Skip to main content

Identification of Image Spoofing Using Deep Convolution Neural Network

  • Conference paper
  • First Online:
Proceedings of Fourth Doctoral Symposium on Computational Intelligence (DoSCI 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 726))

Included in the following conference series:

  • 175 Accesses

Abstract

Image plays a prominent role in forensic and biometric system authentication. Biometrics has emerged as a reliable security system solution. However, biometric applications become more prevalent, criminals are developing techniques to circumvent them by simulating physical or behavioural characteristics of legal users (image spoofing attacks). Face recognition systems are extremely vulnerable to such frauds because they can easily be fooled with common printed facial photographs, despite being a promising characteristic due to its universality, acceptability, and presence of cameras almost everywhere. Modern approaches based on convolutional neural networks (CNNs) produce good results in detecting face spoofing. However, these methods ignore the importance of learning deep local features from each facial region, despite the fact that face recognition has shown that each facial region has distinct visual characteristics that can be used to detect face spoofing. In this paper, we propose a novel deep CNN architecture for such tasks that is trained in two steps. At first, each component of the neural network learns features from a specific facial region. Following that, the entire model is fine-tuned on the entire set of images. The results show that such pre-training allows the CNN to learn different local spoofing cues, improving the final model’s performance and convergence speed and outperforming state-of-the-art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Piva A (2013) An overview on image forensics. ISRN Sign Process. https://doi.org/10.1155/2013/496701

    Article  Google Scholar 

  2. Tripathi E, Kumar U, Tripathi SP (2022) Image splicing detection system using intensity-level multi-fractal dimension feature engineering and twin support vector machine based classifier. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-13519-2

  3. Onyemauche C (2022) A novel approach to digital forensics image mining system

    Google Scholar 

  4. Singh A, Malik J (2015) A comprehensive study of passive digital image forensics techniques based on intrinsic fingerprints. Int J Comput Appl. https://doi.org/10.5120/20444-2794

    Article  Google Scholar 

  5. Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Appl. https://doi.org/10.1007/s10044-017-0678-8

    Article  Google Scholar 

  6. Thai TH, Cogranne R, Retraint F, Doan TNC (2017) JPEG quantization step estimation and its applications to digital image forensics. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2016.2604208

    Article  Google Scholar 

  7. Li H, Luo W, Huang J (2017) Localization of diffusion-based inpainting in digital images. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2017.2730822

    Article  Google Scholar 

  8. Mahmood T, Irtaza A, Mehmood Z, Tariq Mahmood M (2017) Copy–move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images. Forensic Sci Int. https://doi.org/10.1016/j.forsciint.2017.07.037

    Article  Google Scholar 

  9. Mahmood T, Nawaz T, Mehmood Z, Khan Z, Shah M, Ashraf R (2017) Forensic analysis of copy-move forgery in digital images using the stationary wavelets. https://doi.org/10.1109/INTECH.2016.7845040

  10. Warbhe AD, Dharaskar RV, Thakare VM (2016) Digital image forensics: an affine transform robust copy-paste tampering detection. https://doi.org/10.1109/ISCO.2016.7727045

  11. Cao G, Zhao Y, Ni R, Li X (2014) Contrast enhancement-based forensics in digital images. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2014.2300937

    Article  Google Scholar 

  12. Böhme R, Kirchner M (2013) Counter-forensics: attacking image forensics. In: Digital image forensics: there is more to a picture than meets the eye. https://doi.org/10.1007/978-1-4614-0757-7_12

  13. Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl. https://doi.org/10.1007/s11042-010-0620-1

    Article  Google Scholar 

  14. Kee E, Johnson MK, Farid H (2011) Digital image authentication from JPEG headers. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2011.2128309

    Article  Google Scholar 

  15. Shivakumar BL, Baboo LDSS (2011) Detection of region duplication forgery in digital images using SURF

    Google Scholar 

  16. Gloe T, Borowka K, Winkler A (2010) Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics. https://doi.org/10.1117/12.839034

  17. Cao H, Kot AC (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2009.2033749

  18. Xiaobing K, Shengmin W (2008) Identifying tampered regions using singular value decomposition in digital image forensics. https://doi.org/10.1109/CSSE.2008.876

  19. Luo W, Qu Z, Pan F, Huang JJ (2007) A survey of passive technology for digital image forensics. Front Comp Sci China. https://doi.org/10.1007/s11704-007-0017-0

  20. Singh A, Jindal N, Singh K (2016) A review on digital image forensics. 12(6). https://doi.org/10.1049/cp.2016.1451

  21. Zhang Y (2022) Feature compensation network based on non-uniform quantization of channels for digital image global manipulation forensics

    Google Scholar 

  22. Stamm M, Ray Liu KJ (2011) Anti-Forensics of digital image compression. IEEE Trans Inf Forensics Secur 6:1050–1065. https://doi.org/10.1109/TIFS.2011.2119314

  23. Ali M, Ismail A, Elgohary H, Darwish S, Mesbah S (2022) A procedure for tracing chain of custody in digital image forensics: a paradigm based on grey hash and blockchain. Symmetry 14:334. https://doi.org/10.3390/sym14020334

  24. Brown R, Pham B, Vel O (2005) Design of a digital forensics image mining system. Lect Notes Comput Sci. https://doi.org/10.1007/11553939_57

  25. Alto V (2019) Neural networks: parameters, hyperparameters and optimization strategies. https://towardsdatascience.com/neural-networks-parameters-hyperparameters-and-optimization-strategies-3f0842fac0a5

  26. Chon SH (2019) Hyper-parameter optimization of a convolutional neural network

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Esha Tripathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tripathi, E., Kumar, U., Tripathi, S.P. (2023). Identification of Image Spoofing Using Deep Convolution Neural Network. In: Swaroop, A., Kansal, V., Fortino, G., Hassanien, A.E. (eds) Proceedings of Fourth Doctoral Symposium on Computational Intelligence . DoSCI 2023. Lecture Notes in Networks and Systems, vol 726. Springer, Singapore. https://doi.org/10.1007/978-981-99-3716-5_64

Download citation

Publish with us

Policies and ethics