IMAGE FORGERY DETECTION USING CONVOLUTIONAL NEURAL NETWORK ALGORITHM
DOI:
https://doi.org/10.29121/shodhkosh.v5.i5.2024.2712Keywords:
Deep Learning, Forgery Detection, Image Features, Multimedia, Forensic AnalysisAbstract [English]
The validity of photos is being called into doubt because to the availability of strong image modification tools. This is particularly problematic where images hold significant influence, such as in legal proceedings, news articles, or insurance claims. The rapid advances in science and technology have made it easier than ever to access a wealth of knowledge through a range of multimedia platforms. However, because it is so easy to alter the contents using a variety of editing programs, the authenticity and integrity of multimedia content are in jeopardy. Forensics technology is being developed to address this issue. We focus on blind image forensics tools for copy-move forgeries in this survey. Copy-move forgeries are among the most used methods for manipulating images. They usually entail adding objects to the same image or covering them with flat regions. Image forensic techniques use a variety of complex procedures that have been documented in the literature to ascertain the integrity of a photograph. To conceal particular objects or provide the appearance of a duplicate, a section of an image is copied, then pasted back onto the original. One study concentrates on a specific type of image faking. Next, build the architecture for a convolutional neural network to determine whether or not the image is fake.
References
Park, Jun Young, et al. "Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram." Symmetry 12.4 (2020): 492. DOI: https://doi.org/10.3390/sym12040492
Bayar, Belhassen, and Matthew C. Stamm. "Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection." IEEE Transactions on Information Forensics and Security 13.11 (2018): 2691-2706. DOI: https://doi.org/10.1109/TIFS.2018.2825953
Barni, Mauro, Quoc-Tin Phan, and Benedetta Tondi. "Copy move source-target disambiguation through multi-branch CNNs." IEEE Transactions on Information Forensics and Security 16 (2020): 1825-1840. DOI: https://doi.org/10.1109/TIFS.2020.3045903
Wu, Yue, Wael Abd-Almageed, and Prem Natarajan. "Busternet: Detecting copy-move image forgery with source/target localization." Proceedings of the European conference on computer vision (ECCV). 2018.
Wu, Yue, Wael Abd-Almageed, and Prem Natarajan. "Busternet: Detecting copy-move image forgery with source/target localization." Proceedings of the European conference on computer vision (ECCV). 2018. DOI: https://doi.org/10.1007/978-3-030-01231-1_11
Hegazi, A. Taha, and M. M. Selim, “Copy-Move Forgery Detection Based on Automatic Threshold Estimation,” International Journal of Socio-technology and Knowledge Development, vol. 12, no. 1, pp. 1–23, 2020. DOI: https://doi.org/10.4018/IJSKD.2020010101
Y. Wang, X. Kang, and Y. Chen, “Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures,” Journal of Information Security and Applications, vol. 54, pp. 1–11, 2020. DOI: https://doi.org/10.1016/j.jisa.2020.102536
P. Niyishaka and C. Bhagvati, “Copy-move forgery detection using image blobs and BRISK feature,” Multimedia Tools and Applications, 2020. DOI: https://doi.org/10.1007/s11042-020-09225-6
C. Lin, W. Lu, W. Sun, J. Zeng, T. X. J. Lai, and W. Lu, “Region duplication detection based on image segmentation and key point contexts,” Multimedia Tools and Applications, vol. 77, pp. 14241–14258, 2018. DOI: https://doi.org/10.1007/s11042-017-5027-9
C. Lin, W. Lu, X. Huang, K. Liu, W. Sun, and H. Lin, “Region duplication detection based on hybrid feature and evaluative clustering,” Multimedia Tools and Applications, vol. 78, pp. 20739–20763, 2019. DOI: https://doi.org/10.1007/s11042-019-7342-9
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Dr.Gowsic K, Vinayaka Moorthi M, Siranjeevi S, Viswa G

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.