SlideShare a Scribd company logo
Detecting malicious tampering in
digital images
Markos Zampoglou - markzampoglou@iti.gr
Information Technologies Institute (ITI)
Centre for Research and Technology Hellas (CERTH)
Workshop on Tools for Video Discovery & Verification in Social Media
Dec 14, 2017 @ Thessaloniki, Greece
Image forgeries in the news
https://www.snopes.com/photos/animals/puertorico.asp
Image forgeries in the news
http://www.imperfectedblog.com/2015/11/crimes-of-retouching-and-the-
importance-of-community/
Image forgeries in the news
https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-
too-many/
The promise of image forensics
Image verification: tools of the trade
• Metadata analysis
• Photoshop? Dates/locations? Copyrights?
• Reverse image search
• Content analysis / tampering localization
Tampering localization algorithms
Splicing
localization
Copy-move
detection
Block
matching
Keypoint
matching
High-frequency
noise
CFA
patterns
JPEG compression
traces
Filtering and
analysis
Camera-
specific (PRNU)
Quantization
artefacts
Compression grid
misalignment
JPEG ghosts,
ELA
REVEAL Media Verification Assistant (1/2)
http://reveal-mklab.iti.gr/
• REVEAL (FP7, 2013-2016)
• Second round of testing as part of InVID
• Collaboration between CERTH and DW
• Features:
• Metadata: listing, GPS geolocation, EXIF thumbnails
• Reverse image search: Google Images integration
• Tampering detection: Eight state-of-the-art algorithms
• Aims:
• a comprehensive, self-contained verification toolset
• an evaluation framework for verification tools and protocols
REVEAL Media Verification Assistant (2/2)
Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R., & Spangenberg, J. (2016, April). Web
and Social Media Image Forensics for News Professionals. In SMN@ ICWSM.
Comparison of verification tools
FotoForensics1 Forensically2 Ghiro3 REVEAL4
ELA X X X X
Ghost X
DW Noise X
Median Noise X X
Block Artifact X
Double Quantization X
Copy-move X*
Thumbnail X X
Metadata X X X X
Geotagging X X X X
Reverse search X
1http://fotoforensics.com
2http://29a.ch/photo-forensics/
3http://www.imageforensic.org/
4http://reveal-mklab.iti.gr/reveal/verify.html
*Forensically implements a very simple block-
matching algorithm with low robustness
Further features
• Open source1
• Public demo version
• Real-world examples of detections and non-
detections
• Tutorials and algorithm explanations
• “Magnifying glass” for examining fine details
• Scrolling image/map overlay
• Export personalized analysis as PDF
1https://github.com/MKLab-ITI/image-forensics
Usage distribution
France 401
Netherlands 262
Germany 214
UK 181
US 153
Argentina 96
Egypt 52
Current challenges (1/2)
• Absence of automatic methods to analyse metadata
• High computational requirements
• Interpretation of results not always intuitive
Current challenges (2/2)
• When applied in real-world cases, algorithms
perform significantly worse than in research
datasets
• This could partly be attributed to the effects of Social
Media dissemination
Identifying Untampered Images (1/2)
• Interpreting the results (especially for non-
detections) can be an issue
Untampered:
Tampered:
Algorithm: ADQ1 (Lin et al, 2009)
Identifying Untampered Images (2/2)
• Not all algorithms are created equal
• Still, some training is usually necessary
Untampered:
Tampered:
Algorithm: ADQ2 (Bianchi et al, 2011)
The pitfalls of image forensics
“MH17 – Forensic Analysis of Satellite Images
Released by the Russian Ministry of Defence”
• A report by Bellingcat1 using ELA to prove that the
Russian MoD had forged the images
• N. Krawetz: Bellingcat “misinterpreted the results”2
1https://www.bellingcat.com
2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
Future steps
• Add a tampering probability score
• Generate a “merged” tampering heat map
• Test new approaches based on deep learning
• Keep improving stability, speed, GUI responsiveness
Acknowledgements
• Dr. Chryssanthi Iakovidou (CAGI algorithm)
• Olga Papadopoulou (back-end development)
• Lazaros Apostolidis (front-end development)
• Dr. Symeon Papadopoulos (Overview & design)
• Ruben Bouwmeester, DW (Design and evaluation)
• Yiannis Kompatsiaris (Overview)
Thank you!
http://reveal-mklab.iti.gr/reveal
Get in touch!
Markos Zampoglou markzampoglou@iti.gr
Symeon Papadopoulos papadop@iti.gr
References
• Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis
for forgery localization in JPEG images." In Acoustics, Speech and Signal Processing
(ICASSP), 2011 IEEE International Conference on, pp. 2444-2447. IEEE, 2011.
• Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery
localization via fine-grained analysis of cfa artifacts." Information Forensics and Security,
IEEE Transactions on 7, no. 5 (2012): 1566-1577.
• Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and
Security, IEEE Transactions on 4, no. 1 (2009): 154-160.
• Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A
framework for decision fusion in image forensics based on dempster–shafer theory of
evidence." Information Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593-
607.
• Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine-
grained tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition
42, no. 11 (2009): 2492-2501.
• Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,”
Image and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009.
• Zampoglou, Markos, Symeon Papadopoulos, and Yiannis Kompatsiaris. "Detecting image
splicing in the wild (WEB)." In Multimedia & Expo Workshops (ICMEW), 2015 IEEE
International Conference on, pp. 1-6. IEEE, 2015.
Evaluation methodology
• Quantitative
• Six reference datasets (images + binary masks of tampering
= “ground truth”)
• Measures capturing the matching between ground truth
mask and algorithm output
• Comparison of 14 algorithms, “best” six plus a newly
proposed one ended up in the tool
• Qualitative
• Informal feedback has been received by end users
• Pertains to both usability and quality of results
Zampoglou, M., Papadopoulos, S., & Kompatsiaris, Y. (2017). Large-scale evaluation of splicing localization
algorithms for web images. Multimedia Tools and Applications, 76(4), 4801-4834.
Quantitative evaluations (1/3)
• To assess the performance of the implemented algorithms,
we evaluated their performance on a large number of
images
• Benchmark datasets:
• Columbia Uncompressed (Hsu and Chang 2006, “COLUMB”), First
Image Forensics Challenge (“CHAL”)1, Fontani et al 2013 (“FON”)
• Additional datasets
• The Wild Web Dataset (Zampoglou et al, 2015)
• The Deutsche Welle Image Forensics Dataset
1http://ifc.recod.ic.unicamp.br/fc
Quantitative evaluations (2/3)
• Evaluations on benchmark datasets:
• Robustness to resaves:
Quantitative evaluations (3/3)
• Performance on the Wild Web Dataset:
• Performance on the Deutsche Welle Image
Forensics Dataset:
• Successful detection for 2 out of 6 cases (4 out of 12
images)
Algorithm DQ GHO BLK ELA DWHF MED
Detections
(out of 80)
3 12 3 2 3 1
Time (sec) 0.27 6.12 13.40 1.29 122.13 0.54
Image verification software:
requirements
• Easy to use; requires little expertise and training
• Integrates easily in established workflows and IT
systems
• Provides all common functionalities
• Metadata analysis
• Reverse image search
• Tampering localization
• Clear, interpretable and transparent output
• No “black box” results
• Intuitive and simple interface
• Allows sharing and archiving of reports and
conclusions
• Comparable or better results than existing solutions

More Related Content

PDF
Presentation of the InVID technologies for image forensics analysis
PDF
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
PDF
Verifying Multimedia Content on the Internet
PPTX
A Web-based Service for Image Tampering Detection
PDF
Video & AI: capabilities and limitations of AI in detecting video manipulations
PPTX
AI In Cybersecurity – Challenges and Solutions
PDF
Visualization for Software Analytics
PDF
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Presentation of the InVID technologies for image forensics analysis
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
Verifying Multimedia Content on the Internet
A Web-based Service for Image Tampering Detection
Video & AI: capabilities and limitations of AI in detecting video manipulations
AI In Cybersecurity – Challenges and Solutions
Visualization for Software Analytics
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...

What's hot (6)

PPTX
Towards a Threat Hunting Automation Maturity Model
PDF
Fuzzing: Challenges and Reflections
PDF
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
PPT
Final october interviewing_techniques
PDF
Use Combinatorial Testing for Mobile Device Fragmentation
PDF
Verification and Validation of Findings
Towards a Threat Hunting Automation Maturity Model
Fuzzing: Challenges and Reflections
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Final october interviewing_techniques
Use Combinatorial Testing for Mobile Device Fragmentation
Verification and Validation of Findings
Ad

Similar to Presentation of the InVID tools for image forensics analysis (20)

PPTX
Web and Social Media Image Forensics for News Professionals
PDF
Classification and evaluation of digital forensic tools
PDF
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
PDF
General Purpose Image Tampering Detection using Convolutional Neural Network ...
PDF
General Purpose Image Tampering Detection using Convolutional Neural Network ...
PDF
General Purpose Image Tampering Detection using Convolutional Neural Network ...
PDF
An Approach for Copy-Move Attack Detection and Transformation Recovery
PPTX
REAL-TIME VIDEO BASED VIOLENCE DETECTION SYSTEM IN PUBLIC AREA USING NEURAL N...
PPT
Microlearning in crowdsourcing and crowdtasking applicaitons
PDF
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
PDF
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
PPTX
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
PPT
International Visual Methods Conference Sept OU 2011
PDF
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
PPTX
Detecting and Improving Distorted Fingerprints using rectification techniques.
PDF
IRJET- A Survey on Object Detection using Deep Learning Techniques
PPTX
Digital forensics research: The next 10 years
PPTX
Computer vision introduction
PDF
Object tracking final
PDF
Object tracking presentation
Web and Social Media Image Forensics for News Professionals
Classification and evaluation of digital forensic tools
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
An Approach for Copy-Move Attack Detection and Transformation Recovery
REAL-TIME VIDEO BASED VIOLENCE DETECTION SYSTEM IN PUBLIC AREA USING NEURAL N...
Microlearning in crowdsourcing and crowdtasking applicaitons
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
International Visual Methods Conference Sept OU 2011
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
Detecting and Improving Distorted Fingerprints using rectification techniques.
IRJET- A Survey on Object Detection using Deep Learning Techniques
Digital forensics research: The next 10 years
Computer vision introduction
Object tracking final
Object tracking presentation
Ad

More from InVID Project (20)

PDF
InVID at IFCN Global Fact V
PDF
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
PDF
Presentation of the InVID project and verification technologies
PDF
Presentation of the InVID verification technologies at IPTC 2018
PDF
IUT-Toulouse-InVID-2018
PDF
A state of the art in journalism about fake image and video detection
PDF
Presentation of the InVID tool for social media verification
PDF
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
PDF
Presentation of the InVID Verification Plugin
PDF
Overview of the InVID project
PDF
Second issue of the InVID newsletter
PDF
The InVID Plug-in: Web Video Verification on the Browser
PPTX
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
PDF
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
PDF
The InVID Vefirication Plugin at DisinfoLab
PDF
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
PDF
InVID at the IPTC Autumn Meeting 2016
PDF
ELLA LC algorithm presentation in ICIP 2016
PDF
InVID verification application presentation at SMVW16
PDF
InVID platform presentation at SMVW16
InVID at IFCN Global Fact V
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID project and verification technologies
Presentation of the InVID verification technologies at IPTC 2018
IUT-Toulouse-InVID-2018
A state of the art in journalism about fake image and video detection
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID Verification Plugin
Overview of the InVID project
Second issue of the InVID newsletter
The InVID Plug-in: Web Video Verification on the Browser
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at DisinfoLab
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
InVID at the IPTC Autumn Meeting 2016
ELLA LC algorithm presentation in ICIP 2016
InVID verification application presentation at SMVW16
InVID platform presentation at SMVW16

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Presentation of the InVID tools for image forensics analysis

  • 1. Detecting malicious tampering in digital images Markos Zampoglou - markzampoglou@iti.gr Information Technologies Institute (ITI) Centre for Research and Technology Hellas (CERTH) Workshop on Tools for Video Discovery & Verification in Social Media Dec 14, 2017 @ Thessaloniki, Greece
  • 2. Image forgeries in the news https://www.snopes.com/photos/animals/puertorico.asp
  • 3. Image forgeries in the news http://www.imperfectedblog.com/2015/11/crimes-of-retouching-and-the- importance-of-community/
  • 4. Image forgeries in the news https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile- too-many/
  • 5. The promise of image forensics
  • 6. Image verification: tools of the trade • Metadata analysis • Photoshop? Dates/locations? Copyrights? • Reverse image search • Content analysis / tampering localization
  • 7. Tampering localization algorithms Splicing localization Copy-move detection Block matching Keypoint matching High-frequency noise CFA patterns JPEG compression traces Filtering and analysis Camera- specific (PRNU) Quantization artefacts Compression grid misalignment JPEG ghosts, ELA
  • 8. REVEAL Media Verification Assistant (1/2) http://reveal-mklab.iti.gr/ • REVEAL (FP7, 2013-2016) • Second round of testing as part of InVID • Collaboration between CERTH and DW • Features: • Metadata: listing, GPS geolocation, EXIF thumbnails • Reverse image search: Google Images integration • Tampering detection: Eight state-of-the-art algorithms • Aims: • a comprehensive, self-contained verification toolset • an evaluation framework for verification tools and protocols
  • 9. REVEAL Media Verification Assistant (2/2) Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R., & Spangenberg, J. (2016, April). Web and Social Media Image Forensics for News Professionals. In SMN@ ICWSM.
  • 10. Comparison of verification tools FotoForensics1 Forensically2 Ghiro3 REVEAL4 ELA X X X X Ghost X DW Noise X Median Noise X X Block Artifact X Double Quantization X Copy-move X* Thumbnail X X Metadata X X X X Geotagging X X X X Reverse search X 1http://fotoforensics.com 2http://29a.ch/photo-forensics/ 3http://www.imageforensic.org/ 4http://reveal-mklab.iti.gr/reveal/verify.html *Forensically implements a very simple block- matching algorithm with low robustness
  • 11. Further features • Open source1 • Public demo version • Real-world examples of detections and non- detections • Tutorials and algorithm explanations • “Magnifying glass” for examining fine details • Scrolling image/map overlay • Export personalized analysis as PDF 1https://github.com/MKLab-ITI/image-forensics
  • 12. Usage distribution France 401 Netherlands 262 Germany 214 UK 181 US 153 Argentina 96 Egypt 52
  • 13. Current challenges (1/2) • Absence of automatic methods to analyse metadata • High computational requirements • Interpretation of results not always intuitive
  • 14. Current challenges (2/2) • When applied in real-world cases, algorithms perform significantly worse than in research datasets • This could partly be attributed to the effects of Social Media dissemination
  • 15. Identifying Untampered Images (1/2) • Interpreting the results (especially for non- detections) can be an issue Untampered: Tampered: Algorithm: ADQ1 (Lin et al, 2009)
  • 16. Identifying Untampered Images (2/2) • Not all algorithms are created equal • Still, some training is usually necessary Untampered: Tampered: Algorithm: ADQ2 (Bianchi et al, 2011)
  • 17. The pitfalls of image forensics “MH17 – Forensic Analysis of Satellite Images Released by the Russian Ministry of Defence” • A report by Bellingcat1 using ELA to prove that the Russian MoD had forged the images • N. Krawetz: Bellingcat “misinterpreted the results”2 1https://www.bellingcat.com 2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
  • 18. Future steps • Add a tampering probability score • Generate a “merged” tampering heat map • Test new approaches based on deep learning • Keep improving stability, speed, GUI responsiveness
  • 19. Acknowledgements • Dr. Chryssanthi Iakovidou (CAGI algorithm) • Olga Papadopoulou (back-end development) • Lazaros Apostolidis (front-end development) • Dr. Symeon Papadopoulos (Overview & design) • Ruben Bouwmeester, DW (Design and evaluation) • Yiannis Kompatsiaris (Overview)
  • 20. Thank you! http://reveal-mklab.iti.gr/reveal Get in touch! Markos Zampoglou markzampoglou@iti.gr Symeon Papadopoulos papadop@iti.gr
  • 21. References • Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis for forgery localization in JPEG images." In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, pp. 2444-2447. IEEE, 2011. • Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery localization via fine-grained analysis of cfa artifacts." Information Forensics and Security, IEEE Transactions on 7, no. 5 (2012): 1566-1577. • Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and Security, IEEE Transactions on 4, no. 1 (2009): 154-160. • Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A framework for decision fusion in image forensics based on dempster–shafer theory of evidence." Information Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593- 607. • Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine- grained tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition 42, no. 11 (2009): 2492-2501. • Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,” Image and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009. • Zampoglou, Markos, Symeon Papadopoulos, and Yiannis Kompatsiaris. "Detecting image splicing in the wild (WEB)." In Multimedia & Expo Workshops (ICMEW), 2015 IEEE International Conference on, pp. 1-6. IEEE, 2015.
  • 22. Evaluation methodology • Quantitative • Six reference datasets (images + binary masks of tampering = “ground truth”) • Measures capturing the matching between ground truth mask and algorithm output • Comparison of 14 algorithms, “best” six plus a newly proposed one ended up in the tool • Qualitative • Informal feedback has been received by end users • Pertains to both usability and quality of results Zampoglou, M., Papadopoulos, S., & Kompatsiaris, Y. (2017). Large-scale evaluation of splicing localization algorithms for web images. Multimedia Tools and Applications, 76(4), 4801-4834.
  • 23. Quantitative evaluations (1/3) • To assess the performance of the implemented algorithms, we evaluated their performance on a large number of images • Benchmark datasets: • Columbia Uncompressed (Hsu and Chang 2006, “COLUMB”), First Image Forensics Challenge (“CHAL”)1, Fontani et al 2013 (“FON”) • Additional datasets • The Wild Web Dataset (Zampoglou et al, 2015) • The Deutsche Welle Image Forensics Dataset 1http://ifc.recod.ic.unicamp.br/fc
  • 24. Quantitative evaluations (2/3) • Evaluations on benchmark datasets: • Robustness to resaves:
  • 25. Quantitative evaluations (3/3) • Performance on the Wild Web Dataset: • Performance on the Deutsche Welle Image Forensics Dataset: • Successful detection for 2 out of 6 cases (4 out of 12 images) Algorithm DQ GHO BLK ELA DWHF MED Detections (out of 80) 3 12 3 2 3 1 Time (sec) 0.27 6.12 13.40 1.29 122.13 0.54
  • 26. Image verification software: requirements • Easy to use; requires little expertise and training • Integrates easily in established workflows and IT systems • Provides all common functionalities • Metadata analysis • Reverse image search • Tampering localization • Clear, interpretable and transparent output • No “black box” results • Intuitive and simple interface • Allows sharing and archiving of reports and conclusions • Comparable or better results than existing solutions