Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Prof. D. Ahir, Sakshi Kapse, Sayali Mhaske, Tanuja Pansare, Param Kalane
DOI Link: https://doi.org/10.22214/ijraset.2024.62616
Certificate: View Certificate
In the era of digital media, the manipulation of images has become a significant concern, particularly on social media platforms. Adversarial Learning for Constrained Image Splicing Detection and Localization aims to develop a robust system capable of recognizing and localizing spliced or tampered images. This research proposes a novel approach that leverages Convolutional Neural Networks (CNNs) and adversarial learning techniques to enhance the detection and localization of image splicing. The system is designed to aid in distinguishing between authentic and manipulated images, thereby promoting trans- parency and trust in digital media. With the rapid advancement of digital media and image editing tools, the manipulation of visual content has become increasingly prevalent, posing significant challenges to the credibility and trustworthiness of images shared on social media platforms. One pervasive form of image manipulation is image splicing, where portions of two or more images are seamlessly combined to create a composite image, often with the intent to mislead or deceive viewers. Adversarial Learning for Constrained Image Splicing Detection and Localization aims to address this issue by developing a robust system capable of accurately detecting and localizing spliced regions within tampered images. This research proposes a novel approach that synergistically integrates Convolutional Neural Networks (CNNs) and adver- sarial learning techniques to enhance the performance of image splicing detection and localization. The proposed system employs a two-stage process: first, a CNN-based classifier is trained on a large dataset of authentic and spliced images to learn discriminative features for distinguishing between the two classes; subsequently, an adversarial learning model is employed to generate adversarial examples that can deceive the CNN classifier, while the classifier is iteratively updated to become more robust against these adversarial perturbations. By accurately identifying and localizing spliced regions within images, this research contributes to promoting transparency and trust in digital media shared on social media platforms, ultimately empowering users to make informed decisions about the authenticity of visual content. The proposed system has potential applications in various domains, including journalism, law enforcement, and content moderation, where verifying the integrity of visual evidence is of paramount importance.
I. INTRODUCTION
Images begin playing an increasingly important role in today’s society. It’s mesmerizing how we can capture a cap- turing a single instant in time and preserving it in digital form. We are witnessing the evolution of camera sensors that can record photos in astonishing resolutions that leave us breathless through their subtleties, in contrast to the past when photographs had to paint or the quality of image we collected was inadequate. Even though most people use their phones to snap pictures, a lot of people manage to become proficient photographers and pursue photography as a vocation. As a result of this growth in the modern world, numerous picture editing software packages have been created, enabling users to modify and enhance their images in different ways. Al- though software is primarily used to alter an image’s color or saturation, there are other applications for it.
Photoshop is one of the most widely used software programs today, and used to produce stunning photos with addition of fictional settings or objects. For example, a skilled user of this software may easily inserts an animal into a photo of you standing alone, making it impossible for others noticing the addition.
The technique for detecting picture forgeries establishes whether the image has been altered. A adequate is required to ascertain whether or not a specific image is fabricated. Features based on convolutional neural network (CNN) models are effective features to classify the category image because existing approaches for feature extraction based on handcrafted features or feature engineering and not invariant to various types transformations, geometrical, and post-processing oper- ations. Additionally, feature extraction and feature engineering are crucial and tasks that take a lot of time in today’s CNNs because the deeper layers of the network involve several layers of neurons processing data that gets more complex. The primary benefit of CNN and deep learning is their ability to automatically learn relevant features.
This is in contrast to the very challenging process of manually or through feature engineering developing features. This paper aims to carry out the process of identifying counterfeit images through the use of convolutional neural networks, a kind of machine learning. Recent advances in Deep Learning have led to significant advancements in computer vision applications, spanning from safer self-driving automobiles to facial recognition phone unlocking.Most modern deep learning models (CNN) use arti- ficial neural networks, specifically Recurrent Neural Networks 10 (RNN) and Convolution Neural Networks.
The detection of image fraud is the current problem. Image forgeries can be created using a variety of techniques, includ- ing the ones listed below for retouching, slicing, copy-paste, copy and move, and filters. There are situations when image creation entails altering and adding elements to an image.
II. LITERATURE REVIEW
NAM THANH PHAM et al. [1] Provides a thorough analysis of state-of-the-art DL-based photo imitation finding approaches. Two of the most well-known types of created images were considered: grafted photos and duplicate move photos. Lately, because of advances in deep learning, DL- based methods have produced significantly better outcomes than traditional non-DL-based methods. The solutions dis- cussed above were developed by combining or constructing various successful deep learning algorithms, such as CNN, RCNN, or LSTM, to adapt to spotting changed patterns.
Boubacar Diallo et al. [2] management by initial a repre- sentation of the layer and an exploratory examination of the impact of the learned elements. This investigation drove us to a more robust and accurate system. Finally, we applied this superior framework on a picture phony location application and showed a few promising results. The suggested framework e offers a structure that increases the capacity for detecting picture fraud. Our structure’s primary stage is to take the chosen application’s picture quality into account. management by initial a representation of the layer and an exploratory examination of the impact of the learned elements. This investigation drove us to a more robust and accurate system. Finally, we applied this superior framework on a picture phony location application and showed a few promising re- sults.Consequently, we used a convolutional neural network- based camera identification model.Lossy pressure, such as JPEG being the most popular sort of unintentional or inten- tional photo-fake camouflage, is what motivates us to test our theory on this control. Thus, a mixture of different packed and uncompressed visual properties takes care of our trained CNN. The significance of this shift toward evaluating our methodology’s efficacy versus more recent approaches in the literature was demonstrated by the experimental results. In order to better understand our trained CNN, we suggested an inside and out management by initial a representation of the layer and an exploratory examination of the impact of the learned elements. This investigation drove us to a more robust and accurate system. Finally, we applied this superior framework on a picture phony location application and showed a few promising results.out management by first creating a layer representation and conducting an investigation into the effects of the learnt components. This inquiry led to the development of a more reliable and precise mechanism. Ulti- mately, we implemented this enhanced framework on a photo- fake location application and demonstrated some encouraging outcomes.”
Shijo Easow et al. [3] informed that a review will provide fresh scientists with information on picture falsification and its finding processes.
Syed Sadaf Ali et al.[4] suggested a robust system based on deep learning to differentiate between picture frauds in relation to double picture pressure. Our model is built by distinguishing between the unique and recompressed forms of an image. The suggested model is small and light, and it can be seen that it can outpace the fastest in the class. The investigation’s findings, which have a 92.23
A Kuznetsov [5] suggested network engineering groups outcomes for a fix: unique or falsification, using picture patches as information. During the preparatory phase, we choose patches from distinctive photo districts and along the grafting lines that have been installed. The obtained results show good characterization accuracy (97.8
Wei Wang, Jing Dong and Tieniu Tan [6] IMAGE CHROMA-BASED EFFECTIVE IMAGE SPLICING DE-TECTION WAS PROPOSED. This work proposes a color picture splicing detection approach based on the gray level cooccurrence matrix (GLCM) of the thresholded edge image of the image chroma. The process of creating edge images involves deducting the values of the horizontal, vertical, major, and minor diagonal pixels from the current pixel values. The resulting images are then thresholded using a predetermined threshold T. Features for the identification of image splicing are the GLCMs of edge pictures in each of the four directions. In our technique, we apply boosting feature selection to pick optimal features and use Support Vector Machine (SVM) as the classifier. Our experimental results illustrate the efficiency of the proposed strategy. A passive technique for detecting color image splicing has been proposed in this paper.based on the chroma component analysis of the image.
The suggested qualities of the Cb (or Cr) component are more effective than those of the Y component, as demonstrated by the experimental results. In order to decrease feature dimensions, feature selection (enhancing feature selection) has been done after feature extraction.
Can Chen, Scott McCloskey, Jingyi Yu [7] Improved Cam- era Response Function Analysis for Image Splicing Detection. In this study, we describe a novel method for reliable and efficient copy-move forgery detection and localization, based on the analysis of the camera reaction functions (CRF). First, we examine the effects of non-linear CRFs on edges as they relate to the bivariate histograms of intensity and gradient. We present a deep learning system to identify and locate forged edges based on our findings. Specifically,we demonstrate that the issue may be reformulated as a handwriting recognition problem and addressed with a convolutional neural network. We create a sizable collection of spoof photographs through splicing and retouching, and thorough tests demonstrate that our suggested approach beats the most advanced methods in terms of accuracy and robustness. Our research introduces a new forensic technique that utilizes the Camera Response Function (CRF) to enhance the accuracy of detecting a broader spectrum of alteration activities. Our focus is on splicing oper- ations, which entail the extraction of content from one image and its subsequent copying into another. In order to do this, the original image’s content is typically segmented, creating sharp borders between the information and the background. Current forensic techniques for splicing detection are vulnerable to false positives when portions of a real image have spatially- varying qualities because they rely on the features of distinct image regions for detection.
Tae Hee Park, Jong Goo Han, Yong Ho Moon Il Kyu Eom
[8] published a work on the detection of image splicing in the wavelet domain using inter-scale 2D joint characteristic func- tion moments.In this research, we present a wavelet-domain approach for detecting picture splicing by employing the char- acteristic function moments for the inter-scale co-occurrence matrix. Using a pair of wavelet difference values across inter- scale wavelet subbands, we build the co-occurrence matrices. To avoid information loss, we do not use the thresholding procedure in this step. To identify image splicing forgeries, we extract the high-order characteristic function moments of the two-dimensional joint density function produced by the inter-scale co-concurrent matrices. Our technique uses only the luminance component of a picture and may be applied to any color or grayscale image dataset. Through the use of experimental simulations,We show that the suggested approach performs well in splicing detection. Our findings demonstrate that, using four well-known splicing detection picture datasets, the detection accuracy was, on average, higher than 95
III. PROPOSED SYSTEM
A. Image Acquisition
B. Preprocessing:
C. CNN Classifier
D. Adversarial Training:
E. Localization of Spliced Regions:
F. Constrained Adversarial Perturbations:
G. Scalability and Generalization:
H. Relationships:
I. Data Flow:
For image detection, data travels from the user interface component to the image preprocessing module and finally to the CNN model. Results from the CNN Model are output, and the Result Presentation Module shows them to the user.
J. Training and Evaluation Flow:
Information travels from the Evaluation Module to the CNN Model in order to assess performance, and from the Training Module to the CNN Model for training.
K. Integration:
Smooth communication and integration are made possible by the different parts of the system interacting with one another through clearly defined interfaces and APIs. It is possible to interface external databases or data sources to store diagnostic results, model parameters, and image data.
IV. METHODOLOGY
V. SYSTEM OVERVIEW
A. User Registration and Authentication:
By enabling users to create accounts and safely log in, the platform provides a smooth user experience.To preserve privacy and data integrity, user profiles are kept in a secure setting.
B. Image Upload:
A drag-and-drop area or file explorer option allows users to select and upload the image they wish to analyze.
C. Result Display:
The results of the analysis are presented in a clear and concise manner, indicating whether the image is authentic or spliced.
D. Spliced Region Visualization:
If the image is detected as spliced, the system displays a visual representation of the localized spliced regions within the image. This visualization can take the form of a heatmap or bounding boxes overlaid on the original image, highlighting the tampered areas.
E. Confidence Score:
To provide users with additional context, the system dis- plays a confidence score or probability indicating the degree of certainty in the classification and localization results.
F. Additional Information:
The interface may include supplementary information, such as the processing time, image metadata, and any relevant details about the analysis process.
VI. RESULT AND DISCUSSION
The project suggests a web application that uses machine learning for image splicing detection and localization. espe- cially the CNN algorithm. Users are able to upload pho- tographs, and the system can distinguish between modified and real images. When compared to other traditional procedures, this offers a possibly speedier and more accessible answer.
VII. ACKNOWLEDGEMENT
I want to express my gratitude to everyone who helped make this study feasible. I sincerely thank Prof. D.D. Ahir for all of his helpful advice, steadfast support, and perceptive criticism during this process. We also like to express our gratitude to all of the Savitribai Phule Pune University’s computer engineering department staff members for their prompt assistance and inspiration in finishing the project. A special thank you to my friends and colleagues who helped with the study and contributed their knowledge at different points. Without these people’s and organizations’ combined efforts and support, this research would not have been feasible. I want to thank each and every one of you for joining me on this journey.
A project on constrained image splicing detection and localization concludes that the implemented techniques effec- tively identify and locate manipulated regions within images. The study demonstrates the significance of accurate detec- tion methods in addressing specific constraints, such as low- resolution images, sophisticated splicing techniques and com- putational limitations. The findings underscore the importance of advancements in image forensics for various applications including forensic investigations, media integrity assurance, content verification, copyright protection and medical imaging. Further research and development in this area are crucial to improve detection accuracy and reliability in combining image manipulation, ensuring the authenticity and trustworthiness of digital visual content across diverse domains. CNN is a popular and highly effective method for classify- ing images and identifying objects. Because of its hierarchical structure and powerful feature extraction capabilities, CNN is a very resilient technology for a wide range of image and object identification applications. Mobile devices can benefit greatly from the depth-wise separable convolutional neural network model created in this study since it has low latency and requires less processing power to maintain good accuracy. Because of its hierarchical structure and powerful feature extraction capabilities, CNN is a very resilient technology for a wide range of image and object identification applications. CNN’s primary advantage over its forerunners is its ability to identify critical characteristics without requiring human assistance. CNN has the best algorithm out of all of them.
[1] NAM THANH PHAM1 AND CHUN-SU PARK “Toward Deep- Learning-Based Methods in Image Forgery Detection: A Survey” 10.1109. [2] Boubacar Diallo *, Thierry Urruty, Pascal Bourdon, Christine Fernandez-Maloigne “Robust forgery detection for compressed images using CNN supervision” Forensic Science International: Reports 2 (2020) 100112. [3] Shijo Easowa*, Dr. L. C. Manikandan “A Study on Image Forgery Detection Techniques” International Journal of Computer (IJC) ISSN 2307-4523. [4] Syed Sadaf Ali 1,* ,†, Iyyakutti Iyappan Ganapathi 2,†, Ngoc-Son Vu 1 , Syed Danish Ali 3 , Neetesh Saxena 4 and Naoufel Werghi “Image Forgery Detection Using Deep Learning by Recompressing Images” Electronics 2022, 11, 403. https:// doi.org/10.3390/electronics11030403. [5] A Kuznetsov “Digital image forgery detection using deep learning approach” Journal of Physics: Conference Series. Conf. Ser. 1368 032028. [6] Wei Wang, J. Dong and T. Tan, ”Effective image splicing detection based on image chroma,” 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009. [7] C. Chen, S. McCloskey and J. Yu, ”Image Splicing Detection via Camera Response Function Analysis,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition. [8] Park, Tae Han, Jong Moon, Yong Eom, Il. (2016). Image splicing detection based on inter-scale 2D joint characteristic function moments in wavelet domain. EURASIP Journal on Image and Video Processing. 2016. [9] Sutthiwan P, Shi Y Q, Zhao H, Ng T-T and Su W 2011 Markovian rake transform for digital image tampering detection Transactions on data hiding and multimedia security VI 1-17. [10] Lin Z, He J, Tang X and Tang C-K 2009 Fast, automatic and finegrained tampered jpeg image detection via DCT coefficient analysis Pattern Recognition 42(11) 2492-2501.
Copyright © 2024 Prof. D. Ahir, Sakshi Kapse, Sayali Mhaske, Tanuja Pansare, Param Kalane. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET62616
Publish Date : 2024-05-24
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here