neural network and supports vector classifier models.
ing pixel data. The proposed neural network uses two acti-
The working of our proposed system is as follows:
vation functions. The two activation functions used are the
ReLu and the Sigmoid activation function. The SVC clas-
sifier classifies the data into two classes. The two classes
are "real" and "fake".
• The first step in the system involves collecting the train- Figure 4. Sigmoid Graph
ing images and converting then into image arrays.
• Each fake or real image is labeled accordingly.
The curve is given by the following formula:
• The next step involves feeding the training data-set and
L
the labels to the machine learning algorithm to form a f (x) = (1)
model. 1+ e−k(x−x0 )
where:
• After the model is created, an input image that is to be
L = Curve’s maximum value
tested is taken and it is converted into an image array.
k = Steepness of the curve
• The image array of the input image is then fed into the x0 = x value of sigmoid’s midpoint
machine learning model to do the prediction.
• The model gives a label as a result of the prediction It is therefore often used in models where we have to
which is real or fake. estimate the likelihood of an output. Since the probability
of the output or prediction lies only between the range of
0 and 1, the sigmoid activation function is preferred for
4.1 Data Collection classification.
The data consists of images of different faces. Real as well 4.5 ReLU Activation Function
as fake images are collected for training. The data can
ReLU stands for the Rectified Linear Unit. It is the most
be obtained by manually altering images or by obtaining
used activation function in many machine learning appli-
through online available sources.
cations. Hence it is almost used in all convolution neu-
ral networks and deep learning. The ReLU function is
4.2 Data Preparation halfway rectified from the bottom. The value of a function
is zero when z is less than 0 and the value of a function is
The images are resized to a fixed dimension. The images z if the value of z is above or equal to zero. The equation
are resized to 50X50 pixel size to decrease the overall size for the ReLu function can be given as:
and space required to train the data. Images are then stored f (z) = max(0, z) (2)
in an array format for data training. After the model is cre-
ated, the input image for testing is also resized to 50X50
pixel size.
3
ITM Web of Conferences 32, 03005 (2020) https://doi.org/10.1051/itmconf/20203203005
ICACC-2020
Figure 6. Training of CNN model Figure 7. Graphical user interface of the proposed system
For the proposed system, the neural network model user interface of the system. The ‘Open’ button will open
used is called the Sequential model. This model has two a window from where you can select an image from your
main layers. There are two types of activation functions computer to be checked. Figure 7 displays the result of the
used which are "ReLU" and "Sigmoid". Each layer con- proposed system for a real image. The ‘Check’ button will
sists of a finite number of neurons. These neurons hold run the script for checking the image. Figure 8 displays
different values after the training process. When the test the process of splicing an image. Here, the term splicing
4
ITM Web of Conferences 32, 03005 (2020) https://doi.org/10.1051/itmconf/20203203005
ICACC-2020
Figure 9. Process of splicing an image Figure 11. Confusion matrix for the SVC-based model
5
ITM Web of Conferences 32, 03005 (2020) https://doi.org/10.1051/itmconf/20203203005
ICACC-2020
media platforms.
References
[1] Y. Guo, X. Cao, W. Zhang and R. Wang, "Fake Col-
orized Image Detection," in IEEE Transactions on In-
formation Forensics and Security, vol. 13, no. 8, pp.
1932-1944, August 2018.
[2] F. Marra, D. Gragnaniello, D. Cozzolino and L. Verdo-
liva, "Detection of GAN-Generated Fake Images over
Social Networks," 2018 IEEE Conference on Multime-
Figure 13. Confusion matrix for the CNN-based model dia Information Processing and Retrieval (MIPR), Mi-
ami, FL, pp. 384-389, 2018.
[3] L. Zhuo, S. Tan, J. Zeng and B. Lit, "Fake Colorized
Image Detection with Channel-wise Convolution based
Deep-learning Framework," 2018 Asia-Pacific Signal
and Information Processing Association Annual Sum-
mit and Conference (APSIPA ASC), Honolulu, HI,
USA, pp. 733-736, 2018.
[4] T. Pomari, G. Ruppert, E. Rezende, A. Rocha and T.
Carvalho, "Image Splicing Detection Through Illumi-
Figure 14. Classification report for the CNN-based model nation Inconsistencies and Deep Learning," 2018 25th
IEEE International Conference on Image Processing
(ICIP), Athens, pp. 3788-3792, 2018.
lution neural network and support vector classifier. Both [5] V. Mall, A. K. Roy and S. K. Mitra, "Digital im-
these algorithms extract the features from training images age tampering detection and localization using singu-
and forms two models. One model is based on CNN and lar value decomposition technique," 2013 Fourth Na-
the other is based on the support vector classifier. Both of tional Conference on Computer Vision, Pattern Recog-
these models predict their own results. The proposed sys- nition, Image Processing and Graphics (NCVPRIPG),
tem displays result from both the models. The currently Jodhpur, pp. 1-4, 2013.
proposed system has an accuracy of 65% for the SVC- [6] T. Edmunds and A. Caplier, "Fake face detection
based model and 94% for the CNN-based model used in based on radiometric distortions," 2016 Sixth Interna-
the proposed system. Hence, the proposed system can play tional Conference on Image Processing Theory, Tools
an important role in identifying any altered face image and Applications (IPTA), Oulu, pp. 1-6, 2016.
which can help people from getting misguided on social [7] C. Hsu, C. Lee and Y. Zhuang, "Learning to De-
media platforms. tect Fake Face Images in the Wild," 2018 Interna-
tional Symposium on Computer, Consumer and Con-
trol (IS3C), Taichung, Taiwan, pp. 388-391, 2018.
8 Future Scope [8] Tariq, Shahroz Lee, Sangyup Kim, Hoyoung Shin,
Youjin Woo, Simon. (2018). Detecting Both Machine
The proposed system can be included with a face recogni-
and Human Created Fake Face Images In the Wild. 81-
tion algorithm to identify the presence of any face before
87. 10.1145/3267357.3267367.
checking the image. The accuracy of the system can be
increased by providing more data-set of real and fake [9] Kumar, Manoj Srivastava, Sangeet. (2017). Image
images. The accuracy can also be increased by altering forgery detection based on physics and pixels: a study.
the parameters used for training the data. The parameters Australian Journal of Forensic Sciences. 51. 1-16.
include the number of layers of neurons, activation 10.1080/00450618.2017.1356868.
functions, etc. The proposed system can be applied to [10] J. Kim, S. Han and S. S.Woo, "Classifying Genuine
social media platforms to check the authenticity of a facial Face images from Disguised Face Images," 2019 IEEE
image. Hence, the proposed system can help people to International Conference on Big Data (Big Data), Los
identify if any facial image is altered or not on social Angeles, CA, USA, 2019, pp. 6248-6250.
6
© 2020. This work is licensed under
https://creativecommons.org/licenses/by/4.0/ (the “License”).
Notwithstanding the ProQuest Terms and conditions, you may use this
content in accordance with the terms of the License.