Knowledge-based Fusion for Image Tampering Localization

Symeon Papadopoulos
Symeon PapadopoulosResearcher at CERTH-ITI, Co-founder at infalia um infalia
Knowledge-based fusion for
image tampering localization
Chyssanthi Iakovidou, Symeon Papadopoulos
and Yiannis Kompatsiaris
Multimedia Knowledge and Social Media Analytics Lab (MKLab, https://mklab.iti.gr/)
Information Technologies Institute (ITI), Centre for Research and Technology Hellas (CERTH)
June 5-7, 2020 @ AIAI 2020
Background
1 Image forensics
Image forensics deals with the problem of detecting
tampered images at:
• Image-level (Tampering detection)
two-class classification problem with the goal to
classify given image as authentic/forged
• Pixel-level (Tampering localization)
reporting and localizing tampered image regions
through heat-maps where tampered and non-
tampered pixels have distinct values
Tampering detection report;
Tampering localization report;
Heat-maps:
Label: “forged”
score: 70%
Background
2 Image forensics and current challenges
Challenges:
• Different tampering sessions leave different traces
SoA tools are designed to detect tampering based on only subsets of traces.
• In real scenarios a single forgery session includes multiple different manipulations
Analysis of different tools may be needed to get a robust forensic report
• Forged images shared over the Internet, undergo further transformations
Cropping, resizing, resaving disrupt tampering traces and hinder tools’ efficiency
• Few realistic tampering datasets available for experimenting
Realistic tampering is not easily achieved through automatic procedures
Proposed approach
3 Tamperinglocalization fusion framework
Goal
• Introduce extensible fusion framework for tampering localization and output refinement
Design strategy
• Select and categorize SoA approaches on a multi-criterion ranking and grouping process
• Integrate expert background knowledge on the behaviour of SoA approaches (types of images,
encoding, supported traces, known limitations, etc.)
• Employ a fusion mechanism based on local and cross-tool statistics to produce a single, refined fused
heat-map output for tampering localization
Benefits
• Leverage tools that are complementary to each other
• Present tampering localization results to end users in a manner that is easier to interpret
Proposed approach
3a Candidate selection process
• Detection of JPEG compression traces, in the transform domain.
• Detection of JPEG compression traces, in the spatial domain
• Noise-based detection
3a
Proposed approach
Candidate selection process
• Evaluation on both realistic and synthetic
benchmark datasets
• Evaluation extended to include reports after
various post-processing operations have been
applied on the original datasets
• The ability to retrieve true positives of tampered images
at a low level of false positives (KS@0.05);
• The ability to achieve good localization of the tampered
region within the image (F1)
• The readability of the produced heat map, i.e., a high
distinction of assigned values for tampered and
untampered pixels expressed as the range of different
binarization thresholds that result in high F1 scores.
3a
Proposed approach
Candidate selection process
a) performance: KS score, max F1 score; threshold binarization range,
b) average performance of methods based on normalized KS, F1 and threshold range per dataset;
c) rank aggregation results based on Borda count,Copeland and Kemeny-Young voting
3a
Proposed approach
Candidate selection process
After evaluations of 14 established state-of-the-art methods [1] for splicing localization the
following were selected:
• ADQ1 [2] and DCT [3] are based on analysis of JPEG compression in the transform domain
• BLK [4] and CAGI [5] are based on analysis of JPEG compression in the spatial domain
• NOI3 [6] is a noise-based detector and is integrated as a complementary tool.
[1] M. Zampoglou, et al., "Large-scale evaluation of splicing localization algorithms for web images," MultimTools Appl., vol. 76, no. 4, p. 4801–4834, 2016.
[2] Z. Lin et al., "Fast, automatic and fine-grained tampered {JPEG} image detection via {DCT} coefficient analysis," Pattern Recognition, vol. 42, no. 11, 2009.
[3] S. Ye, et al, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in IEEE Int. Conference on Multimedia and Expo, 2007.
[4] W. Li, et al., "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Processing, vol. 89, no. 9, p. 1821:1829, 2009.
[5] Iakovidou, et al. (2018). Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. of Visual Com. and Image Representation, 54, 155-170..
[6] D. Cozzolino, et al, "Splicebuster: A new blind image splicing detector," in IEEE International Workshop on Information Forensics and Security, 2015.
Proposed approach
3b Fusion strategy
Designing an extensible fusion and output refinement framework for tampering localization
Proposed approach
Normalization Unit
Output maps are normalized in the [0, 1]
range at image level.
Proposed approach
Binarization Unit
Automate map binarization by choosing
the binarization threshold as a value
belonging to the respective safe ranges
per method (empirically defined)
Proposed approach
Connected Component Unit
For every 8-connected region (blob) of
the binarized map we calculate centroid.
Next, we build a feature vector:
• # detected connected regions,
• location of centroids
• spatial standard deviation of the
pixels belonging to a region from their
respective centroid,
• image area of blob (bounding box)
containing the pattern of interest.
Proposed approach
Filtering Unit
Normalized maps and outputs from
Component Unit used for filtering.
First, we filter based on findings of each
method independently from one another:
• Blobs discarded if too big or too small
• Blobs whose bounding boxes overlap
by more than 90% are merged
• Blobs ranked and top 5 selected
based on i) centroids distance from
the overall map centroid, ii) density of
pixels in the blob, and iii) their size.
Proposed approach
Filtering Unit
Perform a content-aware filtering step
utilizing information extracted by
respective methods (CAGI and DCT) to
filter blobs that may occur as false
localizations, such as:
- Over/under exposed image areas
- Image areas of intense texture
- Image areas of consistent intensity
values
Proposed approach
Statistics Extraction Unit
Extraction of statistics to automate the
evaluation of the outputs’ usefulness
• Multilevel measurements of the
entropy of data and the Kolmogorov-
Smirnov (KS) statistic
Proposed approach
Fusion Unit
Leverages the intermediate calculations
to produce a single fused output.
• Interpretability of maps: Maps
ranked and assigned a confidence
score, Ci, based on difference of the
entropy before and after binarization.
• Compatibility between the traces
detected by different methods:
Confidence of a method is reinforced
if other methods detecting similar
traces also achieve high confidence.
Proposed approach
Fusion Unit
• Reliability of method: Score
assigned to each method during the
candidate selection process is used
to rank the methods to help define
their contribution to the final outcome
• Confidence in the presence of
identified tampered regions: The
blobs with the highest KS score of
the best ranking method serve as
baselines. The final refined map is
constructed through comparisons of
the baseline with blob mask of other
methods in a ranked, weighted order.
Experimental Evaluation
4 Experimental setup
We tested on two publicly available datasets:
• The First IFS-TC Image Forensics Challenge
training set that contains 450 user-submitted
forgeries and was designed to serve as a realistic
benchmark.
• The CASIA V2.0 dataset contains 5,123
realistically tampered color images of varying sizes
It includes uncompressed images and also JPEG
images with different quality factors.
Experimental Evaluation
4 Experimental setup
Evaluation metrics
Overall localization quality and readability is based on the pixel-wise agreement between the
reference mask (Ground Truth, GT) and the produced tampering localization heat map and it is
measured in terms of the achieved F-score (F1).
𝐹1 = 2𝑇𝑃/(2𝑇𝑃 + 𝐹𝑃 + 𝐹𝑁)
where (TP) number of true positive, (TN) number of true negative, (FP) number of false positive, and
(FN) number of false negative.
This evaluation methodology requires the output maps to be thresholded prior to any evaluation:
• normalize all maps in the [0, 1] range,
• successively shift the binarization threshold by 0.05 increments (step), and
• calculate the achieved F1 score for every step
Experimental Evaluation
4 Experimental results
F1 score curves on the (a) Challenge and (b) CASIA2 datasets for FUSED and five base methods.
Localization quality
Experimental Evaluation
4 Experimental results
Best mean F1 score and binarization range that allows F1 to remain high (> 70% of respective
maximum F1 score) and reported detections for F1 score >= 0.7 at each method's best binarization
threshold for Challenge and CASIA2 datasets.
Unique Localizations corresponds to the number of detections exclusively achieved by that method
Output interpretability
FUSIONINPUT GT CAGI BLK ADQ
1
NOI3 DCT
Discussion
5 Experimental findings and next steps
• In both datasets the fused output achieves high F1 scores over a wide range of
thresholds → increased localization ability and interpretability.
• In both datasets the fused method reports a high number of absolute localizations
while also contributing additional unique localizations through fusion and refinement of
the available individual outputs.
• Overall, we verified the importance of exploiting the available state-of-the-art methods
in a manner that improves the robustness and user-friendliness of the output.
• Next steps include introducing more methods to the framework and eliminating hard-
coded expert knowledge in the fusion criteria and rules moving towards introducing
fusion approaches based on supervised learning.
Thank you
Partially funded by the European Commission under contract num. H2020-825297 WeVerify and H2020-700024 TENSOR
Dr. Symeon Papadopoulos [papadop@iti.gr] [@sympap]
Media Verification team, http://mever.iti.gr/
Multimedia Knowledge and Social Media Analytics Lab,
https://mklab.iti.gr/
1 von 24

Recomendados

unrban-building-damage-detection-by-PJLi.ppt von
unrban-building-damage-detection-by-PJLi.pptunrban-building-damage-detection-by-PJLi.ppt
unrban-building-damage-detection-by-PJLi.pptgrssieee
533 views20 Folien
Automatic Building detection for satellite Images using IGV and DSM von
Automatic Building detection for satellite Images using IGV and DSMAutomatic Building detection for satellite Images using IGV and DSM
Automatic Building detection for satellite Images using IGV and DSMAmit Raikar
999 views38 Folien
N046047780 von
N046047780N046047780
N046047780IJERA Editor
173 views4 Folien
Object tracking von
Object trackingObject tracking
Object trackingSri vidhya k
26.5K views55 Folien
Overview Of Video Object Tracking System von
Overview Of Video Object Tracking SystemOverview Of Video Object Tracking System
Overview Of Video Object Tracking SystemEditor IJMTER
775 views12 Folien
Presentation of Visual Tracking von
Presentation of Visual TrackingPresentation of Visual Tracking
Presentation of Visual TrackingYu-Sheng (Yosen) Chen
1.7K views53 Folien

Más contenido relacionado

Was ist angesagt?

A binarization technique for extraction of devanagari text from camera based ... von
A binarization technique for extraction of devanagari text from camera based ...A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...sipij
771 views9 Folien
A Comparison of People Counting Techniques via Video Scene Analysis von
A Comparison of People Counting Techniques viaVideo Scene AnalysisA Comparison of People Counting Techniques viaVideo Scene Analysis
A Comparison of People Counting Techniques via Video Scene AnalysisPoo Kuan Hoong
2.2K views13 Folien
Detection and Tracking of Moving Object: A Survey von
Detection and Tracking of Moving Object: A SurveyDetection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A SurveyIJERA Editor
307 views5 Folien
Multiple Object Tracking von
Multiple Object TrackingMultiple Object Tracking
Multiple Object TrackingRainakSharma
87 views7 Folien
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... von
 A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...Chennai Networks
856 views9 Folien
Research Paper v2.0 von
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
196 views12 Folien

Was ist angesagt?(20)

A binarization technique for extraction of devanagari text from camera based ... von sipij
A binarization technique for extraction of devanagari text from camera based ...A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...
sipij771 views
A Comparison of People Counting Techniques via Video Scene Analysis von Poo Kuan Hoong
A Comparison of People Counting Techniques viaVideo Scene AnalysisA Comparison of People Counting Techniques viaVideo Scene Analysis
A Comparison of People Counting Techniques via Video Scene Analysis
Poo Kuan Hoong2.2K views
Detection and Tracking of Moving Object: A Survey von IJERA Editor
Detection and Tracking of Moving Object: A SurveyDetection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A Survey
IJERA Editor307 views
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... von Chennai Networks
 A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
Chennai Networks856 views
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE... von ijcsa
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
ijcsa217 views
Visual Object Tracking: review von Dmytro Mishkin
Visual Object Tracking: reviewVisual Object Tracking: review
Visual Object Tracking: review
Dmytro Mishkin4.6K views
Segmentation von guest49d49
SegmentationSegmentation
Segmentation
guest49d4919.7K views
Operation wise attention network for tampering localization fusion von Weverify
Operation wise attention network for tampering localization fusionOperation wise attention network for tampering localization fusion
Operation wise attention network for tampering localization fusion
Weverify196 views
Operation-wise Attention Network for Tampering Localization Fusion. von Weverify
Operation-wise Attention Network for Tampering Localization Fusion.Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.
Weverify175 views
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques... von Edge AI and Vision Alliance
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
Computer Vision: Visual Extent of an Object von IOSR Journals
Computer Vision: Visual Extent of an ObjectComputer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an Object
IOSR Journals264 views
Presentation Object Recognition And Tracking Project von Prathamesh Joshi
Presentation Object Recognition And Tracking ProjectPresentation Object Recognition And Tracking Project
Presentation Object Recognition And Tracking Project
Prathamesh Joshi4.1K views
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe... von IRJET Journal
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET Journal33 views
GTSRB Traffic Sign recognition using machine learning von Rupali Aher
GTSRB Traffic Sign recognition using machine learningGTSRB Traffic Sign recognition using machine learning
GTSRB Traffic Sign recognition using machine learning
Rupali Aher3.4K views
Real Time Myanmar Traffic Sign Recognition System using HOG and SVM von ijtsrd
Real Time Myanmar Traffic Sign Recognition System using HOG and SVMReal Time Myanmar Traffic Sign Recognition System using HOG and SVM
Real Time Myanmar Traffic Sign Recognition System using HOG and SVM
ijtsrd158 views
An Image Based PCB Fault Detection and Its Classification von rahulmonikasharma
An Image Based PCB Fault Detection and Its ClassificationAn Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its Classification
rahulmonikasharma366 views
A Probabilistic U-Net for Segmentation of Ambiguous Images von Seunghyun Hwang
A Probabilistic U-Net for Segmentation of Ambiguous ImagesA Probabilistic U-Net for Segmentation of Ambiguous Images
A Probabilistic U-Net for Segmentation of Ambiguous Images
Seunghyun Hwang195 views

Similar a Knowledge-based Fusion for Image Tampering Localization

IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ... von
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
48 views4 Folien
Edge Detection Using Fuzzy Logic von
Edge Detection Using Fuzzy LogicEdge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy LogicIJERA Editor
486 views3 Folien
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB von
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET Journal
15 views4 Folien
Conference research paper_target_tracking von
Conference research paper_target_trackingConference research paper_target_tracking
Conference research paper_target_trackingpatrobadri
314 views7 Folien
Image segmentation von
Image segmentationImage segmentation
Image segmentationkhyati gupta
1K views20 Folien
JPEG XR objective and subjective evaluations von
JPEG XR objective and subjective evaluationsJPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluationsTouradj Ebrahimi
2.7K views52 Folien

Similar a Knowledge-based Fusion for Image Tampering Localization(20)

IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ... von IRJET Journal
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET Journal48 views
Edge Detection Using Fuzzy Logic von IJERA Editor
Edge Detection Using Fuzzy LogicEdge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy Logic
IJERA Editor486 views
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB von IRJET Journal
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET Journal15 views
Conference research paper_target_tracking von patrobadri
Conference research paper_target_trackingConference research paper_target_tracking
Conference research paper_target_tracking
patrobadri314 views
JPEG XR objective and subjective evaluations von Touradj Ebrahimi
JPEG XR objective and subjective evaluationsJPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluations
Touradj Ebrahimi2.7K views
Design and implementation of video tracking system based on camera field of view von sipij
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
sipij346 views
Target Detection Using Multi Resolution Analysis for Camouflaged Images von ijcisjournal
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images
ijcisjournal95 views
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images von iosrjce
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
iosrjce262 views
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen... von IRJET Journal
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET Journal2 views
Super Resolution of Image von Satheesh K
Super Resolution of ImageSuper Resolution of Image
Super Resolution of Image
Satheesh K1.3K views
Edge Detection Using Fuzzy Logic with Varied Inputs von paperpublications3
Edge Detection Using Fuzzy Logic with Varied InputsEdge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied Inputs
paperpublications3103 views
ppt icitisee 2022_without_recording.pptx von ssusera4da91
ppt icitisee 2022_without_recording.pptxppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptx
ssusera4da915 views
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING von sipij
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
sipij18 views

Más de Symeon Papadopoulos

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno... von
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
883 views29 Folien
Deepfakes: An Emerging Internet Threat and their Detection von
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
1.5K views50 Folien
Deepfake Detection: The Importance of Training Data Preprocessing and Practic... von
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Symeon Papadopoulos
168 views19 Folien
COVID-19 Infodemic vs Contact Tracing von
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingSymeon Papadopoulos
205 views11 Folien
Similarity-based retrieval of multimedia content von
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSymeon Papadopoulos
815 views61 Folien
Twitter-based Sensing of City-level Air Quality von
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualitySymeon Papadopoulos
708 views27 Folien

Más de Symeon Papadopoulos(20)

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno... von Symeon Papadopoulos
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
Deepfakes: An Emerging Internet Threat and their Detection von Symeon Papadopoulos
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
Symeon Papadopoulos1.5K views
Deepfake Detection: The Importance of Training Data Preprocessing and Practic... von Symeon Papadopoulos
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Aggregating and Analyzing the Context of Social Media Content von Symeon Papadopoulos
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
Symeon Papadopoulos5.9K views
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers von Symeon Papadopoulos
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Placing Images with Refined Language Models and Similarity Search with PCA-re... von Symeon Papadopoulos
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Perceived versus Actual Predictability of Personal Information in Social Netw... von Symeon Papadopoulos
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
Web and Social Media Image Forensics for News Professionals von Symeon Papadopoulos
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
Symeon Papadopoulos1.2K views
Predicting News Popularity by Mining Online Discussions von Symeon Papadopoulos
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online Discussions
Symeon Papadopoulos1.2K views

Último

The Research Portal of Catalonia: Growing more (information) & more (services) von
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
136 views25 Folien
Uni Systems for Power Platform.pptx von
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
58 views21 Folien
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... von
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...ShapeBlue
82 views62 Folien
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
344 views86 Folien
Network Source of Truth and Infrastructure as Code revisited von
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
42 views45 Folien
Business Analyst Series 2023 - Week 4 Session 7 von
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
80 views31 Folien

Último(20)

Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... von ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue82 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software344 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray1080 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays40 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue65 views
State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue145 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc77 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue von ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue96 views
HTTP headers that make your website go faster - devs.gent November 2023 von Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn28 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue46 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson133 views
Data Integrity for Banking and Financial Services von Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue48 views

Knowledge-based Fusion for Image Tampering Localization

  • 1. Knowledge-based fusion for image tampering localization Chyssanthi Iakovidou, Symeon Papadopoulos and Yiannis Kompatsiaris Multimedia Knowledge and Social Media Analytics Lab (MKLab, https://mklab.iti.gr/) Information Technologies Institute (ITI), Centre for Research and Technology Hellas (CERTH) June 5-7, 2020 @ AIAI 2020
  • 2. Background 1 Image forensics Image forensics deals with the problem of detecting tampered images at: • Image-level (Tampering detection) two-class classification problem with the goal to classify given image as authentic/forged • Pixel-level (Tampering localization) reporting and localizing tampered image regions through heat-maps where tampered and non- tampered pixels have distinct values Tampering detection report; Tampering localization report; Heat-maps: Label: “forged” score: 70%
  • 3. Background 2 Image forensics and current challenges Challenges: • Different tampering sessions leave different traces SoA tools are designed to detect tampering based on only subsets of traces. • In real scenarios a single forgery session includes multiple different manipulations Analysis of different tools may be needed to get a robust forensic report • Forged images shared over the Internet, undergo further transformations Cropping, resizing, resaving disrupt tampering traces and hinder tools’ efficiency • Few realistic tampering datasets available for experimenting Realistic tampering is not easily achieved through automatic procedures
  • 4. Proposed approach 3 Tamperinglocalization fusion framework Goal • Introduce extensible fusion framework for tampering localization and output refinement Design strategy • Select and categorize SoA approaches on a multi-criterion ranking and grouping process • Integrate expert background knowledge on the behaviour of SoA approaches (types of images, encoding, supported traces, known limitations, etc.) • Employ a fusion mechanism based on local and cross-tool statistics to produce a single, refined fused heat-map output for tampering localization Benefits • Leverage tools that are complementary to each other • Present tampering localization results to end users in a manner that is easier to interpret
  • 5. Proposed approach 3a Candidate selection process • Detection of JPEG compression traces, in the transform domain. • Detection of JPEG compression traces, in the spatial domain • Noise-based detection
  • 6. 3a Proposed approach Candidate selection process • Evaluation on both realistic and synthetic benchmark datasets • Evaluation extended to include reports after various post-processing operations have been applied on the original datasets • The ability to retrieve true positives of tampered images at a low level of false positives (KS@0.05); • The ability to achieve good localization of the tampered region within the image (F1) • The readability of the produced heat map, i.e., a high distinction of assigned values for tampered and untampered pixels expressed as the range of different binarization thresholds that result in high F1 scores.
  • 7. 3a Proposed approach Candidate selection process a) performance: KS score, max F1 score; threshold binarization range, b) average performance of methods based on normalized KS, F1 and threshold range per dataset; c) rank aggregation results based on Borda count,Copeland and Kemeny-Young voting
  • 8. 3a Proposed approach Candidate selection process After evaluations of 14 established state-of-the-art methods [1] for splicing localization the following were selected: • ADQ1 [2] and DCT [3] are based on analysis of JPEG compression in the transform domain • BLK [4] and CAGI [5] are based on analysis of JPEG compression in the spatial domain • NOI3 [6] is a noise-based detector and is integrated as a complementary tool. [1] M. Zampoglou, et al., "Large-scale evaluation of splicing localization algorithms for web images," MultimTools Appl., vol. 76, no. 4, p. 4801–4834, 2016. [2] Z. Lin et al., "Fast, automatic and fine-grained tampered {JPEG} image detection via {DCT} coefficient analysis," Pattern Recognition, vol. 42, no. 11, 2009. [3] S. Ye, et al, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in IEEE Int. Conference on Multimedia and Expo, 2007. [4] W. Li, et al., "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Processing, vol. 89, no. 9, p. 1821:1829, 2009. [5] Iakovidou, et al. (2018). Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. of Visual Com. and Image Representation, 54, 155-170.. [6] D. Cozzolino, et al, "Splicebuster: A new blind image splicing detector," in IEEE International Workshop on Information Forensics and Security, 2015.
  • 9. Proposed approach 3b Fusion strategy Designing an extensible fusion and output refinement framework for tampering localization
  • 10. Proposed approach Normalization Unit Output maps are normalized in the [0, 1] range at image level.
  • 11. Proposed approach Binarization Unit Automate map binarization by choosing the binarization threshold as a value belonging to the respective safe ranges per method (empirically defined)
  • 12. Proposed approach Connected Component Unit For every 8-connected region (blob) of the binarized map we calculate centroid. Next, we build a feature vector: • # detected connected regions, • location of centroids • spatial standard deviation of the pixels belonging to a region from their respective centroid, • image area of blob (bounding box) containing the pattern of interest.
  • 13. Proposed approach Filtering Unit Normalized maps and outputs from Component Unit used for filtering. First, we filter based on findings of each method independently from one another: • Blobs discarded if too big or too small • Blobs whose bounding boxes overlap by more than 90% are merged • Blobs ranked and top 5 selected based on i) centroids distance from the overall map centroid, ii) density of pixels in the blob, and iii) their size.
  • 14. Proposed approach Filtering Unit Perform a content-aware filtering step utilizing information extracted by respective methods (CAGI and DCT) to filter blobs that may occur as false localizations, such as: - Over/under exposed image areas - Image areas of intense texture - Image areas of consistent intensity values
  • 15. Proposed approach Statistics Extraction Unit Extraction of statistics to automate the evaluation of the outputs’ usefulness • Multilevel measurements of the entropy of data and the Kolmogorov- Smirnov (KS) statistic
  • 16. Proposed approach Fusion Unit Leverages the intermediate calculations to produce a single fused output. • Interpretability of maps: Maps ranked and assigned a confidence score, Ci, based on difference of the entropy before and after binarization. • Compatibility between the traces detected by different methods: Confidence of a method is reinforced if other methods detecting similar traces also achieve high confidence.
  • 17. Proposed approach Fusion Unit • Reliability of method: Score assigned to each method during the candidate selection process is used to rank the methods to help define their contribution to the final outcome • Confidence in the presence of identified tampered regions: The blobs with the highest KS score of the best ranking method serve as baselines. The final refined map is constructed through comparisons of the baseline with blob mask of other methods in a ranked, weighted order.
  • 18. Experimental Evaluation 4 Experimental setup We tested on two publicly available datasets: • The First IFS-TC Image Forensics Challenge training set that contains 450 user-submitted forgeries and was designed to serve as a realistic benchmark. • The CASIA V2.0 dataset contains 5,123 realistically tampered color images of varying sizes It includes uncompressed images and also JPEG images with different quality factors.
  • 19. Experimental Evaluation 4 Experimental setup Evaluation metrics Overall localization quality and readability is based on the pixel-wise agreement between the reference mask (Ground Truth, GT) and the produced tampering localization heat map and it is measured in terms of the achieved F-score (F1). 𝐹1 = 2𝑇𝑃/(2𝑇𝑃 + 𝐹𝑃 + 𝐹𝑁) where (TP) number of true positive, (TN) number of true negative, (FP) number of false positive, and (FN) number of false negative. This evaluation methodology requires the output maps to be thresholded prior to any evaluation: • normalize all maps in the [0, 1] range, • successively shift the binarization threshold by 0.05 increments (step), and • calculate the achieved F1 score for every step
  • 20. Experimental Evaluation 4 Experimental results F1 score curves on the (a) Challenge and (b) CASIA2 datasets for FUSED and five base methods. Localization quality
  • 21. Experimental Evaluation 4 Experimental results Best mean F1 score and binarization range that allows F1 to remain high (> 70% of respective maximum F1 score) and reported detections for F1 score >= 0.7 at each method's best binarization threshold for Challenge and CASIA2 datasets. Unique Localizations corresponds to the number of detections exclusively achieved by that method Output interpretability
  • 22. FUSIONINPUT GT CAGI BLK ADQ 1 NOI3 DCT
  • 23. Discussion 5 Experimental findings and next steps • In both datasets the fused output achieves high F1 scores over a wide range of thresholds → increased localization ability and interpretability. • In both datasets the fused method reports a high number of absolute localizations while also contributing additional unique localizations through fusion and refinement of the available individual outputs. • Overall, we verified the importance of exploiting the available state-of-the-art methods in a manner that improves the robustness and user-friendliness of the output. • Next steps include introducing more methods to the framework and eliminating hard- coded expert knowledge in the fusion criteria and rules moving towards introducing fusion approaches based on supervised learning.
  • 24. Thank you Partially funded by the European Commission under contract num. H2020-825297 WeVerify and H2020-700024 TENSOR Dr. Symeon Papadopoulos [papadop@iti.gr] [@sympap] Media Verification team, http://mever.iti.gr/ Multimedia Knowledge and Social Media Analytics Lab, https://mklab.iti.gr/