Abstract
Deepfake in multimedia content is being increasingly used in a plethora of cybercrimes, namely those related to digital kidnap, and ransomware. Criminal investigation has been challenged in detecting manipulated multimedia material, by applying machine learning techniques to distinguish between fake and genuine photos and videos. This paper aims to present a Support Vector Machines (SVM) based method to detect tampered photos. The method was implemented in Python and integrated as a new module in the widely used digital forensics application Autopsy. The method processes a set of features resulting from the application of a Discrete Fourier Transform (DFT) in each photo. The experiments were made in a new and large dataset of classified photos containing both legitimate and manipulated photos, and composed of objects and faces. The results obtained were promising and reveal the appropriateness of using this method embedded in Autopsy, to help in criminal investigation activities and digital forensics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: A survey of face manipulation and fake detection. arXiv preprint arXiv:2001.00179 (2020)
Kietzmann, J., Lee, L., McCarthy, I., Kietzmann, T.: Deepfakes: trick or treat? Bus. Horiz. 63(2), 135–146 (2020)
Nguyen, T., Nguyen, C., Nguyen, D.T., Nguyen, D.T., Nahavandi, S.: Deep learning for deepfakes creation and detection 1 (111573) (2019)
Spivak, R.: Deepfakes’’: the newest way to commit one of the oldest crimes. Georget. Law Technol. Rev. 3(2), 339–400 (2019)
Harris, D.: Deepfakes: false pornography is here and the law cannot protect you. Duke Law Technol. Rev. 17, 99 (2018)
Durall, R., Keuper, M., Pfreundt, F.J., Keuper, J.: Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686 (2019)
Bissell, K., LaSalle, R.M., Dal Cin, P.: The cost of cybercrime-Ninth annual cost of cybercrime study. Technical report, Accenture, 2019. Independently conducted by Ponemon Institute LLC and jointly developed by Accenture (2019). https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf. Accessed 9 Jan 2021
Niyishaka, P., Bhagvati, C.: Digital image forensics technique for copy-move forgery detection using DoG and ORB. In: Chmielewski, L.J., Kozera, R., Orłowski, A., Wojciechowski, K., Bruckstein, A.M., Petkov, N. (eds.) ICCVG 2018. LNCS, vol. 11114, pp. 472–483. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00692-1_41
Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017)
Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4401–4410 (2019)
Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., Winkler, S.: COVERAGE - a novel database for copy-move forgery detection. In: IEEE International Conference on Image processing (ICIP), pp. 161–165 (2016)
Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 549–552 (2006)
Liu, G., Wang, J., Lian, S., Dai, Y.: Detect image splicing with artificial blurred boundary. Math. Comput. Model. 57(11–12), 2647–2659 (2013)
Moore, M.: Top Cybersecurity Threats in 2020. University of Sandiego. https://onlinedegrees.sandiego.edu/top-cyber-security-threats/. Accessed 12 Jan 2021
Christian, J.: Experts fear face swapping tech could start an international showdown. The Outline. https://theoutline.com/post/3179/deepfake-videos-are-freaking-experts-out?zd=1&zi=hchawpks. Accessed 13 Jan 2021
Roose, K.: Here Come the Fake Videos, Too. The New York Times. https://www.nytimes.com/2018/03/04/technology/fake-videos-deepfakes.html. Accessed 13 Jan 2021
Shung, K.P.: Accuracy, Precision, Recall or F1?. Towards Data Science.https://towardsdatascience.com/accuracy-precision-recall-or-f1-331fb37c5cb9. Accessed 6 Jan 2021
Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18–28 (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Ferreira, S., Antunes, M., Correia, M.E. (2021). Forensic Analysis of Tampered Digital Photos. In: Tavares, J.M.R.S., Papa, J.P., González Hidalgo, M. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2021. Lecture Notes in Computer Science(), vol 12702. Springer, Cham. https://doi.org/10.1007/978-3-030-93420-0_43
Download citation
DOI: https://doi.org/10.1007/978-3-030-93420-0_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93419-4
Online ISBN: 978-3-030-93420-0
eBook Packages: Computer ScienceComputer Science (R0)