Abstract
Image plays a prominent role in forensic and biometric system authentication. Biometrics has emerged as a reliable security system solution. However, biometric applications become more prevalent, criminals are developing techniques to circumvent them by simulating physical or behavioural characteristics of legal users (image spoofing attacks). Face recognition systems are extremely vulnerable to such frauds because they can easily be fooled with common printed facial photographs, despite being a promising characteristic due to its universality, acceptability, and presence of cameras almost everywhere. Modern approaches based on convolutional neural networks (CNNs) produce good results in detecting face spoofing. However, these methods ignore the importance of learning deep local features from each facial region, despite the fact that face recognition has shown that each facial region has distinct visual characteristics that can be used to detect face spoofing. In this paper, we propose a novel deep CNN architecture for such tasks that is trained in two steps. At first, each component of the neural network learns features from a specific facial region. Following that, the entire model is fine-tuned on the entire set of images. The results show that such pre-training allows the CNN to learn different local spoofing cues, improving the final model’s performance and convergence speed and outperforming state-of-the-art approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Piva A (2013) An overview on image forensics. ISRN Sign Process. https://doi.org/10.1155/2013/496701
Tripathi E, Kumar U, Tripathi SP (2022) Image splicing detection system using intensity-level multi-fractal dimension feature engineering and twin support vector machine based classifier. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-13519-2
Onyemauche C (2022) A novel approach to digital forensics image mining system
Singh A, Malik J (2015) A comprehensive study of passive digital image forensics techniques based on intrinsic fingerprints. Int J Comput Appl. https://doi.org/10.5120/20444-2794
Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Appl. https://doi.org/10.1007/s10044-017-0678-8
Thai TH, Cogranne R, Retraint F, Doan TNC (2017) JPEG quantization step estimation and its applications to digital image forensics. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2016.2604208
Li H, Luo W, Huang J (2017) Localization of diffusion-based inpainting in digital images. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2017.2730822
Mahmood T, Irtaza A, Mehmood Z, Tariq Mahmood M (2017) Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int. https://doi.org/10.1016/j.forsciint.2017.07.037
Mahmood T, Nawaz T, Mehmood Z, Khan Z, Shah M, Ashraf R (2017) Forensic analysis of copy-move forgery in digital images using the stationary wavelets. https://doi.org/10.1109/INTECH.2016.7845040
Warbhe AD, Dharaskar RV, Thakare VM (2016) Digital image forensics: an affine transform robust copy-paste tampering detection. https://doi.org/10.1109/ISCO.2016.7727045
Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2014.2300937
Böhme R, Kirchner M (2013) Counter-forensics: attacking image forensics. In: Digital image forensics: there is more to a picture than meets the eye. https://doi.org/10.1007/978-1-4614-0757-7_12
Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl. https://doi.org/10.1007/s11042-010-0620-1
Kee E, Johnson MK, Farid H (2011) Digital image authentication from JPEG headers. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2011.2128309
Shivakumar BL, Baboo LDSS (2011) Detection of region duplication forgery in digital images using SURF
Gloe T, Borowka K, Winkler A (2010) Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics. https://doi.org/10.1117/12.839034
Cao H, Kot AC (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2009.2033749
Xiaobing K, Shengmin W (2008) Identifying tampered regions using singular value decomposition in digital image forensics. https://doi.org/10.1109/CSSE.2008.876
Luo W, Qu Z, Pan F, Huang JJ (2007) A survey of passive technology for digital image forensics. Front Comp Sci China. https://doi.org/10.1007/s11704-007-0017-0
Singh A, Jindal N, Singh K (2016) A review on digital image forensics. 12(6). https://doi.org/10.1049/cp.2016.1451
Zhang Y (2022) Feature compensation network based on non-uniform quantization of channels for digital image global manipulation forensics
Stamm M, Ray Liu KJ (2011) Anti-Forensics of digital image compression. IEEE Trans Inf Forensics Secur 6:1050–1065. https://doi.org/10.1109/TIFS.2011.2119314
Ali M, Ismail A, Elgohary H, Darwish S, Mesbah S (2022) A procedure for tracing chain of custody in digital image forensics: a paradigm based on grey hash and blockchain. Symmetry 14:334. https://doi.org/10.3390/sym14020334
Brown R, Pham B, Vel O (2005) Design of a digital forensics image mining system. Lect Notes Comput Sci. https://doi.org/10.1007/11553939_57
Alto V (2019) Neural networks: parameters, hyperparameters and optimization strategies. https://towardsdatascience.com/neural-networks-parameters-hyperparameters-and-optimization-strategies-3f0842fac0a5
Chon SH (2019) Hyper-parameter optimization of a convolutional neural network
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tripathi, E., Kumar, U., Tripathi, S.P. (2023). Identification of Image Spoofing Using Deep Convolution Neural Network. In: Swaroop, A., Kansal, V., Fortino, G., Hassanien, A.E. (eds) Proceedings of Fourth Doctoral Symposium on Computational Intelligence . DoSCI 2023. Lecture Notes in Networks and Systems, vol 726. Springer, Singapore. https://doi.org/10.1007/978-981-99-3716-5_64
Download citation
DOI: https://doi.org/10.1007/978-981-99-3716-5_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3715-8
Online ISBN: 978-981-99-3716-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)