Skip to main content

Detecting Digital Photo Tampering with Deep Learning

  • Conference paper
  • First Online:
  • 1615 Accesses

Abstract

The tools to tamper with digital photographs have become easier to use by the lay person and techniques have evolved that make detection of tampering more difficult, there is a clear need to not only discover novel ways to distinguish the difference between real and fake, but also to make the detection quicker and easier. Using content-aware resizing, which is also known as image retargeting, seam carving, content-aware rescaling, liquid rescaling, or liquid resizing, allows for changing the resolution of an image while keeping the content unchanged in the image. In this paper, the retraining of Inception ResNet v2, one of the best object detection deep learning classifiers, is undertaken to look at classifications of untampered versus tampered photos via seam removal.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hsu, C.-M., Lee, J.-C., Chen, W.-K.: An efficient detection algorithm for copy-move forgery. Presented at the May (2015)

    Google Scholar 

  2. Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double JPEG compression detection. In: 2008 19th International Conference on Pattern Recognition. ICPR 2008, pp. 1–4. IEEE (2008)

    Google Scholar 

  3. Chen, Y.-L., Hsu, C.-T.: Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6, 396–406 (2011). https://doi.org/10.1109/TIFS.2011.2106121

    Article  Google Scholar 

  4. Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. Presented at the November (2009)

    Google Scholar 

  5. Farid, H.: Image forgery detection. IEEE Signal Process. Mag. 26, 16–25 (2009). https://doi.org/10.1109/MSP.2008.931079

    Article  Google Scholar 

  6. Liu, Q.: An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics. Pattern Recogn. 65, 35–46 (2017)

    Article  Google Scholar 

  7. Liu, Q.: An improved approach to detecting JPEG seam carving under recompression. IEEE Trans. Circuits Syst. Video Technol. (in Press)

    Google Scholar 

  8. Avidan, S., Shamir, A.: Seam carving for content-aware image resizing. ACM Trans. Graph. 26, 10 (2007). https://doi.org/10.1145/1239451.1239461

    Article  Google Scholar 

  9. Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.: Inception-v4, inception-ResNet and the impact of residual connections on learning. arXiv:160207261 Cs. (2016)

  10. Szegedy, C., et al.: Going deeper with convolutions. Presented at the June (2015)

    Google Scholar 

  11. Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167 (2015)

  12. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. Presented at the June (2016)

    Google Scholar 

  13. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. Presented at the June (2016)

    Google Scholar 

  14. Alemi, A.: Improving inception and image classification in TensorFlow, https://research.googleblog.com/2016/08/improving-inception-and-image.html

  15. Bunk, J., et al.: Detection and localization of image forgeries using resampling features and deep learning. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1881–1889. IEEE (2017)

    Google Scholar 

  16. Chen, B.-C., Ghosh, P., Morariu, V.I., Davis, L.S.: Detection of metadata tampering through discrepancy between image content and metadata using multi-task deep learning. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1872–1880. IEEE (2017)

    Google Scholar 

  17. Shan, J., Li, L.: A deep learning method for microaneurysm detection in fundus images. Presented at the June (2016)

    Google Scholar 

  18. Kalpana, K., Amritha, P.P.: Image manipulation detection using deep learning in TensorFlow. Int. J. Control Theory Appl. 9(40), 221–225 (2016)

    Google Scholar 

  19. Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. arXiv 1409 (2014)

    Google Scholar 

Download references

Acknowledgments

We highly appreciate the support for this study from the National Science Foundation under Award #1318688 and from the SHSU Office of Research and Sponsored Programs under an Enhanced Research Grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingzhong Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singleton, M.B., Liu, Q. (2018). Detecting Digital Photo Tampering with Deep Learning. In: Meng, L., Zhang, Y. (eds) Machine Learning and Intelligent Communications. MLICOM 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 251. Springer, Cham. https://doi.org/10.1007/978-3-030-00557-3_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00557-3_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00556-6

  • Online ISBN: 978-3-030-00557-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics