As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many de...As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many deep learning-based facial forgery detection approaches show promise,they often fail to delve deeply into the complex relationships between image features and forgery indicators,limiting their effectiveness to specific forgery techniques.To address this challenge,we propose a dual-branch collaborative deepfake detection network.The network processes video frame images as input,where a specialized noise extraction module initially extracts the noise feature maps.Subsequently,the original facial images and corresponding noise maps are directed into two parallel feature extraction branches to concurrently learn texture and noise forgery clues.An attention mechanism is employed between the two branches to facilitate mutual guidance and enhancement of texture and noise features across four different scales.This dual-modal feature integration enhances sensitivity to forgery artifacts and boosts generalization ability across various forgery techniques.Features from both branches are then effectively combined and processed through a multi-layer perception layer to distinguish between real and forged video.Experimental results on benchmark deepfake detection datasets demonstrate that our approach outperforms existing state-of-the-art methods in terms of detection performance,accuracy,and generalization ability.展开更多
In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulat...In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulated images across various domains.One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images.This paper offers a comprehensive survey of existing methodologies for detecting image tampering,shedding light on the diverse approaches employed in the field of contemporary image forensics.The methods used to identify image forgery can be broadly classified into two primary categories:classical machine learning techniques,heavily reliant on manually crafted features,and deep learning methods.Additionally,this paper explores recent developments in image forensics,placing particular emphasis on the detection of counterfeit colorization.Image colorization involves predicting colors for grayscale images,thereby enhancing their visual appeal.The advancements in colorization techniques have reached a level where distinguishing between authentic and forged images with the naked eye has become an exceptionally challenging task.This paper serves as an in-depth exploration of the intricacies of image forensics in the modern age,with a specific focus on the detection of colorization forgery,presenting a comprehensive overview of methodologies in this critical field.展开更多
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ...In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC features. Then, these features are processed separately through the two branches of the Siamese network. Finally, the model is trained and optimized through fully connected layers and loss functions. The experimental results show that the testing accuracy of the model in this study on the LRW (Lip Reading in the Wild) dataset reaches 92.3%;the recall rate is 94.3%;the F1 score is 93.3%, significantly better than the results of CNN (Convolutional Neural Networks) and LSTM (Long Short-Term Memory) models. In the validation of multi-resolution image streams, the highest accuracy of dual-resolution image streams reaches 94%. Band-pass filters can effectively improve the signal-to-noise ratio of deep forgery video detection when processing different types of audio signals. The real-time processing performance of the model is also excellent, and it achieves an average score of up to 5 in user research. These data demonstrate that the method proposed in this study can effectively fuse visual and audio information in deep forgery video detection, accurately identify inconsistencies between video and audio, and thus verify the effectiveness of lip-audio modality fusion technology in improving detection performance.展开更多
The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,whic...The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,which involves copying a specific area from one image and pasting it into another.Attempts were made to mitigate the effects of image splicing,which continues to be a significant research challenge.This study proposes a new splicing detectionmodel,combining Sonine functions-derived convex-based features and deep features.Two stages make up the proposed method.The first step entails feature extraction,then classification using the“support vector machine”(SVM)to differentiate authentic and spliced images.The proposed Sonine functions-based feature extraction model reveals the spliced texture details by extracting some clues about the probability of image pixels.The proposed model achieved an accuracy of 98.93% when tested with the CASIA V2.0 dataset“Chinese Academy of Sciences,Institute of Automation”which is a publicly available dataset for forgery classification.The experimental results show that,for image splicing forgery detection,the proposed Sonine functions-derived convex-based features and deep features outperform state-of-the-art techniques in terms of accuracy,precision,and recall.Overall,the obtained detection accuracy attests to the benefit of using the Sonine functions alongside deep feature representations.Finding the regions or locations where image tampering has taken place is limited by the study.Future research will need to look into advanced image analysis techniques that can offer a higher degree of accuracy in identifying and localizing tampering regions.展开更多
In recent years,visual facial forgery has reached a level of sophistication that humans cannot identify fraud,which poses a significant threat to information security.A wide range of malicious applications have emerge...In recent years,visual facial forgery has reached a level of sophistication that humans cannot identify fraud,which poses a significant threat to information security.A wide range of malicious applications have emerged,such as deepfake,fake news,defamation or blackmailing of celebrities,impersonation of politicians in political warfare,and the spreading of rumours to attract views.As a result,a rich body of visual forensic techniques has been proposed in an attempt to stop this dangerous trend.However,there is no comprehensive,fair,and unified performance evaluation to enlighten the community on best performing methods.The authors present a systematic benchmark beyond traditional surveys that provides in-depth insights into facial forgery and facial forensics,grounding on robustness tests such as contrast,brightness,noise,resolution,missing information,and compression.The authors also provide a practical guideline of the benchmarking results,to determine the characteristics of the methods that serve as a comparative reference in this never-ending war between measures and countermeasures.The authors’source code is open to the public.展开更多
Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for...Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for authenticity and the integrity of the image drive the detection of a fabricated image.There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files,including re-sampling or copy-moving.This work presents a high-level view of the forensics of digital images and their possible detection approaches.This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.These methods have identified forgery and its type and compared it with state of the art.This work will help us to find the best forgery detection technique based on the different environments.It also shows the current issues in other methods,which can help researchers find future scope for further research in this field.展开更多
Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the mo...Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the most common types of image forgeries.Thus,an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper.These methods are classified into three types:block-based methods,keypoint-based methods,and deep learning-based methods.In addition,the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost.Finally,further research directions are discussed.展开更多
With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to de...With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to detect such problem and do the necessary actions.In this work,we propose an approach to detect the interframe video forgery utilizing the deep features obtained from the parallel deep neural network model and thorough analytical computations.The proposed approach only uses the deep features extracted from the CNN model and then applies the conventional mathematical approach to these features to find the forgery in the video.This work calculates the correlation coefficient from the deep features of the adjacent frames rather than calculating directly from the frames.We divide the procedure of forgery detection into two phases–video forgery detection and video forgery classification.In video forgery detection,this approach detect input video is original or tampered.If the video is not original,then the video is checked in the next phase,which is video forgery classification.In the video forgery classification,method review the forged video for insertion forgery,deletion forgery,and also again check for originality.The proposed work is generalized and it is tested on two different datasets.The experimental results of our proposed model show that our approach can detect the forgery with the accuracy of 91%on VIFFD dataset,90%in TDTV dataset and classify the type of forgery–insertion and deletion with the accuracy of 82%on VIFFD dataset,86%on TDTV dataset.This work can helps in the analysis of original and tempered video in various domain.展开更多
Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain f...Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain forgery cues with high transferability.Such cues positively impact the model’s accuracy and generalizability.Moreover,single-modality often causes overfitting of the model,and Red-Green-Blue(RGB)modal-only is not conducive to extracting the more detailed forgery traces.We propose a novel framework for fine-grain forgery cues mining with fusion modality to cope with these issues.First,we propose two functional modules to reveal and locate the deeper forged features.Our method locates deeper forgery cues through a dual-modality progressive fusion module and a noise adaptive enhancement module,which can excavate the association between dualmodal space and channels and enhance the learning of subtle noise features.A sensitive patch branch is introduced on this foundation to enhance the mining of subtle forgery traces under fusion modality.The experimental results demonstrate that our proposed framework can desirably explore the differences between authentic and forged images with supervised learning.Comprehensive evaluations of several mainstream datasets show that our method outperforms the state-of-the-art detection methods with remarkable detection ability and generalizability.展开更多
An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSA...An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSANNA)to modify the propagation process.Then,fractional quaternion Zernike moments(FrQZMs)are considered to be features extracted from color forged images.Finally,the extracted FrQZMs features are matched by the improved PatchMatch algorithm.The experimental results on two publicly available datasets(FAU and GRIP datasets)show that the proposed algorithm performs better than the state-of-the-art algorithms not only in objective criteria F-measure value but also in visual.Moreover,the proposed algorithm is robust to some attacks,such as additive white Gaussian noise,JPEG compression,rotation,and scaling.展开更多
Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identif...Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat.展开更多
Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm ...Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm is proposed. This method segments image into small nonoverlapping blocks. A calculation of smooth degree is given for each block. Test image is segmented into independent layers according to the smooth degree. SI algorithm is applied in finding the optimal detection parameters for each layer. These parameters are used to detect each layer by scale invariant features transform (SIFT)-based scheme, which can locate a mass of keypoints. The experimental results prove the good performance of the proposed method, which is effective to identify the CMF image with small or smooth cloned region.展开更多
Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approach...Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance.展开更多
This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data...This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks. Hence, there is an urgent need fordeveloping efficient image forgery detection algorithms. Two main types offorgery are considered in this paper: splicing and copy-move. Splicing isperformed by inserting a part of an image into another image. On the otherhand, copy-move forgery is performed by copying a part of the image intoanother position in the same image. The proposed approach for splicingdetection is based on the assumption that illumination between the originaland tampered images is different. To detect the difference between the originaland tampered images, the homomorphic transform separates the illuminationcomponent from the reflectance component. The illumination histogramderivative is used for detecting the difference in illumination, and henceforgery detection is accomplished. Prior to performing the forgery detectionprocess, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, andsingle image super-resolution, are introduced to reinforce the details andchanges between the original and embedded sections. The proposed approachfor copy-move forgery detection is performed with the Speeded Up RobustFeatures (SURF) algorithm, which extracts feature points and feature vectors. Searching for the copied partition is accomplished through matchingwith Euclidian distance and hierarchical clustering. In addition, some preprocessing methods are used with the SURF algorithm, such as histogramequalization and single-mage super-resolution. Simulation results proved thefeasibility and the robustness of the pre-processing step in homomorphicdetection and SURF detection algorithms for splicing and copy-move forgerydetection, respectively.展开更多
This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding...This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size.At each step,the SVD is determined.First,the diagonal matrix’s maximum value(norm)is selected(representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating thematrix or scaled).Then,the similar norms are grouped,and each leading group is separated into many subgroups(elements of each subgroup are neighbors)according to 8-adjacency(the subgroups for each leading group must be far from others by a specific distance).After that,a weight is assigned for each subgroup to classify the image as forgery or not.Finally,the F1 score of the proposed system is measured,reaching 99.1%.This approach is robust against rotation,scaling,noisy images,and illumination variation.It is compared with other similarmethods and presents very promised results.展开更多
Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilis...Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilistic model with periodic effects in double quantization is analyzed, and the probability of quantized DCT coefficients in each block is calculated over the entire iraage. Secondly, the posteriori probability of each block is computed according to Bayesian theory and the results mentioned in first part. Then the mean and variance of the posteriori probability are to be used for judging whether the target block is tampered. Finally, the mathematical morphology operations are performed to reduce the false alarm probability. Experimental results show that the method can exactly locate the doctored part, and through the experiment it is also found that for detecting the tampered regions, the higher the second compression quality is, the more exact the detection efficiency is.展开更多
Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000...Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000 lire note consisted of two Zeeman sextets, but in the "false" money there are two quadrupole doublets only.展开更多
Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing.Forgery of normal patients’medical data to present them as COVID-19 patients is an illegitimate action...Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing.Forgery of normal patients’medical data to present them as COVID-19 patients is an illegitimate action that has been carried out in different ways recently.Therefore,the integrity of these data can be questionable.Forgery detection is a method of detecting an anomaly in manipulated forged data.An appropriate number of features are needed to identify an anomaly as either forged or non-forged data in order to find distortion or tampering in the original data.Convolutional neural networks(CNNs)have contributed a major breakthrough in this type of detection.There has been much interest from both the clinicians and the AI community in the possibility of widespread usage of artificial neural networks for quick diagnosis using medical data for early COVID-19 patient screening.The purpose of this paper is to detect forgery in COVID-19 medical data by using CNN in the error level analysis(ELA)by verifying the noise pattern in the data.The proposed improved ELA method is evaluated using a type of data splicing forgery and sigmoid and ReLU phenomenon schemes.The proposed method is verified by manipulating COVID-19 data using different types of forgeries and then applying the proposed CNN model to the data to detect the data tampering.The results show that the accuracy of the proposed CNN model on the test COVID-19 data is approximately 92%.展开更多
With the advent of the 5G Internet of Things era,communication and social interaction in our daily life have changed a lot,and a large amount of social data is transmitted to the Internet.At the same time,with the rap...With the advent of the 5G Internet of Things era,communication and social interaction in our daily life have changed a lot,and a large amount of social data is transmitted to the Internet.At the same time,with the rapid development of deep forgery technology,a new generation of social data trust crisis has also followed.Therefore,how to ensure the trust and credibility of social data in the 5G Internet of Things era is an urgent problem to be solved.This paper proposes a new method for forgery detection based on GANs.We first discover the hidden gradient information in the grayscale image of the forged image and use this gradient information to guide the generation of forged traces.In the classifier,we replace the traditional binary loss with the focal loss that can focus on difficult-to-classify samples,which can achieve accurate classification when the real and fake samples are unbalanced.Experimental results show that the proposed method can achieve high accuracy on the DeeperForensics dataset and with the highest accuracy is 98%.展开更多
After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery att...After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery attacks to (F1), (F2) and Nyberg-Rueppel’s signatures are presented.展开更多
基金funded by the Ministry of Public Security Science and Technology Program Project(No.2023LL35)the Key Laboratory of Smart Policing and National Security Risk Governance,Sichuan Province(No.ZHZZZD2302).
文摘As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many deep learning-based facial forgery detection approaches show promise,they often fail to delve deeply into the complex relationships between image features and forgery indicators,limiting their effectiveness to specific forgery techniques.To address this challenge,we propose a dual-branch collaborative deepfake detection network.The network processes video frame images as input,where a specialized noise extraction module initially extracts the noise feature maps.Subsequently,the original facial images and corresponding noise maps are directed into two parallel feature extraction branches to concurrently learn texture and noise forgery clues.An attention mechanism is employed between the two branches to facilitate mutual guidance and enhancement of texture and noise features across four different scales.This dual-modal feature integration enhances sensitivity to forgery artifacts and boosts generalization ability across various forgery techniques.Features from both branches are then effectively combined and processed through a multi-layer perception layer to distinguish between real and forged video.Experimental results on benchmark deepfake detection datasets demonstrate that our approach outperforms existing state-of-the-art methods in terms of detection performance,accuracy,and generalization ability.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(2021R1I1A3049788).
文摘In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulated images across various domains.One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images.This paper offers a comprehensive survey of existing methodologies for detecting image tampering,shedding light on the diverse approaches employed in the field of contemporary image forensics.The methods used to identify image forgery can be broadly classified into two primary categories:classical machine learning techniques,heavily reliant on manually crafted features,and deep learning methods.Additionally,this paper explores recent developments in image forensics,placing particular emphasis on the detection of counterfeit colorization.Image colorization involves predicting colors for grayscale images,thereby enhancing their visual appeal.The advancements in colorization techniques have reached a level where distinguishing between authentic and forged images with the naked eye has become an exceptionally challenging task.This paper serves as an in-depth exploration of the intricacies of image forensics in the modern age,with a specific focus on the detection of colorization forgery,presenting a comprehensive overview of methodologies in this critical field.
文摘In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC features. Then, these features are processed separately through the two branches of the Siamese network. Finally, the model is trained and optimized through fully connected layers and loss functions. The experimental results show that the testing accuracy of the model in this study on the LRW (Lip Reading in the Wild) dataset reaches 92.3%;the recall rate is 94.3%;the F1 score is 93.3%, significantly better than the results of CNN (Convolutional Neural Networks) and LSTM (Long Short-Term Memory) models. In the validation of multi-resolution image streams, the highest accuracy of dual-resolution image streams reaches 94%. Band-pass filters can effectively improve the signal-to-noise ratio of deep forgery video detection when processing different types of audio signals. The real-time processing performance of the model is also excellent, and it achieves an average score of up to 5 in user research. These data demonstrate that the method proposed in this study can effectively fuse visual and audio information in deep forgery video detection, accurately identify inconsistencies between video and audio, and thus verify the effectiveness of lip-audio modality fusion technology in improving detection performance.
文摘The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,which involves copying a specific area from one image and pasting it into another.Attempts were made to mitigate the effects of image splicing,which continues to be a significant research challenge.This study proposes a new splicing detectionmodel,combining Sonine functions-derived convex-based features and deep features.Two stages make up the proposed method.The first step entails feature extraction,then classification using the“support vector machine”(SVM)to differentiate authentic and spliced images.The proposed Sonine functions-based feature extraction model reveals the spliced texture details by extracting some clues about the probability of image pixels.The proposed model achieved an accuracy of 98.93% when tested with the CASIA V2.0 dataset“Chinese Academy of Sciences,Institute of Automation”which is a publicly available dataset for forgery classification.The experimental results show that,for image splicing forgery detection,the proposed Sonine functions-derived convex-based features and deep features outperform state-of-the-art techniques in terms of accuracy,precision,and recall.Overall,the obtained detection accuracy attests to the benefit of using the Sonine functions alongside deep feature representations.Finding the regions or locations where image tampering has taken place is limited by the study.Future research will need to look into advanced image analysis techniques that can offer a higher degree of accuracy in identifying and localizing tampering regions.
基金QuỹĐổi mới sáng tạo Vingroup,Grant/Award Number:VINIF.2020.ThS.BK.10。
文摘In recent years,visual facial forgery has reached a level of sophistication that humans cannot identify fraud,which poses a significant threat to information security.A wide range of malicious applications have emerged,such as deepfake,fake news,defamation or blackmailing of celebrities,impersonation of politicians in political warfare,and the spreading of rumours to attract views.As a result,a rich body of visual forensic techniques has been proposed in an attempt to stop this dangerous trend.However,there is no comprehensive,fair,and unified performance evaluation to enlighten the community on best performing methods.The authors present a systematic benchmark beyond traditional surveys that provides in-depth insights into facial forgery and facial forensics,grounding on robustness tests such as contrast,brightness,noise,resolution,missing information,and compression.The authors also provide a practical guideline of the benchmarking results,to determine the characteristics of the methods that serve as a comparative reference in this never-ending war between measures and countermeasures.The authors’source code is open to the public.
文摘Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for authenticity and the integrity of the image drive the detection of a fabricated image.There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files,including re-sampling or copy-moving.This work presents a high-level view of the forensics of digital images and their possible detection approaches.This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.These methods have identified forgery and its type and compared it with state of the art.This work will help us to find the best forgery detection technique based on the different environments.It also shows the current issues in other methods,which can help researchers find future scope for further research in this field.
文摘Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the most common types of image forgeries.Thus,an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper.These methods are classified into three types:block-based methods,keypoint-based methods,and deep learning-based methods.In addition,the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost.Finally,further research directions are discussed.
文摘With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to detect such problem and do the necessary actions.In this work,we propose an approach to detect the interframe video forgery utilizing the deep features obtained from the parallel deep neural network model and thorough analytical computations.The proposed approach only uses the deep features extracted from the CNN model and then applies the conventional mathematical approach to these features to find the forgery in the video.This work calculates the correlation coefficient from the deep features of the adjacent frames rather than calculating directly from the frames.We divide the procedure of forgery detection into two phases–video forgery detection and video forgery classification.In video forgery detection,this approach detect input video is original or tampered.If the video is not original,then the video is checked in the next phase,which is video forgery classification.In the video forgery classification,method review the forged video for insertion forgery,deletion forgery,and also again check for originality.The proposed work is generalized and it is tested on two different datasets.The experimental results of our proposed model show that our approach can detect the forgery with the accuracy of 91%on VIFFD dataset,90%in TDTV dataset and classify the type of forgery–insertion and deletion with the accuracy of 82%on VIFFD dataset,86%on TDTV dataset.This work can helps in the analysis of original and tempered video in various domain.
基金This study is supported by the Fundamental Research Funds for the Central Universities of PPSUC under Grant 2022JKF02009.
文摘Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain forgery cues with high transferability.Such cues positively impact the model’s accuracy and generalizability.Moreover,single-modality often causes overfitting of the model,and Red-Green-Blue(RGB)modal-only is not conducive to extracting the more detailed forgery traces.We propose a novel framework for fine-grain forgery cues mining with fusion modality to cope with these issues.First,we propose two functional modules to reveal and locate the deeper forged features.Our method locates deeper forgery cues through a dual-modality progressive fusion module and a noise adaptive enhancement module,which can excavate the association between dualmodal space and channels and enhance the learning of subtle noise features.A sensitive patch branch is introduced on this foundation to enhance the mining of subtle forgery traces under fusion modality.The experimental results demonstrate that our proposed framework can desirably explore the differences between authentic and forged images with supervised learning.Comprehensive evaluations of several mainstream datasets show that our method outperforms the state-of-the-art detection methods with remarkable detection ability and generalizability.
基金The National Natural Science of China(No.61572258,61771231,61772281,61672294)the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe Qing Lan Project of Jiangsu Higher Education Institutions
文摘An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSANNA)to modify the propagation process.Then,fractional quaternion Zernike moments(FrQZMs)are considered to be features extracted from color forged images.Finally,the extracted FrQZMs features are matched by the improved PatchMatch algorithm.The experimental results on two publicly available datasets(FAU and GRIP datasets)show that the proposed algorithm performs better than the state-of-the-art algorithms not only in objective criteria F-measure value but also in visual.Moreover,the proposed algorithm is robust to some attacks,such as additive white Gaussian noise,JPEG compression,rotation,and scaling.
基金Supported by the Natural Science Foundation of Tianjin(No.15JCYBJC15500)
文摘Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat.
基金Supported by the National Natural Science Foundation of China(61472429,61070192,91018008,61303074,61170240)the National High Technology Research Development Program of China(863 Program)(2007AA01Z414)+1 种基金the National Science and Technology Major Project of China(2012ZX01039-004)the Beijing Natural Science Foundation(4122041)
文摘Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm is proposed. This method segments image into small nonoverlapping blocks. A calculation of smooth degree is given for each block. Test image is segmented into independent layers according to the smooth degree. SI algorithm is applied in finding the optimal detection parameters for each layer. These parameters are used to detect each layer by scale invariant features transform (SIFT)-based scheme, which can locate a mass of keypoints. The experimental results prove the good performance of the proposed method, which is effective to identify the CMF image with small or smooth cloned region.
基金supported in part by the National Natural Science Foundation of China under grant No.(61472429,61070192,91018008,61303074,61170240)Beijing Natural Science Foundation under grant No.4122041+1 种基金National High-Tech Research Development Program of China under grant No.2007AA01Z414National Science and Technology Major Project of China under grant No.2012ZX01039-004
文摘Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance.
文摘This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks. Hence, there is an urgent need fordeveloping efficient image forgery detection algorithms. Two main types offorgery are considered in this paper: splicing and copy-move. Splicing isperformed by inserting a part of an image into another image. On the otherhand, copy-move forgery is performed by copying a part of the image intoanother position in the same image. The proposed approach for splicingdetection is based on the assumption that illumination between the originaland tampered images is different. To detect the difference between the originaland tampered images, the homomorphic transform separates the illuminationcomponent from the reflectance component. The illumination histogramderivative is used for detecting the difference in illumination, and henceforgery detection is accomplished. Prior to performing the forgery detectionprocess, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, andsingle image super-resolution, are introduced to reinforce the details andchanges between the original and embedded sections. The proposed approachfor copy-move forgery detection is performed with the Speeded Up RobustFeatures (SURF) algorithm, which extracts feature points and feature vectors. Searching for the copied partition is accomplished through matchingwith Euclidian distance and hierarchical clustering. In addition, some preprocessing methods are used with the SURF algorithm, such as histogramequalization and single-mage super-resolution. Simulation results proved thefeasibility and the robustness of the pre-processing step in homomorphicdetection and SURF detection algorithms for splicing and copy-move forgerydetection, respectively.
文摘This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size.At each step,the SVD is determined.First,the diagonal matrix’s maximum value(norm)is selected(representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating thematrix or scaled).Then,the similar norms are grouped,and each leading group is separated into many subgroups(elements of each subgroup are neighbors)according to 8-adjacency(the subgroups for each leading group must be far from others by a specific distance).After that,a weight is assigned for each subgroup to classify the image as forgery or not.Finally,the F1 score of the proposed system is measured,reaching 99.1%.This approach is robust against rotation,scaling,noisy images,and illumination variation.It is compared with other similarmethods and presents very promised results.
基金supported by the National Natural Science Foundation of China(60574082)the Postdoctoral Science Foundation of China(20070421017)+2 种基金the Natural Science Foundation of Jiangsu Province(BK 2008403)the Graduate Research and Innovation Project of Jiangsu Province(CX09B-100Z)the Excellent Doctoral Dissertation Innovation Foundation of Nanjing University of Science and Technology.
文摘Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilistic model with periodic effects in double quantization is analyzed, and the probability of quantized DCT coefficients in each block is calculated over the entire iraage. Secondly, the posteriori probability of each block is computed according to Bayesian theory and the results mentioned in first part. Then the mean and variance of the posteriori probability are to be used for judging whether the target block is tampered. Finally, the mathematical morphology operations are performed to reduce the false alarm probability. Experimental results show that the method can exactly locate the doctored part, and through the experiment it is also found that for detecting the tampered regions, the higher the second compression quality is, the more exact the detection efficiency is.
文摘Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000 lire note consisted of two Zeeman sextets, but in the "false" money there are two quadrupole doublets only.
基金The work was partially supported by Computer Research Institute of Montreal,Quebec,Canada,we acknowledge the support of Ministère de l’Économie et de l’Innovation,Quebec,Canada.This work was also partially supported by Taif University Researchers Supporting Project Number(TURSP-2020/215),Taif University,Taif,Saudi Arabia.
文摘Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing.Forgery of normal patients’medical data to present them as COVID-19 patients is an illegitimate action that has been carried out in different ways recently.Therefore,the integrity of these data can be questionable.Forgery detection is a method of detecting an anomaly in manipulated forged data.An appropriate number of features are needed to identify an anomaly as either forged or non-forged data in order to find distortion or tampering in the original data.Convolutional neural networks(CNNs)have contributed a major breakthrough in this type of detection.There has been much interest from both the clinicians and the AI community in the possibility of widespread usage of artificial neural networks for quick diagnosis using medical data for early COVID-19 patient screening.The purpose of this paper is to detect forgery in COVID-19 medical data by using CNN in the error level analysis(ELA)by verifying the noise pattern in the data.The proposed improved ELA method is evaluated using a type of data splicing forgery and sigmoid and ReLU phenomenon schemes.The proposed method is verified by manipulating COVID-19 data using different types of forgeries and then applying the proposed CNN model to the data to detect the data tampering.The results show that the accuracy of the proposed CNN model on the test COVID-19 data is approximately 92%.
基金results of the research project funded by National Natural Science Foundation of China(No.61871283)the Foundation of Pre-Research on Equipment of China(No.61400010304)Major Civil-Military Integration Project in Tianjin,China(No.18ZXJMTG00170).
文摘With the advent of the 5G Internet of Things era,communication and social interaction in our daily life have changed a lot,and a large amount of social data is transmitted to the Internet.At the same time,with the rapid development of deep forgery technology,a new generation of social data trust crisis has also followed.Therefore,how to ensure the trust and credibility of social data in the 5G Internet of Things era is an urgent problem to be solved.This paper proposes a new method for forgery detection based on GANs.We first discover the hidden gradient information in the grayscale image of the forged image and use this gradient information to guide the generation of forged traces.In the classifier,we replace the traditional binary loss with the focal loss that can focus on difficult-to-classify samples,which can achieve accurate classification when the real and fake samples are unbalanced.Experimental results show that the proposed method can achieve high accuracy on the DeeperForensics dataset and with the highest accuracy is 98%.
基金Supported by the National Natural Science Foundation of China(No.69772035,69882002,69896243)
文摘After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery attacks to (F1), (F2) and Nyberg-Rueppel’s signatures are presented.