Skip to main content
Log in

Localization and Detection of Copy-Move Forgeries in Post-processed Images Using U-Net

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Identification and localization of forgeries in images is of great importance in the field of image processing. Many methods have been introduced to solve this problem. Most provide acceptable results on high resolution images but perform poorly when the resolution is low. Images can be post-processed using techniques such as JPEG compression, brightness change, and the addition of noise to improve the visual quality or create copies for various purposes. Therefore, a new deep learning method is introduced to detect forgeries in images even after post-processing. The proposed model is based on an encoder–decoder architecture designed to learn discriminative features across the boundaries of forged regions. A computer-generated dataset is used for training and evaluation is done using the well-known CoMoFoD dataset. The performance is evaluated using six post-processing techniques, namely brightness change, contrast adjustment, color reduction, image blurring, JPEG compression, and noise addition. To train a robust model for these techniques, data augmentation is employed. The results obtained show that the proposed model outperforms seven recent methods in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Ahmed B, Gulliver TA, alZahir S. Blind copy-move forgery detection using SVD and KS test. SN Appl Sci. 2020;2(1377).

  2. Nguyen H, Katzenbeisser S. Detection of copy-move forgery in digital images using radon transformation and phase correlation. In: Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus, Greece, 2012, pp. 18–20.

  3. Hegazi A, Taha A, Selim M. An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal. J King Saud Univ-Comput Inf Sci. 2019. https://doi.org/10.1016/j.jksuci.2019.07.007.

    Article  Google Scholar 

  4. Lin T, et al. Microsoft COCO: common objects in context. In: Proceedings of the European Conference on Computer Vision, Zurich, Switzerland, 2014, pp. 6–12.

  5. Braxmeier J. Stunning free images and royalty free stock. 2018. https://pixabay.com. Accessed 29 Jan 2020.

  6. Tralic D, Zupancic I, Grgic S, Grgic M. CoMoFoD: new database for copy-move forgery detection. In: Proceedings of the International Symposium on Electronics in Marine, Zadar, Croatia, 2013, pp. 25–7.

  7. Hugo L, et al. Exploring strategies for training deep neural networks. J Mach Learn Res. 2009;10:1–40.

    MATH  Google Scholar 

  8. Krizhevsky A, Sutskever I, Hinton GE. Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst. 2012;25:109–1105.

    Google Scholar 

  9. He K, et al. Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 2016, pp. 27–30.

  10. Swietojanski P, Ghoshal A, Renals S. Convolutional neural networks for distant speech recognition. IEEE Signal Process Lett. 2014;21(9):1120–4.

    Article  Google Scholar 

  11. Rao Y, Ni J. A deep learning approach to detection of splicing and copy-move forgeries in images. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, Abu Dhabi, UAE, 2016, pp. 4–7.

  12. Ahmed B, Gulliver TA, alZahir S. Image splicing detection using mask-RCNN. Signal Image Video Process. 2020;14(5):1035–42.

    Article  Google Scholar 

  13. Bi X, Wei Y, Xiao B, Li W. RRU-Net: The ringed residual U-Net for image splicing forgery detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, CA, USA, 2019, pp. 16–17.

  14. Zhang R, Ni J. A dense U-Net with cross-layer intersection for detection and localization of image forgery. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Barcelona, Spain, 2020, pp. 4–8.

  15. Wu Y, Abd-Almageed W, Natarajan P. BusterNet: Detecting copy-move image forgery with source/target localization. In: Proceedings of the European Conference on Computer Vision. Munich, Germany, 2018, pp. 8–14.

  16. Abdalla Y, Iqbal MT, Shehata M. Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network. Information. 2019;10(9):286–312.

    Article  Google Scholar 

  17. Ouyang J, Liu Y, Liao M. Copy-move forgery detection based on deep learning. In: Proceedings of the IEEE International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, Shanghai, China, pp. 14–16.

  18. Nixon M, Aguado A. Feature extraction and image processing for computer vision. 3rd ed. New York: Academic Press; 2012.

    Google Scholar 

  19. Mannor S, Peleg D, Rubinstein R. The cross entropy method for classification. In: Proceedings of the International Conference on Machine Learning, Bonn, Germany, 2005, pp. 7–11.

  20. Qian N. On the momentum term in gradient descent learning algorithm. Neural Netw. 1999;12(1):145–51.

    Article  Google Scholar 

  21. Keras-team. Keras. 2015. https://github.com/keras-team/keras. Accessed 09 Jun 2019.

  22. Deng J. et al. Imagenet: A large-scale hierarchical image database. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 2009, pp. 20–5.

  23. Glorot X, Bengio Y. Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, 2010, pp. 13–5.

  24. He K. et al. Delving deep into rectifiers: Surpassing human-level performance on ImageNet classification. In: Proceedings of the IEEE International Conference on Computer Vision, Santiago, Chile, 2015, pp. 13–6.

  25. Casella G, Berger RL. Statistical inference. 2nd ed. Pacific Grove: Duxbury Press; 2002.

    MATH  Google Scholar 

  26. Sakamoto H. On the distributions of the product and the quotient of the independent and uniformly distributed random variables. Tohoku Math J First Stage. 1943;49:243–60.

    MathSciNet  MATH  Google Scholar 

  27. Cozzolino D, Gragnaniello D, Verdoliva L. Image forgery detection based on the fusion of machine learning and block-matching methods; 2013. arXiv preprint arXiv:1311.6934

  28. Ryu S, Lee M, Lee H. Detection of copy-rotate-move forgery using Zernike moments. Information hiding. Springer-Verlag lecture notes in computer science. 6387th ed. Berlin: Springer; 2010. p. 51–65.

    Google Scholar 

  29. Wu Y, Abd-Almageed W, Natarajan P. Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. In: Proceedings of the ACM International Conference on Multimedia, Mountain View, CA, USA, 2017, pp. 23–7.

  30. Kumar A, Bhavsar A, Verma R. Syn2Real: Forgery classification via unsupervised domain adaptation. In: Proceedings of the IEEE Winter Conference on Applications of Computer Vision Workshops, Snowmass Village, CO, USA, 2020, pp. 1–5.

  31. Manu V, Mehtre B. Detection of copy-move forgery in images using segmentation and SURF. In: Proceedings of International Symposium on Signal Processing and Intelligent Recognition Systems, Trivandrum, India, 2014, pp. 16–9.

Download references

Acknowledgements

The authors would like to thank Radwa Hammad for her comments and advice that greatly improved the manuscript. They would also like to thank the anonymous reviewers for their insightful suggestions and comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Belal Ahmed.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, B., Aaron Gulliver, T. & alZahir, S. Localization and Detection of Copy-Move Forgeries in Post-processed Images Using U-Net. SN COMPUT. SCI. 2, 476 (2021). https://doi.org/10.1007/s42979-021-00893-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-021-00893-1

Keywords

Navigation