SlideShare a Scribd company logo
1 of 24
Download to read offline
Knowledge-based fusion for
image tampering localization
Chyssanthi Iakovidou, Symeon Papadopoulos
and Yiannis Kompatsiaris
Multimedia Knowledge and Social Media Analytics Lab (MKLab, https://mklab.iti.gr/)
Information Technologies Institute (ITI), Centre for Research and Technology Hellas (CERTH)
June 5-7, 2020 @ AIAI 2020
Background
1 Image forensics
Image forensics deals with the problem of detecting
tampered images at:
• Image-level (Tampering detection)
two-class classification problem with the goal to
classify given image as authentic/forged
• Pixel-level (Tampering localization)
reporting and localizing tampered image regions
through heat-maps where tampered and non-
tampered pixels have distinct values
Tampering detection report;
Tampering localization report;
Heat-maps:
Label: “forged”
score: 70%
Background
2 Image forensics and current challenges
Challenges:
• Different tampering sessions leave different traces
SoA tools are designed to detect tampering based on only subsets of traces.
• In real scenarios a single forgery session includes multiple different manipulations
Analysis of different tools may be needed to get a robust forensic report
• Forged images shared over the Internet, undergo further transformations
Cropping, resizing, resaving disrupt tampering traces and hinder tools’ efficiency
• Few realistic tampering datasets available for experimenting
Realistic tampering is not easily achieved through automatic procedures
Proposed approach
3 Tamperinglocalization fusion framework
Goal
• Introduce extensible fusion framework for tampering localization and output refinement
Design strategy
• Select and categorize SoA approaches on a multi-criterion ranking and grouping process
• Integrate expert background knowledge on the behaviour of SoA approaches (types of images,
encoding, supported traces, known limitations, etc.)
• Employ a fusion mechanism based on local and cross-tool statistics to produce a single, refined fused
heat-map output for tampering localization
Benefits
• Leverage tools that are complementary to each other
• Present tampering localization results to end users in a manner that is easier to interpret
Proposed approach
3a Candidate selection process
• Detection of JPEG compression traces, in the transform domain.
• Detection of JPEG compression traces, in the spatial domain
• Noise-based detection
3a
Proposed approach
Candidate selection process
• Evaluation on both realistic and synthetic
benchmark datasets
• Evaluation extended to include reports after
various post-processing operations have been
applied on the original datasets
• The ability to retrieve true positives of tampered images
at a low level of false positives (KS@0.05);
• The ability to achieve good localization of the tampered
region within the image (F1)
• The readability of the produced heat map, i.e., a high
distinction of assigned values for tampered and
untampered pixels expressed as the range of different
binarization thresholds that result in high F1 scores.
3a
Proposed approach
Candidate selection process
a) performance: KS score, max F1 score; threshold binarization range,
b) average performance of methods based on normalized KS, F1 and threshold range per dataset;
c) rank aggregation results based on Borda count,Copeland and Kemeny-Young voting
3a
Proposed approach
Candidate selection process
After evaluations of 14 established state-of-the-art methods [1] for splicing localization the
following were selected:
• ADQ1 [2] and DCT [3] are based on analysis of JPEG compression in the transform domain
• BLK [4] and CAGI [5] are based on analysis of JPEG compression in the spatial domain
• NOI3 [6] is a noise-based detector and is integrated as a complementary tool.
[1] M. Zampoglou, et al., "Large-scale evaluation of splicing localization algorithms for web images," MultimTools Appl., vol. 76, no. 4, p. 4801–4834, 2016.
[2] Z. Lin et al., "Fast, automatic and fine-grained tampered {JPEG} image detection via {DCT} coefficient analysis," Pattern Recognition, vol. 42, no. 11, 2009.
[3] S. Ye, et al, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in IEEE Int. Conference on Multimedia and Expo, 2007.
[4] W. Li, et al., "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Processing, vol. 89, no. 9, p. 1821:1829, 2009.
[5] Iakovidou, et al. (2018). Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. of Visual Com. and Image Representation, 54, 155-170..
[6] D. Cozzolino, et al, "Splicebuster: A new blind image splicing detector," in IEEE International Workshop on Information Forensics and Security, 2015.
Proposed approach
3b Fusion strategy
Designing an extensible fusion and output refinement framework for tampering localization
Proposed approach
Normalization Unit
Output maps are normalized in the [0, 1]
range at image level.
Proposed approach
Binarization Unit
Automate map binarization by choosing
the binarization threshold as a value
belonging to the respective safe ranges
per method (empirically defined)
Proposed approach
Connected Component Unit
For every 8-connected region (blob) of
the binarized map we calculate centroid.
Next, we build a feature vector:
• # detected connected regions,
• location of centroids
• spatial standard deviation of the
pixels belonging to a region from their
respective centroid,
• image area of blob (bounding box)
containing the pattern of interest.
Proposed approach
Filtering Unit
Normalized maps and outputs from
Component Unit used for filtering.
First, we filter based on findings of each
method independently from one another:
• Blobs discarded if too big or too small
• Blobs whose bounding boxes overlap
by more than 90% are merged
• Blobs ranked and top 5 selected
based on i) centroids distance from
the overall map centroid, ii) density of
pixels in the blob, and iii) their size.
Proposed approach
Filtering Unit
Perform a content-aware filtering step
utilizing information extracted by
respective methods (CAGI and DCT) to
filter blobs that may occur as false
localizations, such as:
- Over/under exposed image areas
- Image areas of intense texture
- Image areas of consistent intensity
values
Proposed approach
Statistics Extraction Unit
Extraction of statistics to automate the
evaluation of the outputs’ usefulness
• Multilevel measurements of the
entropy of data and the Kolmogorov-
Smirnov (KS) statistic
Proposed approach
Fusion Unit
Leverages the intermediate calculations
to produce a single fused output.
• Interpretability of maps: Maps
ranked and assigned a confidence
score, Ci, based on difference of the
entropy before and after binarization.
• Compatibility between the traces
detected by different methods:
Confidence of a method is reinforced
if other methods detecting similar
traces also achieve high confidence.
Proposed approach
Fusion Unit
• Reliability of method: Score
assigned to each method during the
candidate selection process is used
to rank the methods to help define
their contribution to the final outcome
• Confidence in the presence of
identified tampered regions: The
blobs with the highest KS score of
the best ranking method serve as
baselines. The final refined map is
constructed through comparisons of
the baseline with blob mask of other
methods in a ranked, weighted order.
Experimental Evaluation
4 Experimental setup
We tested on two publicly available datasets:
• The First IFS-TC Image Forensics Challenge
training set that contains 450 user-submitted
forgeries and was designed to serve as a realistic
benchmark.
• The CASIA V2.0 dataset contains 5,123
realistically tampered color images of varying sizes
It includes uncompressed images and also JPEG
images with different quality factors.
Experimental Evaluation
4 Experimental setup
Evaluation metrics
Overall localization quality and readability is based on the pixel-wise agreement between the
reference mask (Ground Truth, GT) and the produced tampering localization heat map and it is
measured in terms of the achieved F-score (F1).
𝐹1 = 2𝑇𝑃/(2𝑇𝑃 + 𝐹𝑃 + 𝐹𝑁)
where (TP) number of true positive, (TN) number of true negative, (FP) number of false positive, and
(FN) number of false negative.
This evaluation methodology requires the output maps to be thresholded prior to any evaluation:
• normalize all maps in the [0, 1] range,
• successively shift the binarization threshold by 0.05 increments (step), and
• calculate the achieved F1 score for every step
Experimental Evaluation
4 Experimental results
F1 score curves on the (a) Challenge and (b) CASIA2 datasets for FUSED and five base methods.
Localization quality
Experimental Evaluation
4 Experimental results
Best mean F1 score and binarization range that allows F1 to remain high (> 70% of respective
maximum F1 score) and reported detections for F1 score >= 0.7 at each method's best binarization
threshold for Challenge and CASIA2 datasets.
Unique Localizations corresponds to the number of detections exclusively achieved by that method
Output interpretability
FUSIONINPUT GT CAGI BLK ADQ
1
NOI3 DCT
Discussion
5 Experimental findings and next steps
• In both datasets the fused output achieves high F1 scores over a wide range of
thresholds → increased localization ability and interpretability.
• In both datasets the fused method reports a high number of absolute localizations
while also contributing additional unique localizations through fusion and refinement of
the available individual outputs.
• Overall, we verified the importance of exploiting the available state-of-the-art methods
in a manner that improves the robustness and user-friendliness of the output.
• Next steps include introducing more methods to the framework and eliminating hard-
coded expert knowledge in the fusion criteria and rules moving towards introducing
fusion approaches based on supervised learning.
Thank you
Partially funded by the European Commission under contract num. H2020-825297 WeVerify and H2020-700024 TENSOR
Dr. Symeon Papadopoulos [papadop@iti.gr] [@sympap]
Media Verification team, http://mever.iti.gr/
Multimedia Knowledge and Social Media Analytics Lab,
https://mklab.iti.gr/

More Related Content

What's hot

A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...sipij
 
A Comparison of People Counting Techniques via Video Scene Analysis
A Comparison of People Counting Techniques viaVideo Scene AnalysisA Comparison of People Counting Techniques viaVideo Scene Analysis
A Comparison of People Counting Techniques via Video Scene AnalysisPoo Kuan Hoong
 
Detection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A SurveyDetection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A SurveyIJERA Editor
 
Multiple Object Tracking
Multiple Object TrackingMultiple Object Tracking
Multiple Object TrackingRainakSharma
 
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
 A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...Chennai Networks
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...ijcsa
 
Visual Object Tracking: review
Visual Object Tracking: reviewVisual Object Tracking: review
Visual Object Tracking: reviewDmytro Mishkin
 
Operation wise attention network for tampering localization fusion
Operation wise attention network for tampering localization fusionOperation wise attention network for tampering localization fusion
Operation wise attention network for tampering localization fusionWeverify
 
Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.Weverify
 
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...Edge AI and Vision Alliance
 
Computer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectComputer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectIOSR Journals
 
Presentation Object Recognition And Tracking Project
Presentation Object Recognition And Tracking ProjectPresentation Object Recognition And Tracking Project
Presentation Object Recognition And Tracking ProjectPrathamesh Joshi
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
GTSRB Traffic Sign recognition using machine learning
GTSRB Traffic Sign recognition using machine learningGTSRB Traffic Sign recognition using machine learning
GTSRB Traffic Sign recognition using machine learningRupali Aher
 
Real Time Myanmar Traffic Sign Recognition System using HOG and SVM
Real Time Myanmar Traffic Sign Recognition System using HOG and SVMReal Time Myanmar Traffic Sign Recognition System using HOG and SVM
Real Time Myanmar Traffic Sign Recognition System using HOG and SVMijtsrd
 
An Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its ClassificationAn Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its Classificationrahulmonikasharma
 
A Probabilistic U-Net for Segmentation of Ambiguous Images
A Probabilistic U-Net for Segmentation of Ambiguous ImagesA Probabilistic U-Net for Segmentation of Ambiguous Images
A Probabilistic U-Net for Segmentation of Ambiguous ImagesSeunghyun Hwang
 

What's hot (20)

A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...A binarization technique for extraction of devanagari text from camera based ...
A binarization technique for extraction of devanagari text from camera based ...
 
A Comparison of People Counting Techniques via Video Scene Analysis
A Comparison of People Counting Techniques viaVideo Scene AnalysisA Comparison of People Counting Techniques viaVideo Scene Analysis
A Comparison of People Counting Techniques via Video Scene Analysis
 
Detection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A SurveyDetection and Tracking of Moving Object: A Survey
Detection and Tracking of Moving Object: A Survey
 
Multiple Object Tracking
Multiple Object TrackingMultiple Object Tracking
Multiple Object Tracking
 
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
 A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv... A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
 
Visual Object Tracking: review
Visual Object Tracking: reviewVisual Object Tracking: review
Visual Object Tracking: review
 
Segmentation
SegmentationSegmentation
Segmentation
 
Operation wise attention network for tampering localization fusion
Operation wise attention network for tampering localization fusionOperation wise attention network for tampering localization fusion
Operation wise attention network for tampering localization fusion
 
Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.Operation-wise Attention Network for Tampering Localization Fusion.
Operation-wise Attention Network for Tampering Localization Fusion.
 
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
 
Computer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectComputer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an Object
 
Presentation Object Recognition And Tracking Project
Presentation Object Recognition And Tracking ProjectPresentation Object Recognition And Tracking Project
Presentation Object Recognition And Tracking Project
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
Object tracking
Object trackingObject tracking
Object tracking
 
GTSRB Traffic Sign recognition using machine learning
GTSRB Traffic Sign recognition using machine learningGTSRB Traffic Sign recognition using machine learning
GTSRB Traffic Sign recognition using machine learning
 
Real Time Myanmar Traffic Sign Recognition System using HOG and SVM
Real Time Myanmar Traffic Sign Recognition System using HOG and SVMReal Time Myanmar Traffic Sign Recognition System using HOG and SVM
Real Time Myanmar Traffic Sign Recognition System using HOG and SVM
 
An Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its ClassificationAn Image Based PCB Fault Detection and Its Classification
An Image Based PCB Fault Detection and Its Classification
 
A Probabilistic U-Net for Segmentation of Ambiguous Images
A Probabilistic U-Net for Segmentation of Ambiguous ImagesA Probabilistic U-Net for Segmentation of Ambiguous Images
A Probabilistic U-Net for Segmentation of Ambiguous Images
 

Similar to Knowledge-based Fusion for Image Tampering Localization

IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
 
Edge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy LogicEdge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy LogicIJERA Editor
 
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET Journal
 
Conference research paper_target_tracking
Conference research paper_target_trackingConference research paper_target_tracking
Conference research paper_target_trackingpatrobadri
 
Image segmentation
Image segmentationImage segmentation
Image segmentationkhyati gupta
 
JPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluationsJPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluationsTouradj Ebrahimi
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewsipij
 
Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images ijcisjournal
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Imagesiosrjce
 
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...IRJET Journal
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of ImageSatheesh K
 
Edge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied InputsEdge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied Inputspaperpublications3
 
ppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptxppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptxssusera4da91
 
HiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentationHiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentationVEDLIoT Project
 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING sipij
 

Similar to Knowledge-based Fusion for Image Tampering Localization (20)

IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
 
Edge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy LogicEdge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy Logic
 
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
 
Conference research paper_target_tracking
Conference research paper_target_trackingConference research paper_target_tracking
Conference research paper_target_tracking
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
JPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluationsJPEG XR objective and subjective evaluations
JPEG XR objective and subjective evaluations
 
Design and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of viewDesign and implementation of video tracking system based on camera field of view
Design and implementation of video tracking system based on camera field of view
 
Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of Image
 
Edge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied InputsEdge Detection Using Fuzzy Logic with Varied Inputs
Edge Detection Using Fuzzy Logic with Varied Inputs
 
ppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptxppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptx
 
E017443136
E017443136E017443136
E017443136
 
HiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentationHiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentation
 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
 

More from Symeon Papadopoulos

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Symeon Papadopoulos
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingSymeon Papadopoulos
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSymeon Papadopoulos
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualitySymeon Papadopoulos
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetSymeon Papadopoulos
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionSymeon Papadopoulos
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterSymeon Papadopoulos
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersSymeon Papadopoulos
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Symeon Papadopoulos
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Symeon Papadopoulos
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceSymeon Papadopoulos
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Symeon Papadopoulos
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsSymeon Papadopoulos
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsSymeon Papadopoulos
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Symeon Papadopoulos
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015Symeon Papadopoulos
 

More from Symeon Papadopoulos (20)

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact Tracing
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia content
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air Quality
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering Detection
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on Twitter
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging Performance
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online Discussions
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Knowledge-based Fusion for Image Tampering Localization

  • 1. Knowledge-based fusion for image tampering localization Chyssanthi Iakovidou, Symeon Papadopoulos and Yiannis Kompatsiaris Multimedia Knowledge and Social Media Analytics Lab (MKLab, https://mklab.iti.gr/) Information Technologies Institute (ITI), Centre for Research and Technology Hellas (CERTH) June 5-7, 2020 @ AIAI 2020
  • 2. Background 1 Image forensics Image forensics deals with the problem of detecting tampered images at: • Image-level (Tampering detection) two-class classification problem with the goal to classify given image as authentic/forged • Pixel-level (Tampering localization) reporting and localizing tampered image regions through heat-maps where tampered and non- tampered pixels have distinct values Tampering detection report; Tampering localization report; Heat-maps: Label: “forged” score: 70%
  • 3. Background 2 Image forensics and current challenges Challenges: • Different tampering sessions leave different traces SoA tools are designed to detect tampering based on only subsets of traces. • In real scenarios a single forgery session includes multiple different manipulations Analysis of different tools may be needed to get a robust forensic report • Forged images shared over the Internet, undergo further transformations Cropping, resizing, resaving disrupt tampering traces and hinder tools’ efficiency • Few realistic tampering datasets available for experimenting Realistic tampering is not easily achieved through automatic procedures
  • 4. Proposed approach 3 Tamperinglocalization fusion framework Goal • Introduce extensible fusion framework for tampering localization and output refinement Design strategy • Select and categorize SoA approaches on a multi-criterion ranking and grouping process • Integrate expert background knowledge on the behaviour of SoA approaches (types of images, encoding, supported traces, known limitations, etc.) • Employ a fusion mechanism based on local and cross-tool statistics to produce a single, refined fused heat-map output for tampering localization Benefits • Leverage tools that are complementary to each other • Present tampering localization results to end users in a manner that is easier to interpret
  • 5. Proposed approach 3a Candidate selection process • Detection of JPEG compression traces, in the transform domain. • Detection of JPEG compression traces, in the spatial domain • Noise-based detection
  • 6. 3a Proposed approach Candidate selection process • Evaluation on both realistic and synthetic benchmark datasets • Evaluation extended to include reports after various post-processing operations have been applied on the original datasets • The ability to retrieve true positives of tampered images at a low level of false positives (KS@0.05); • The ability to achieve good localization of the tampered region within the image (F1) • The readability of the produced heat map, i.e., a high distinction of assigned values for tampered and untampered pixels expressed as the range of different binarization thresholds that result in high F1 scores.
  • 7. 3a Proposed approach Candidate selection process a) performance: KS score, max F1 score; threshold binarization range, b) average performance of methods based on normalized KS, F1 and threshold range per dataset; c) rank aggregation results based on Borda count,Copeland and Kemeny-Young voting
  • 8. 3a Proposed approach Candidate selection process After evaluations of 14 established state-of-the-art methods [1] for splicing localization the following were selected: • ADQ1 [2] and DCT [3] are based on analysis of JPEG compression in the transform domain • BLK [4] and CAGI [5] are based on analysis of JPEG compression in the spatial domain • NOI3 [6] is a noise-based detector and is integrated as a complementary tool. [1] M. Zampoglou, et al., "Large-scale evaluation of splicing localization algorithms for web images," MultimTools Appl., vol. 76, no. 4, p. 4801–4834, 2016. [2] Z. Lin et al., "Fast, automatic and fine-grained tampered {JPEG} image detection via {DCT} coefficient analysis," Pattern Recognition, vol. 42, no. 11, 2009. [3] S. Ye, et al, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in IEEE Int. Conference on Multimedia and Expo, 2007. [4] W. Li, et al., "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Processing, vol. 89, no. 9, p. 1821:1829, 2009. [5] Iakovidou, et al. (2018). Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. of Visual Com. and Image Representation, 54, 155-170.. [6] D. Cozzolino, et al, "Splicebuster: A new blind image splicing detector," in IEEE International Workshop on Information Forensics and Security, 2015.
  • 9. Proposed approach 3b Fusion strategy Designing an extensible fusion and output refinement framework for tampering localization
  • 10. Proposed approach Normalization Unit Output maps are normalized in the [0, 1] range at image level.
  • 11. Proposed approach Binarization Unit Automate map binarization by choosing the binarization threshold as a value belonging to the respective safe ranges per method (empirically defined)
  • 12. Proposed approach Connected Component Unit For every 8-connected region (blob) of the binarized map we calculate centroid. Next, we build a feature vector: • # detected connected regions, • location of centroids • spatial standard deviation of the pixels belonging to a region from their respective centroid, • image area of blob (bounding box) containing the pattern of interest.
  • 13. Proposed approach Filtering Unit Normalized maps and outputs from Component Unit used for filtering. First, we filter based on findings of each method independently from one another: • Blobs discarded if too big or too small • Blobs whose bounding boxes overlap by more than 90% are merged • Blobs ranked and top 5 selected based on i) centroids distance from the overall map centroid, ii) density of pixels in the blob, and iii) their size.
  • 14. Proposed approach Filtering Unit Perform a content-aware filtering step utilizing information extracted by respective methods (CAGI and DCT) to filter blobs that may occur as false localizations, such as: - Over/under exposed image areas - Image areas of intense texture - Image areas of consistent intensity values
  • 15. Proposed approach Statistics Extraction Unit Extraction of statistics to automate the evaluation of the outputs’ usefulness • Multilevel measurements of the entropy of data and the Kolmogorov- Smirnov (KS) statistic
  • 16. Proposed approach Fusion Unit Leverages the intermediate calculations to produce a single fused output. • Interpretability of maps: Maps ranked and assigned a confidence score, Ci, based on difference of the entropy before and after binarization. • Compatibility between the traces detected by different methods: Confidence of a method is reinforced if other methods detecting similar traces also achieve high confidence.
  • 17. Proposed approach Fusion Unit • Reliability of method: Score assigned to each method during the candidate selection process is used to rank the methods to help define their contribution to the final outcome • Confidence in the presence of identified tampered regions: The blobs with the highest KS score of the best ranking method serve as baselines. The final refined map is constructed through comparisons of the baseline with blob mask of other methods in a ranked, weighted order.
  • 18. Experimental Evaluation 4 Experimental setup We tested on two publicly available datasets: • The First IFS-TC Image Forensics Challenge training set that contains 450 user-submitted forgeries and was designed to serve as a realistic benchmark. • The CASIA V2.0 dataset contains 5,123 realistically tampered color images of varying sizes It includes uncompressed images and also JPEG images with different quality factors.
  • 19. Experimental Evaluation 4 Experimental setup Evaluation metrics Overall localization quality and readability is based on the pixel-wise agreement between the reference mask (Ground Truth, GT) and the produced tampering localization heat map and it is measured in terms of the achieved F-score (F1). 𝐹1 = 2𝑇𝑃/(2𝑇𝑃 + 𝐹𝑃 + 𝐹𝑁) where (TP) number of true positive, (TN) number of true negative, (FP) number of false positive, and (FN) number of false negative. This evaluation methodology requires the output maps to be thresholded prior to any evaluation: • normalize all maps in the [0, 1] range, • successively shift the binarization threshold by 0.05 increments (step), and • calculate the achieved F1 score for every step
  • 20. Experimental Evaluation 4 Experimental results F1 score curves on the (a) Challenge and (b) CASIA2 datasets for FUSED and five base methods. Localization quality
  • 21. Experimental Evaluation 4 Experimental results Best mean F1 score and binarization range that allows F1 to remain high (> 70% of respective maximum F1 score) and reported detections for F1 score >= 0.7 at each method's best binarization threshold for Challenge and CASIA2 datasets. Unique Localizations corresponds to the number of detections exclusively achieved by that method Output interpretability
  • 22. FUSIONINPUT GT CAGI BLK ADQ 1 NOI3 DCT
  • 23. Discussion 5 Experimental findings and next steps • In both datasets the fused output achieves high F1 scores over a wide range of thresholds → increased localization ability and interpretability. • In both datasets the fused method reports a high number of absolute localizations while also contributing additional unique localizations through fusion and refinement of the available individual outputs. • Overall, we verified the importance of exploiting the available state-of-the-art methods in a manner that improves the robustness and user-friendliness of the output. • Next steps include introducing more methods to the framework and eliminating hard- coded expert knowledge in the fusion criteria and rules moving towards introducing fusion approaches based on supervised learning.
  • 24. Thank you Partially funded by the European Commission under contract num. H2020-825297 WeVerify and H2020-700024 TENSOR Dr. Symeon Papadopoulos [papadop@iti.gr] [@sympap] Media Verification team, http://mever.iti.gr/ Multimedia Knowledge and Social Media Analytics Lab, https://mklab.iti.gr/