Minor Project: Image Forgery Detection

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

MINOR PROJECT

IMAGE FORGERY
DETECTION
Compiled by
Group 114
Chandan Dhiman(181344)
Shivek Gupta(181323)
Pradyuman Sharma(181335)
INDEX

 INTRODUCTION TO IMAGE FORGERY


 IMPORTANCE OF IMAGE FORGERY
 ABOUT PROJECT
• TECHNOLOGY USED
• VARIOUS STUDIES
 PROJECT SCREENSHOTS
 CONCLUSION
 BIBLOGRAPHY
INTRODUCTION TO IMAGE
FORGERY DETECTION
Image forgery means manipulation of the digital image to conceal some
meaningful or useful information of the image. There are cases when it
is difficult to identify the edited region from the original image. The
detection of a forged image is driven by the need of authenticity and to
maintain integrity of the image.
There are various kinds of tampering attacks being applied to images and
videos. Some of them are commonly used by attackers like copy-move,
slicing, re-sampling, resizing, noise variations and/or blurring,
retouching, JPEG compression, luminance non-linearities and lighting
inconsistencies.
IMPORTANCE OF IMAGE FORGERY

The pixel-based image forgery detection aims to verify the authenticity of digital
images without any prior knowledge of the original image. There are many ways
for tampering an image such as splicing or copy-move, resampling an
image(resize, rotate, stretch), addition and removal of any object from the
image.
Digital images which are having fake information can lead to wrong judgments
for proving the authenticity and integrity of the original information. Image
forgery detection is a very popular method for finding out the authenticity before
using that image as evidence for a law investigation. It is very difficult to identify
whether an image is real or not by using the naked eye, which increases the
serious vulnerabilities of digital images.
ABOUT PROJECT

• TECHNOLOGY USED

 ANACONDA NAVIGATOR
Anaconda Navigator is a desktop GUI that comes with Anaconda Individual
Edition. It makes it easy to launch applications and manage packages and
environments without using command-line commands.
 TENSORFLOW 3.1.0
Tensorflow is an environment which is created by the user in the anaconda
nevigator library. The numpy and keras also comes under the tensorflow environment.
Tensorflow is a free and open-source software library for machine learning. It can be
used across a range of tasks but has a particular focus on training and inference of deep
neural networks. Tensorflow is a symbolic math library based on dataflow and
differentiable programming. It is also used for both research and production at Google.

 NumPY 1.19.5
NumPy is the fundamental package for array computing with Python. NumPy can
also be used as an efficient multi-dimensional container of generic data. Arbitrary
data-types can be defined. This allows NumPy to seamlessly and speedily integrate with
a wide variety of databases
 KERAS 2.4.3
Keras is an open-source software library that provides a Python interface for
artificial neural networks. Keras acts as an interface for the Tensorflow
library. Designed to enable fast experimentation with deep neural networks, it
focuses on being user-friendly, modular, and extensible.

 VISUAL STUDIO C++


Visual Studio is an integrated development environment (IDE) from
Microsoft. It is used to develop computer programs, as well as websites, web
apps, web services and mobile apps. Microsoft Visual C++ is Microsoft's partial
implementation of the C and full implementation C++ compiler and associated
languages-services and specific tools for integration with the Visual Studio IDE.
 CONDA
Conda is an open source package management system and environment
management system that runs on Windows, macOS and Linux. Conda easily creates,
saves, loads and switches between environments on your local computer. It was
created for Python programs, but it can package and distribute software for any
language.

 FACE_RECOGNITION
face_recognition you can use to recognize faces in a photograph or folder full for
photographs. face_recognition that you can use to recognize faces in a photograph or
folder full for photographs. you need to provide a folder with one picture of a person .
There should be one image file for each person with the files named according to
who is in the picture.
 FFMPEG
FFmpeg is a free and open-source software project consisting of a large suite
of libraries and programs for handling video, audio, and other multimedia
files and streams . ffmpeg is a very fast video and audio converter that can
also grab from a live audio/video source. It can also convert between arbitrary
sample rates and resize video on the fly with a high quality polyphase filter.
 IMAGEIO
An interface to be implemented by objects that can determine the settings
of an IIOParam object, either by putting up a GUI to obtain values from a
user, or by other means.
• VARIOUS STUDIES

 2018
Image manipulation has eroded our trust of digital images, with
more subtle forgery methods posing an ever-increasing challenge
to the integrity of images and their authenticity. Over recent years,
a significant research contribution has been dedicated to devising
new techniques for countering various image forgery attacks. In this
article, a survey of such research contributions has been conducted
by following a well-defined systematic process. A total of 66 primary
studies published before July 2017 was selected from five different
electronic databases using a careful scrutinizing process. Four
research questions have been formulated that capture various aspects
of the identified primary studies. The field background required to
understand the evolution of digital image forgeries is also presented.
The aim of this systematic survey is to gain insights into the current
research on the detection of these forgeries by comprehensively
analysing the selected studies in order to answer this predefined set
of research questions. This survey also discusses various challenges
that need to be addressed, and has recommendations for possible
future research directions.
 2019

With the phenomenal development in processing power and the


dropping cost of high-resolution imaging devices and computer
hardware, coupled with the availability of sophisticated user-
friendly image manipulation programs, the instances of forgery in
digital images has increased manifold. In the current scenario, Digital
Image Forensics is an area that has gained immense importance and
is instrumental for detecting image forgery. Digital image forgery
detection includes Blind or Passive techniques that don’t require any
previous information of an image, as the tampered image carries
inconsistencies that can be used to detect forgery. Imaging devices
and processing techniques, however different from each other, carry
a consistent pattern in the image which, if tampered would introduce
a deviation from the original pattern. This deviation enables one
to detect forgery of images. In this paper, various passive forgery
detection techniques are discussed with a special focus on pixel- and
physics-based techniques. This paper aims is to deliver an overview of
emerging techniques in the field of Image Forgery Detection.
 2020-1

We propose a camera identification algorithm based on the conditional


probability features (called CP features in this paper). Specifically, we
report its performance for identification of image sources. Using four
cameras of different models, we demonstrate that the CP features allow
us to correctly identify the sources of 400 test images with an average
accuracy of 99.50%. Additionally, the CP features based camera
identification algorithm is also robust to cropping and compression. When
the 400 images are cropped and JPEG compressed with QF=80 the
average identification accuracy only slightly drops to 97.75%.
These experimental results provide a good indication that CP features are
promising new features for image forensics purposes.
 2020-2

Source Camera Identification (SCI) has been playing an important role in


the security field for decades. With the development of Deep Learning,
the performance of SCI has been noteworthily improved. However, most
of the proposed methods are forensic only for a single camera
identification category, e.g., the camera model identification. For
exploiting the coupling between different camera categories, we present
a new coding method. That is, we apply the multi-task training method
to regress the categories, namely, to classify brands, models and devices
synchronously in a single network. Different from the common multi-task
method, we obtain the multi-class classification result by just one single
label classification. To be specific, we classify the categories in a
progressive way that the parent category classification result will be
used in the child category classification
PROJECT SCREENSHOTS
OUTPUT
CONCLUSION
From all the studies we did we came to know that image forgery detection is very
important aspect related to almost every field in the real life which also includes
the law department. If not careful then anything can be done with the help of
editing.

Developing software’s with common test datasets to ascertain the motive for which
the software’s are being used whether for genuine or malicious image manipulation
had to be done.

The final experiment shows that our method is becoming effective as we use and
study the data provided to the existing methods. These days, all the dangers of the
face tampering in photographs are widely recognized. We can provide two possible
networking architectures to detect such forgeries efficiently. Deepfake also plays a
vital role in image forgery and through this study, we believe that more tools will
emerge in the future toward an even better understanding of deep networks to
create more effective and efficient ones which can be used in both a good and a
bad way.

You might also like