Skip to main content
Log in

Fake region identification in an image using deep learning segmentation model

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A forged image is a major source of counterfeit news and is mostly used in a spiteful manner such as exciting targeted mob, identity theft, defaming individual, or misleading law bodies. Therefore, a technique is required to detect the tampered regions in a forged image. Deep learning is surpassing technology for prediction or classification tasks in images. Challenges in this technology are a variety of datasets to train the model and specific architecture for a specific application. In this paper, a deep learning model is extended for the localization of tampered regions in a forged image. This is an extension of the well-known U-Net segmentation model. In the proposed model, batch normalization layers and identity-blocks are placed at suitable places of the U-Net model to overcome the challenges such as overfitting and loss of information during max-pooling. To overcome the challenge of the dataset five different publicly available datasets are taken to train, validate and test the model. The trained model is also tested on four created forged images (not belong to the dataset) whose acquisition sources may different i.e. medical image, identity document, natural image, and scanned report. The result of the proposed model is compared with state-of-the-art techniques which show that the method works better than others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Agarwal S, Chand S (2015) Image forgery detection using multi scale entropy filter and local phase quantization. Int J Image Graph Signal Process 7 (10):78

    Article  Google Scholar 

  2. Badrinarayanan V, Kendall A, Cipolla R (2017) Segnet: a deep convolutional encoder-decoder architecture for image segmentation. IEEE Trans Pattern Anal Mach Intell 39(12):2481–2495

    Article  Google Scholar 

  3. Bappy JH, Simons C, Nataraj L, Manjunath B, Roy-Chowdhury AK (2019) Hybrid lstm and encoder–decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300

    Article  MathSciNet  MATH  Google Scholar 

  4. Bianchi T, De Rosa A, Piva A (2011) Improved dct coefficient analysis for forgery localization in jpeg images. In: 2011 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2444–2447

  5. Chen B, Tan W, Coatrieux G, Zheng Y, Shi YQ (2020) A serial image copy-move forgery localization scheme with source/target distinguishment. IEEE transactions on multimedia

  6. Chierchia G, Poggi G, Sansone C, Verdoliva L (2014) A bayesian-mrf approach for prnu-based image forgery detection. IEEE Trans Inf Forensics Secur 9(4):554–567

    Article  Google Scholar 

  7. Cozzolino D, Verdoliva L (2019) Noiseprint: a cnn-based camera model fingerprint. IEEE Trans Inf Forensics Secur 15:144–159

    Article  Google Scholar 

  8. De Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inf Forensics Secur 8(7):1182–1194

    Article  Google Scholar 

  9. Dong J, Wang WC (2018) v1. 0 and casia v2. 0 image splicing dataset. Natl Lab Pattern Recognit., Inst Autom Chinese Acad Sci Corel Image Database. http://forensics.idealtest.org. Accessed 05 May 2018

  10. Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566–1577

    Article  Google Scholar 

  11. He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on markov features in dct and dwt domain. Pattern Recognit 45 (12):4292–4299

    Article  Google Scholar 

  12. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778

  13. Hosny KM, Hamza HM, Lashin NA (2018) Copy-move forgery detection of duplicated objects using accurate pcet moments and morphological operators. Imaging Sci J 66(6):330–345

    Article  Google Scholar 

  14. Hosny KM, Hamza HM, Lashin NA (2019) Copy-for-duplication forgery detection in colour images using qpcetms and sub-image approach. IET Image Process 13(9):1437–1446

    Article  Google Scholar 

  15. Hosny KM, Mortda AM, Fouda MM, Lashin NA (2022) An efficient cnn model to detect copy-move image forgery. IEEE Access 10:48622–48632

    Article  Google Scholar 

  16. IFS T (2019) IEEE IFS-TC image forensics challenge database. https://signalprocessingsociety.org/newsletter/2014/01/ieee-ifs-tc-image-forensics-challenge-website-new-submissions. Accessed 12 Mar 2019

  17. Iakovidou C, Zampoglou M, Papadopoulos S, Kompatsiaris Y (2018) Content-aware detection of jpeg grid inconsistencies for intuitive image forensics. J Vis Commun Image Represent 54:155–170

    Article  Google Scholar 

  18. Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning. PMLR, pp 448–456

  19. Iuliani M, Fabbri G, Piva A (2015) Image splicing detection based on general perspective constraints. In: 2015 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 1–6

  20. Jaiswal AK, Srivastava R (2020) Time-efficient spliced image analysis using higher-order statistics. Mach Vis Appl 31(7):1–20

    Google Scholar 

  21. Jaiswal AK, Srivastava R (2021) Detection of copy-move forgery in digital image using multi-scale, multi-stage deep learning model. Neural Process Lett:1–26

  22. Jaiswal AK, Srivastava R (2021) Forensic image analysis using inconsistent noise pattern. Pattern Anal Applic 24(2):655–667

    Article  Google Scholar 

  23. Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on multimedia and security, pp 1–10

  24. Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450–461

    Article  Google Scholar 

  25. Kadam KD, Ahirrao S, Kotecha K, et al. (2022) Efficient approach towards detection and identification of copy move and image splicing forgeries using mask r-cnn with mobilenet v1. Comput Intell Neurosci 2022

  26. Korus P, Huang J (2016) Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans Image Process 25(3):1312–1326

    Article  MathSciNet  MATH  Google Scholar 

  27. Li W, Yuan Y, Yu N (2009) Passive detection of doctored jpeg image via block artifact grid extraction. Signal Process 89(9):1821–1829

    Article  MATH  Google Scholar 

  28. Li J, Li X, Yang B, Sun X (2014) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518

    Google Scholar 

  29. Li D, Dharmawan DA, Ng BP, Rahardja S (2019) Residual u-net for retinal vessel segmentation. In: 2019 IEEE International conference on image processing (ICIP). IEEE, pp 1425–1429

  30. Li Q, Wang C, Zhou X, Qin Z (2022) Image copy-move forgery detection and localization based on super-bpd segmentation and dcnn. Sci Reports 12(1):14987

    Google Scholar 

  31. Liu Q, Cao X, Deng C, Guo X (2011) Identifying image composites through shadow matte consistency. IEEE Trans Inf Forensics Secur 6(3):1111–1122

    Article  Google Scholar 

  32. Lyu S, Pan X, Zhang X (2014) Exposing region splicing forgeries with blind local noise estimation. Int J Comput Vision 110(2):202–221

    Article  Google Scholar 

  33. Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503

    Article  Google Scholar 

  34. Mezzofiore G (2023) No, Theresa May and her cabinet didn’t pose in front of ‘The Scream’ (2017). https://mashable.com/2017/07/31/theresa-may-cabinet-the-scream-munch/. Accessed 20 Aug 2021

  35. Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985–995

    Article  Google Scholar 

  36. NG A (2020) Slides of deeplearning.ai. https://www.coursera.org/specializations/deep-learning. Accessed 12 Jan 2020

  37. Pan X, Zhang X, Lyu S (2012) Exposing image splicing with inconsistent local noise variances. In: 2012 IEEE International conference on computational photography (ICCP). IEEE, pp 1–10

  38. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 1–6

  39. Reichman B, Jing L, Akin O, Tian Y (2021) Medical image tampering detection: a new dataset and baseline. In: International conference on pattern recognition,. Springer, pp 266–277

  40. Riess C, Unberath M, Naderi F, Pfaller S, Stamminger M, Angelopoulou E (2017) Handling multiple materials for exposure of digital forgeries using 2-d lighting environments. Multimed Tools Appl 76(4):4747–4764

    Article  Google Scholar 

  41. Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted intervention. Springer, pp 234–241

  42. Singh A, Singh G, Singh K (2018) A markov based image forgery detection approach by analyzing cfa artifacts. Multimed Tools Appl 77 (21):28949–28968

    Article  Google Scholar 

  43. Swaminathan A, Wu M, Liu KR (2007) Nonintrusive component forensics of visual sensors using output images. IEEE Trans Inf Forensics Secur 2 (1):91–106

    Article  Google Scholar 

  44. Tralic D, Zupancic I, Grgic S, Grgic M (2013) Comofod—new database for copy-move forgery detection. In: Proceedings ELMAR-2013. IEEE, pp 49–54

  45. Tutorials U Convolutional neural network. http://deeplearning.stanford.edu/tutorial/supervised/ConvolutionalNeuralNetwork/. Accessed 19 Feb 2020

  46. Yao H, Wang S, Zhao Y, Zhang X (2011) Detecting image forgery using perspective constraints. IEEE Signal Process Lett 19(3):123–126

    Article  Google Scholar 

  47. Zeng H, Zhan Y, Kang X, Lin X (2017) Image splicing localization using pca-based noise level estimation. Multimed Tools Appl 76(4):4783–4799

    Article  Google Scholar 

  48. Zhang W, Cao X, Qu Y, Hou Y, Zhao H, Zhang C (2010) Detecting and extracting the photo composites using planar homography and graph cut. IEEE Trans Inf Forensics Secur 5(3):544–555

    Article  Google Scholar 

  49. Zhu N, Li Z (2018) Blind image splicing detection via noise level function. Signal Process Image Commun 68:181–192

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ankit Kumar Jaiswal.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jaiswal, A.K., Srivastava, R. Fake region identification in an image using deep learning segmentation model. Multimed Tools Appl 82, 38901–38921 (2023). https://doi.org/10.1007/s11042-023-15032-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15032-6

Keywords

Navigation