SlideShare a Scribd company logo
Knowledge-based fusion for
image tampering localization
Chyssanthi Iakovidou, Symeon Papadopoulos
and Yiannis Kompatsiaris
Multimedia Knowledge and Social Media Analytics Lab (MKLab, https://mklab.iti.gr/)
Information Technologies Institute (ITI), Centre for Research and Technology Hellas (CERTH)
June 5-7, 2020 @ AIAI 2020
Background
1 Image forensics
Image forensics deals with the problem of detecting
tampered images at:
• Image-level (Tampering detection)
two-class classification problem with the goal to
classify given image as authentic/forged
• Pixel-level (Tampering localization)
reporting and localizing tampered image regions
through heat-maps where tampered and non-
tampered pixels have distinct values
Tampering detection report;
Tampering localization report;
Heat-maps:
Label: “forged”
score: 70%
Background
2 Image forensics and current challenges
Challenges:
• Different tampering sessions leave different traces
SoA tools are designed to detect tampering based on only subsets of traces.
• In real scenarios a single forgery session includes multiple different manipulations
Analysis of different tools may be needed to get a robust forensic report
• Forged images shared over the Internet, undergo further transformations
Cropping, resizing, resaving disrupt tampering traces and hinder tools’ efficiency
• Few realistic tampering datasets available for experimenting
Realistic tampering is not easily achieved through automatic procedures
Proposed approach
3 Tamperinglocalization fusion framework
Goal
• Introduce extensible fusion framework for tampering localization and output refinement
Design strategy
• Select and categorize SoA approaches on a multi-criterion ranking and grouping process
• Integrate expert background knowledge on the behaviour of SoA approaches (types of images,
encoding, supported traces, known limitations, etc.)
• Employ a fusion mechanism based on local and cross-tool statistics to produce a single, refined fused
heat-map output for tampering localization
Benefits
• Leverage tools that are complementary to each other
• Present tampering localization results to end users in a manner that is easier to interpret
Proposed approach
3a Candidate selection process
• Detection of JPEG compression traces, in the transform domain.
• Detection of JPEG compression traces, in the spatial domain
• Noise-based detection
3a
Proposed approach
Candidate selection process
• Evaluation on both realistic and synthetic
benchmark datasets
• Evaluation extended to include reports after
various post-processing operations have been
applied on the original datasets
• The ability to retrieve true positives of tampered images
at a low level of false positives (KS@0.05);
• The ability to achieve good localization of the tampered
region within the image (F1)
• The readability of the produced heat map, i.e., a high
distinction of assigned values for tampered and
untampered pixels expressed as the range of different
binarization thresholds that result in high F1 scores.
3a
Proposed approach
Candidate selection process
a) performance: KS score, max F1 score; threshold binarization range,
b) average performance of methods based on normalized KS, F1 and threshold range per dataset;
c) rank aggregation results based on Borda count,Copeland and Kemeny-Young voting
3a
Proposed approach
Candidate selection process
After evaluations of 14 established state-of-the-art methods [1] for splicing localization the
following were selected:
• ADQ1 [2] and DCT [3] are based on analysis of JPEG compression in the transform domain
• BLK [4] and CAGI [5] are based on analysis of JPEG compression in the spatial domain
• NOI3 [6] is a noise-based detector and is integrated as a complementary tool.
[1] M. Zampoglou, et al., "Large-scale evaluation of splicing localization algorithms for web images," MultimTools Appl., vol. 76, no. 4, p. 4801–4834, 2016.
[2] Z. Lin et al., "Fast, automatic and fine-grained tampered {JPEG} image detection via {DCT} coefficient analysis," Pattern Recognition, vol. 42, no. 11, 2009.
[3] S. Ye, et al, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in IEEE Int. Conference on Multimedia and Expo, 2007.
[4] W. Li, et al., "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Processing, vol. 89, no. 9, p. 1821:1829, 2009.
[5] Iakovidou, et al. (2018). Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. of Visual Com. and Image Representation, 54, 155-170..
[6] D. Cozzolino, et al, "Splicebuster: A new blind image splicing detector," in IEEE International Workshop on Information Forensics and Security, 2015.
Proposed approach
3b Fusion strategy
Designing an extensible fusion and output refinement framework for tampering localization
Proposed approach
Normalization Unit
Output maps are normalized in the [0, 1]
range at image level.
Proposed approach
Binarization Unit
Automate map binarization by choosing
the binarization threshold as a value
belonging to the respective safe ranges
per method (empirically defined)
Proposed approach
Connected Component Unit
For every 8-connected region (blob) of
the binarized map we calculate centroid.
Next, we build a feature vector:
• # detected connected regions,
• location of centroids
• spatial standard deviation of the
pixels belonging to a region from their
respective centroid,
• image area of blob (bounding box)
containing the pattern of interest.
Proposed approach
Filtering Unit
Normalized maps and outputs from
Component Unit used for filtering.
First, we filter based on findings of each
method independently from one another:
• Blobs discarded if too big or too small
• Blobs whose bounding boxes overlap
by more than 90% are merged
• Blobs ranked and top 5 selected
based on i) centroids distance from
the overall map centroid, ii) density of
pixels in the blob, and iii) their size.
Proposed approach
Filtering Unit
Perform a content-aware filtering step
utilizing information extracted by
respective methods (CAGI and DCT) to
filter blobs that may occur as false
localizations, such as:
- Over/under exposed image areas
- Image areas of intense texture
- Image areas of consistent intensity
values
Proposed approach
Statistics Extraction Unit
Extraction of statistics to automate the
evaluation of the outputs’ usefulness
• Multilevel measurements of the
entropy of data and the Kolmogorov-
Smirnov (KS) statistic
Proposed approach
Fusion Unit
Leverages the intermediate calculations
to produce a single fused output.
• Interpretability of maps: Maps
ranked and assigned a confidence
score, Ci, based on difference of the
entropy before and after binarization.
• Compatibility between the traces
detected by different methods:
Confidence of a method is reinforced
if other methods detecting similar
traces also achieve high confidence.
Proposed approach
Fusion Unit
• Reliability of method: Score
assigned to each method during the
candidate selection process is used
to rank the methods to help define
their contribution to the final outcome
• Confidence in the presence of
identified tampered regions: The
blobs with the highest KS score of
the best ranking method serve as
baselines. The final refined map is
constructed through comparisons of
the baseline with blob mask of other
methods in a ranked, weighted order.
Experimental Evaluation
4 Experimental setup
We tested on two publicly available datasets:
• The First IFS-TC Image Forensics Challenge
training set that contains 450 user-submitted
forgeries and was designed to serve as a realistic
benchmark.
• The CASIA V2.0 dataset contains 5,123
realistically tampered color images of varying sizes
It includes uncompressed images and also JPEG
images with different quality factors.
Experimental Evaluation
4 Experimental setup
Evaluation metrics
Overall localization quality and readability is based on the pixel-wise agreement between the
reference mask (Ground Truth, GT) and the produced tampering localization heat map and it is
measured in terms of the achieved F-score (F1).
𝐹1 = 2𝑇𝑃/(2𝑇𝑃 + 𝐹𝑃 + 𝐹𝑁)
where (TP) number of true positive, (TN) number of true negative, (FP) number of false positive, and
(FN) number of false negative.
This evaluation methodology requires the output maps to be thresholded prior to any evaluation:
• normalize all maps in the [0, 1] range,
• successively shift the binarization threshold by 0.05 increments (step), and
• calculate the achieved F1 score for every step
Experimental Evaluation
4 Experimental results
F1 score curves on the (a) Challenge and (b) CASIA2 datasets for FUSED and five base methods.
Localization quality
Experimental Evaluation
4 Experimental results
Best mean F1 score and binarization range that allows F1 to remain high (> 70% of respective
maximum F1 score) and reported detections for F1 score >= 0.7 at each method's best binarization
threshold for Challenge and CASIA2 datasets.
Unique Localizations corresponds to the number of detections exclusively achieved by that method
Output interpretability
FUSIONINPUT GT CAGI BLK ADQ
1
NOI3 DCT
Discussion
5 Experimental findings and next steps
• In both datasets the fused output achieves high F1 scores over a wide range of
thresholds → increased localization ability and interpretability.
• In both datasets the fused method reports a high number of absolute localizations
while also contributing additional unique localizations through fusion and refinement of
the available individual outputs.
• Overall, we verified the importance of exploiting the available state-of-the-art methods
in a manner that improves the robustness and user-friendliness of the output.
• Next steps include introducing more methods to the framework and eliminating hard-
coded expert knowledge in the fusion criteria and rules moving towards introducing
fusion approaches based on supervised learning.
Thank you
Partially funded by the European Commission under contract num. H2020-825297 WeVerify and H2020-700024 TENSOR
Dr. Symeon Papadopoulos [papadop@iti.gr] [@sympap]
Media Verification team, http://mever.iti.gr/
Multimedia Knowledge and Social Media Analytics Lab,
https://mklab.iti.gr/

More Related Content

PPT
unrban-building-damage-detection-by-PJLi.ppt
PPTX
Automatic Building detection for satellite Images using IGV and DSM
PDF
N046047780
PPTX
Object tracking
PDF
Overview Of Video Object Tracking System
PDF
Presentation of Visual Tracking
PPTX
People counting in low density video sequences2
PDF
Object video tracking using a pan tilt-zoom system
unrban-building-damage-detection-by-PJLi.ppt
Automatic Building detection for satellite Images using IGV and DSM
N046047780
Object tracking
Overview Of Video Object Tracking System
Presentation of Visual Tracking
People counting in low density video sequences2
Object video tracking using a pan tilt-zoom system

What's hot (20)

PDF
A binarization technique for extraction of devanagari text from camera based ...
PPTX
A Comparison of People Counting Techniques via Video Scene Analysis
PDF
Detection and Tracking of Moving Object: A Survey
PPTX
Multiple Object Tracking
PPTX
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
DOC
Research Paper v2.0
PDF
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
PDF
Visual Object Tracking: review
PPT
Segmentation
PDF
Operation wise attention network for tampering localization fusion
PPTX
Operation-wise Attention Network for Tampering Localization Fusion.
PDF
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
PDF
Computer Vision: Visual Extent of an Object
PPT
Presentation Object Recognition And Tracking Project
PDF
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
PPTX
Object tracking
PDF
GTSRB Traffic Sign recognition using machine learning
PDF
Real Time Myanmar Traffic Sign Recognition System using HOG and SVM
PDF
An Image Based PCB Fault Detection and Its Classification
PPTX
A Probabilistic U-Net for Segmentation of Ambiguous Images
A binarization technique for extraction of devanagari text from camera based ...
A Comparison of People Counting Techniques via Video Scene Analysis
Detection and Tracking of Moving Object: A Survey
Multiple Object Tracking
A Genetic Algorithm-Based Moving Object Detection For Real-Time Traffic Surv...
Research Paper v2.0
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
Visual Object Tracking: review
Segmentation
Operation wise attention network for tampering localization fusion
Operation-wise Attention Network for Tampering Localization Fusion.
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
Computer Vision: Visual Extent of an Object
Presentation Object Recognition And Tracking Project
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
Object tracking
GTSRB Traffic Sign recognition using machine learning
Real Time Myanmar Traffic Sign Recognition System using HOG and SVM
An Image Based PCB Fault Detection and Its Classification
A Probabilistic U-Net for Segmentation of Ambiguous Images
Ad

Similar to Knowledge-based Fusion for Image Tampering Localization (20)

PDF
Presentation of the InVID tools for image forensics analysis
PDF
Image Fusion
PDF
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
PDF
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
PPS
LCI - MICC Seminario-Forensics
PDF
Iaetsd a review on modified anti forensic
PDF
Image Quality Feature Based Detection Algorithm for Forgery in Images
PDF
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
PPTX
A proposed accelerated image copy-move forgery detection-vcip2014
PDF
Detecting image splicing in the wild Web
PDF
PCA & CS based fusion for Medical Image Fusion
PDF
A Hybrid Chebyshev-ICA Image Fusion Method Based on Regional Saliency
PPTX
A Web-based Service for Image Tampering Detection
PDF
Classification and evaluation of digital forensic tools
PPTX
FAN search for image copy-move forgery-amalta 2014
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
PDF
Image Counterfeiting Detection and Localization Using Deep Learning Algorithms
PDF
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
PDF
Analysis of KinectFusion
PDF
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Presentation of the InVID tools for image forensics analysis
Image Fusion
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
LCI - MICC Seminario-Forensics
Iaetsd a review on modified anti forensic
Image Quality Feature Based Detection Algorithm for Forgery in Images
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
A proposed accelerated image copy-move forgery detection-vcip2014
Detecting image splicing in the wild Web
PCA & CS based fusion for Medical Image Fusion
A Hybrid Chebyshev-ICA Image Fusion Method Based on Regional Saliency
A Web-based Service for Image Tampering Detection
Classification and evaluation of digital forensic tools
FAN search for image copy-move forgery-amalta 2014
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
Image Counterfeiting Detection and Localization Using Deep Learning Algorithms
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
Analysis of KinectFusion
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Ad

More from Symeon Papadopoulos (20)

PDF
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
PDF
Deepfakes: An Emerging Internet Threat and their Detection
PDF
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
PPTX
COVID-19 Infodemic vs Contact Tracing
PDF
Similarity-based retrieval of multimedia content
PPTX
Twitter-based Sensing of City-level Air Quality
PPTX
Aggregating and Analyzing the Context of Social Media Content
PDF
Verifying Multimedia Content on the Internet
PPTX
Learning to detect Misleading Content on Twitter
PPTX
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
PPTX
Verifying Multimedia Use at MediaEval 2016
PPTX
Multimedia Privacy
PPTX
Placing Images with Refined Language Models and Similarity Search with PCA-re...
PPTX
In-depth Exploration of Geotagging Performance
PPTX
Perceived versus Actual Predictability of Personal Information in Social Netw...
PPTX
Web and Social Media Image Forensics for News Professionals
PPTX
Predicting News Popularity by Mining Online Discussions
PPTX
Finding Diverse Social Images at MediaEval 2015
PPTX
CERTH/CEA LIST at MediaEval Placing Task 2015
PPTX
Verifying Multimedia Use at MediaEval 2015
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
Deepfakes: An Emerging Internet Threat and their Detection
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
COVID-19 Infodemic vs Contact Tracing
Similarity-based retrieval of multimedia content
Twitter-based Sensing of City-level Air Quality
Aggregating and Analyzing the Context of Social Media Content
Verifying Multimedia Content on the Internet
Learning to detect Misleading Content on Twitter
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Verifying Multimedia Use at MediaEval 2016
Multimedia Privacy
Placing Images with Refined Language Models and Similarity Search with PCA-re...
In-depth Exploration of Geotagging Performance
Perceived versus Actual Predictability of Personal Information in Social Netw...
Web and Social Media Image Forensics for News Professionals
Predicting News Popularity by Mining Online Discussions
Finding Diverse Social Images at MediaEval 2015
CERTH/CEA LIST at MediaEval Placing Task 2015
Verifying Multimedia Use at MediaEval 2015

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Monthly Chronicles - July 2025
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Monthly Chronicles - July 2025

Knowledge-based Fusion for Image Tampering Localization

  • 1. Knowledge-based fusion for image tampering localization Chyssanthi Iakovidou, Symeon Papadopoulos and Yiannis Kompatsiaris Multimedia Knowledge and Social Media Analytics Lab (MKLab, https://mklab.iti.gr/) Information Technologies Institute (ITI), Centre for Research and Technology Hellas (CERTH) June 5-7, 2020 @ AIAI 2020
  • 2. Background 1 Image forensics Image forensics deals with the problem of detecting tampered images at: • Image-level (Tampering detection) two-class classification problem with the goal to classify given image as authentic/forged • Pixel-level (Tampering localization) reporting and localizing tampered image regions through heat-maps where tampered and non- tampered pixels have distinct values Tampering detection report; Tampering localization report; Heat-maps: Label: “forged” score: 70%
  • 3. Background 2 Image forensics and current challenges Challenges: • Different tampering sessions leave different traces SoA tools are designed to detect tampering based on only subsets of traces. • In real scenarios a single forgery session includes multiple different manipulations Analysis of different tools may be needed to get a robust forensic report • Forged images shared over the Internet, undergo further transformations Cropping, resizing, resaving disrupt tampering traces and hinder tools’ efficiency • Few realistic tampering datasets available for experimenting Realistic tampering is not easily achieved through automatic procedures
  • 4. Proposed approach 3 Tamperinglocalization fusion framework Goal • Introduce extensible fusion framework for tampering localization and output refinement Design strategy • Select and categorize SoA approaches on a multi-criterion ranking and grouping process • Integrate expert background knowledge on the behaviour of SoA approaches (types of images, encoding, supported traces, known limitations, etc.) • Employ a fusion mechanism based on local and cross-tool statistics to produce a single, refined fused heat-map output for tampering localization Benefits • Leverage tools that are complementary to each other • Present tampering localization results to end users in a manner that is easier to interpret
  • 5. Proposed approach 3a Candidate selection process • Detection of JPEG compression traces, in the transform domain. • Detection of JPEG compression traces, in the spatial domain • Noise-based detection
  • 6. 3a Proposed approach Candidate selection process • Evaluation on both realistic and synthetic benchmark datasets • Evaluation extended to include reports after various post-processing operations have been applied on the original datasets • The ability to retrieve true positives of tampered images at a low level of false positives (KS@0.05); • The ability to achieve good localization of the tampered region within the image (F1) • The readability of the produced heat map, i.e., a high distinction of assigned values for tampered and untampered pixels expressed as the range of different binarization thresholds that result in high F1 scores.
  • 7. 3a Proposed approach Candidate selection process a) performance: KS score, max F1 score; threshold binarization range, b) average performance of methods based on normalized KS, F1 and threshold range per dataset; c) rank aggregation results based on Borda count,Copeland and Kemeny-Young voting
  • 8. 3a Proposed approach Candidate selection process After evaluations of 14 established state-of-the-art methods [1] for splicing localization the following were selected: • ADQ1 [2] and DCT [3] are based on analysis of JPEG compression in the transform domain • BLK [4] and CAGI [5] are based on analysis of JPEG compression in the spatial domain • NOI3 [6] is a noise-based detector and is integrated as a complementary tool. [1] M. Zampoglou, et al., "Large-scale evaluation of splicing localization algorithms for web images," MultimTools Appl., vol. 76, no. 4, p. 4801–4834, 2016. [2] Z. Lin et al., "Fast, automatic and fine-grained tampered {JPEG} image detection via {DCT} coefficient analysis," Pattern Recognition, vol. 42, no. 11, 2009. [3] S. Ye, et al, "Detecting digital image forgeries by measuring inconsistencies of blocking artifact," in IEEE Int. Conference on Multimedia and Expo, 2007. [4] W. Li, et al., "Passive detection of doctored JPEG image via block artifact grid extraction," Signal Processing, vol. 89, no. 9, p. 1821:1829, 2009. [5] Iakovidou, et al. (2018). Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. of Visual Com. and Image Representation, 54, 155-170.. [6] D. Cozzolino, et al, "Splicebuster: A new blind image splicing detector," in IEEE International Workshop on Information Forensics and Security, 2015.
  • 9. Proposed approach 3b Fusion strategy Designing an extensible fusion and output refinement framework for tampering localization
  • 10. Proposed approach Normalization Unit Output maps are normalized in the [0, 1] range at image level.
  • 11. Proposed approach Binarization Unit Automate map binarization by choosing the binarization threshold as a value belonging to the respective safe ranges per method (empirically defined)
  • 12. Proposed approach Connected Component Unit For every 8-connected region (blob) of the binarized map we calculate centroid. Next, we build a feature vector: • # detected connected regions, • location of centroids • spatial standard deviation of the pixels belonging to a region from their respective centroid, • image area of blob (bounding box) containing the pattern of interest.
  • 13. Proposed approach Filtering Unit Normalized maps and outputs from Component Unit used for filtering. First, we filter based on findings of each method independently from one another: • Blobs discarded if too big or too small • Blobs whose bounding boxes overlap by more than 90% are merged • Blobs ranked and top 5 selected based on i) centroids distance from the overall map centroid, ii) density of pixels in the blob, and iii) their size.
  • 14. Proposed approach Filtering Unit Perform a content-aware filtering step utilizing information extracted by respective methods (CAGI and DCT) to filter blobs that may occur as false localizations, such as: - Over/under exposed image areas - Image areas of intense texture - Image areas of consistent intensity values
  • 15. Proposed approach Statistics Extraction Unit Extraction of statistics to automate the evaluation of the outputs’ usefulness • Multilevel measurements of the entropy of data and the Kolmogorov- Smirnov (KS) statistic
  • 16. Proposed approach Fusion Unit Leverages the intermediate calculations to produce a single fused output. • Interpretability of maps: Maps ranked and assigned a confidence score, Ci, based on difference of the entropy before and after binarization. • Compatibility between the traces detected by different methods: Confidence of a method is reinforced if other methods detecting similar traces also achieve high confidence.
  • 17. Proposed approach Fusion Unit • Reliability of method: Score assigned to each method during the candidate selection process is used to rank the methods to help define their contribution to the final outcome • Confidence in the presence of identified tampered regions: The blobs with the highest KS score of the best ranking method serve as baselines. The final refined map is constructed through comparisons of the baseline with blob mask of other methods in a ranked, weighted order.
  • 18. Experimental Evaluation 4 Experimental setup We tested on two publicly available datasets: • The First IFS-TC Image Forensics Challenge training set that contains 450 user-submitted forgeries and was designed to serve as a realistic benchmark. • The CASIA V2.0 dataset contains 5,123 realistically tampered color images of varying sizes It includes uncompressed images and also JPEG images with different quality factors.
  • 19. Experimental Evaluation 4 Experimental setup Evaluation metrics Overall localization quality and readability is based on the pixel-wise agreement between the reference mask (Ground Truth, GT) and the produced tampering localization heat map and it is measured in terms of the achieved F-score (F1). 𝐹1 = 2𝑇𝑃/(2𝑇𝑃 + 𝐹𝑃 + 𝐹𝑁) where (TP) number of true positive, (TN) number of true negative, (FP) number of false positive, and (FN) number of false negative. This evaluation methodology requires the output maps to be thresholded prior to any evaluation: • normalize all maps in the [0, 1] range, • successively shift the binarization threshold by 0.05 increments (step), and • calculate the achieved F1 score for every step
  • 20. Experimental Evaluation 4 Experimental results F1 score curves on the (a) Challenge and (b) CASIA2 datasets for FUSED and five base methods. Localization quality
  • 21. Experimental Evaluation 4 Experimental results Best mean F1 score and binarization range that allows F1 to remain high (> 70% of respective maximum F1 score) and reported detections for F1 score >= 0.7 at each method's best binarization threshold for Challenge and CASIA2 datasets. Unique Localizations corresponds to the number of detections exclusively achieved by that method Output interpretability
  • 22. FUSIONINPUT GT CAGI BLK ADQ 1 NOI3 DCT
  • 23. Discussion 5 Experimental findings and next steps • In both datasets the fused output achieves high F1 scores over a wide range of thresholds → increased localization ability and interpretability. • In both datasets the fused method reports a high number of absolute localizations while also contributing additional unique localizations through fusion and refinement of the available individual outputs. • Overall, we verified the importance of exploiting the available state-of-the-art methods in a manner that improves the robustness and user-friendliness of the output. • Next steps include introducing more methods to the framework and eliminating hard- coded expert knowledge in the fusion criteria and rules moving towards introducing fusion approaches based on supervised learning.
  • 24. Thank you Partially funded by the European Commission under contract num. H2020-825297 WeVerify and H2020-700024 TENSOR Dr. Symeon Papadopoulos [papadop@iti.gr] [@sympap] Media Verification team, http://mever.iti.gr/ Multimedia Knowledge and Social Media Analytics Lab, https://mklab.iti.gr/