Author
Listed:
- Ancilon Leuch Alencar
(Master Program in Applied Computer Science (MCA), Escola Politécnica, University of Vale do Itajaí (UNIVALI), Campus Itajaí, Itajaí 88302-901, Santa Catarina, Brazil)
- Marcelo Dornbusch Lopes
(Master Program in Applied Computer Science (MCA), Escola Politécnica, University of Vale do Itajaí (UNIVALI), Campus Itajaí, Itajaí 88302-901, Santa Catarina, Brazil)
- Anita Maria da Rocha Fernandes
(Master Program in Applied Computer Science (MCA), Escola Politécnica, University of Vale do Itajaí (UNIVALI), Campus Itajaí, Itajaí 88302-901, Santa Catarina, Brazil)
- Julio Cesar Santos dos Anjos
(Graduate Program in Teleinformatics Engineering (PPGETI/UFC), Federal University of Ceará, Campus of Itapaje, Fortaleza 60455-970, Ceará, Brazil)
- Juan Francisco De Paz Santana
(Expert Systems and Applications Laboartory, Escuela Técnica Superior de Ingeniería Industrial de Béjar, University of Salamanca, 37700 Salamanca, Spain)
- Valderi Reis Quietinho Leithardt
(Lisbon School of Engineering (ISEL), Polytechnic University of Lisbon (IPL), 1549-020 Lisbon, Portugal
FIT-ISEL, 1959-007 Lisboa, Portugal
Center of Technology and Systems (UNINOVA-CTS) and Associated Lab of Intelligent Systems (LASI), 2829-516 Caparica, Portugal)
Abstract
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existing literature delineates two primary approaches to image manipulation detection: active and passive. Active techniques intervene preemptively, embedding structures into images to facilitate subsequent authenticity verification, whereas passive methods analyze image content for traces of manipulation. This study presents a novel solution to image manipulation detection by leveraging a multi-stream neural network architecture. Our approach harnesses three convolutional neural networks (CNNs) operating on distinct data streams extracted from the original image. We have developed a solution based on two passive detection methodologies. The system utilizes two separate streams to extract specific data subsets, while a third stream processes the unaltered image. Each net independently processes its respective data stream, capturing diverse facets of the image. The outputs from these nets are then fused through concatenation to ascertain whether the image has undergone manipulation, yielding a comprehensive detection framework surpassing the efficacy of its constituent methods. Our work introduces a unique dataset derived from the fusion of four publicly available datasets, featuring organically manipulated images that closely resemble real-world scenarios. This dataset offers a more authentic representation than other state-of-the-art methods that use algorithmically generated datasets based on image patches. By encompassing genuine manipulation scenarios, our dataset enhances the model’s ability to generalize across varied manipulation techniques, thereby improving its performance in real-world settings. After training, the merged approach obtained an accuracy of 89.59% in the set of validation images, significantly higher than the model trained with only unaltered images, which obtained 78.64%, and the two other models trained using images with a feature selection method applied to enhance inconsistencies that obtained 68.02% for Error-Level Analysis images and 50.70% for the method using Discrete Wavelet Transform. Moreover, our proposed approach exhibits reduced accuracy variance compared to alternative models, underscoring its stability and robustness across diverse datasets. The approach outlined in this work needs to provide information about the specific location or type of tempering, which limits its practical applications.
Suggested Citation
Ancilon Leuch Alencar & Marcelo Dornbusch Lopes & Anita Maria da Rocha Fernandes & Julio Cesar Santos dos Anjos & Juan Francisco De Paz Santana & Valderi Reis Quietinho Leithardt, 2024.
"Detection of Forged Images Using a Combination of Passive Methods Based on Neural Networks,"
Future Internet, MDPI, vol. 16(3), pages 1-20, March.
Handle:
RePEc:gam:jftint:v:16:y:2024:i:3:p:97-:d:1356970
Download full text from publisher
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.
- Qu, Zhijian & Hou, Xinxing & Li, Jian & Hu, Wenbo, 2024.
"Short-term wind farm cluster power prediction based on dual feature extraction and quadratic decomposition aggregation,"
Energy, Elsevier, vol. 290(C).
- Moreno, Sinvaldo Rodrigues & Seman, Laio Oriel & Stefenon, Stefano Frizzo & Coelho, Leandro dos Santos & Mariani, Viviana Cocco, 2024.
"Enhancing wind speed forecasting through synergy of machine learning, singular spectral analysis, and variational mode decomposition,"
Energy, Elsevier, vol. 292(C).
- Rafael Ninno Muniz & Carlos Tavares da Costa Júnior & William Gouvêa Buratto & Ademir Nied & Gabriel Villarrubia González, 2023.
"The Sustainability Concept: A Review Focusing on Energy,"
Sustainability, MDPI, vol. 15(19), pages 1-22, September.
- Xiong, Xin & Zhu, Zhenghao & Tian, Junhao & Guo, Huan & Hu, Xi, 2024.
"A novel Seasonal Fractional Incomplete Gamma Grey Bernoulli Model and its application in forecasting hydroelectric generation,"
Energy, Elsevier, vol. 290(C).
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:3:p:97-:d:1356970. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.