Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Face image manipulation detection based on a convolutional neural network

Published: 01 September 2019 Publication History

Highlights

Proposing MANFA – a customized CNN model for manipulated face detection.
Integrating XGBoost, and AdaBoost with MANFA to cope with the extreme imbalanced dataset.
Proposing a manually collected dataset (8950 images) for altered face detection.

Abstract

Facial image manipulation is a particular instance of digital image tampering, which is done by compositing a region from one facial image into another facial image. Fake images generated by facial image manipulation now spread like wildfire on news websites and social networks, and are considered the greatest threat to press freedom. Previous research relied heavily on handcrafted features to analyze tampered regions which were inefficient and time-consuming. This paper introduces a framework that accurately detects manipulated face image using deep learning approach. The original contributions of this paper include (1) a customized convolutional neural network model for Manipulated Face (MANFA) identification; it contains several convolutional layers that effectively extract features of multi-levels of abstraction from a tampered region. (2) A hybrid framework (HF-MANFA) that uses Adaptive Boosting (AdaBoost) and eXtreme Gradient Boosting (XGBoost) to deal with the imbalanced dataset challenge. (3) A large manipulated face dataset that is manually collected and validated. The results from various experiments proved that proposed models outperformed existing expert and intelligent systems which were usually used for the manipulated face image detection task in terms of area under the curve (AUC), computational complexity, and robustness against imbalanced datasets. As a result, the presented framework will motivate the finding of a more powerful altered face images detection method and encourages the integration of the proposed model in applications that have to deal with manipulated images regularly.

References

[1]
I. Amerini, T. Uricchio, L. Ballan, R. Caldelli, Localization of jpeg double compression through multi-domain convolutional neural networks, in: Paper presented at the Proc. of IEEE CVPR Workshop on Media Forensics, 2017.
[2]
C.S. Andreassen, T. Torsheim, S. Pallesen, Predictors of use of social network sites at work-a specific type of cyberloafing, Journal of Computer-Mediated Communication 19 (4) (2014) 906–921.
[3]
K. Asghar, Z. Habib, M. Hussain, Copy-move and splicing image forgery detection and localization techniques: A review, Australian Journal of Forensic Sciences 49 (3) (2017) 281–307.
[4]
J.H. Bappy, A.K. Roy-Chowdhury, J. Bunk, L. Nataraj, B. Manjunath, Exploiting spatial structure for localizing manipulated image regions, in: Paper presented at the proceedings of the IEEE international conference on computer vision, 2017.
[5]
M. Barni, L. Bondi, N. Bonettini, P. Bestagini, A. Costanzo, M. Maggini, et al., Aligned and non-aligned double JPEG detection using convolutional neural networks, Journal of Visual Communication and Image Representation 49 (2017) 153–163.
[6]
A.P. Bradley, The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition 30 (7) (1997) 1145–1159.
[7]
J. Chen, Q. Ou, Z. Chi, H. Fu, Smile detection in the wild with deep convolutional neural networks, Machine Vision and Applications 28 (1–2) (2017) 173–183.
[8]
T. Chen, C. Guestrin, Xgboost: A scalable tree boosting system, in: Paper presented at the proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, 2016.
[9]
Chollet, F. (2015). Keras: Deep learning library for theano and tensorflow. https://keras.io/k, 7(8).
[10]
R. Cristin, J.P. Ananth, V.C. Raj, Illumination-based texture descriptor and fruitfly support vector neural network for image forgery detection in face images, IET Image Processing 12 (8) (2018) 1439–1449.
[11]
L.M. Dang, S.I. Hassan, I. Suhyeon, A. kumar Sangaiah, I. Mehmood, S. Rho, et al., UAV based wilt detection system via convolutional neural networks, Sustainable Computing: Informatics and Systems (2018).
[12]
T.J. De Carvalho, C. Riess, E. Angelopoulou, H. Pedrini, A. de Rezende Rocha, Exposing digital image forgeries by illumination color classification, IEEE Transactions on Information Forensics and Security 8 (7) (2013) 1182–1194.
[13]
J. Dong, W. Wang, T. Tan, Casia image tampering detection evaluation database, in: Paper presented at the signal and information processing (ChinaSIP), 2013 IEEE China summit & international conference on, 2013.
[14]
S. Farooq, M.H. Yousaf, F. Hussain, A generic passive image forgery detection scheme using local binary pattern with rich models, Computers & Electrical Engineering 62 (2017) 459–472.
[15]
A. Fernández, S. García, M. Galar, R.C. Prati, B. Krawczyk, F. Herrera, Cost-sensitive learning learning from imbalanced data sets, Springer, 2018, pp. 63–78.
[16]
P. Ferrara, T. Bianchi, A. De Rosa, A. Piva, Image forgery localization via fine-grained analysis of CFA artifacts, IEEE Transactions on Information Forensics and Security 7 (5) (2012) 1566–1577.
[17]
Y. Freund, R.E. Schapire, A decision-theoretic generalization of on-line learning and an application to boosting, Journal of Computer and System Sciences 55 (1) (1997) 119–139.
[18]
J.H. Friedman, Stochastic gradient boosting, Computational Statistics & Data Analysis 38 (4) (2002) 367–378.
[19]
X. Glorot, A. Bordes, Y. Bengio, Deep sparse rectifier neural networks, in: Paper presented at the proceedings of the fourteenth international conference on artificial intelligence and statistics, 2011.
[20]
L. Gu, V. Kropotov, F. Yarochkin, The fake news machine: How propagandists abuse the internet and manipulate the public, pdf] Trend Micro 81 (2017).
[21]
J.-M. Guo, Y.-F. Liu, Z.-J. Wu, Duplication forgery detection using improved DAISY descriptor, Expert Systems with Applications 40 (2) (2013) 707–714.
[22]
H. He, E.A. Garcia, Learning from imbalanced data, IEEE Transactions on Knowledge & Data Engineering 9 (9) (2008) 1263–1284.
[23]
V. Holub, J. Fridrich, Low-complexity features for JPEG steganalysis using undecimated DCT, IEEE Transactions on Information Forensics and Security 10 (2) (2015) 219–228.
[24]
Y. Hu, L. Manikonda, S. Kambhampati, What we Instagram: a first analysis of instagram photo content and user types, in: Paper presented at the ICWSM, 2014.
[25]
V. Kazemi, J. Sullivan, One millisecond face alignment with an ensemble of regression trees, in: Paper presented at the proceedings of the IEEE conference on computer vision and pattern recognition, 2014.
[26]
S.H. Khan, M. Hayat, M. Bennamoun, F.A. Sohel, R. Togneri, Cost-sensitive learning of deep feature representations from imbalanced data, IEEE Transactions on Neural Networks and Learning Systems 29 (8) (2018) 3573–3587.
[27]
T.M. Khoshgoftaar, A. Fazelpour, D.J. Dittman, A. Napolitano, Ensemble vs. data sampling: Which option is best suited to improve classification performance of imbalanced bioinformatics data?, in: Paper presented at the Tools with Artificial Intelligence (ICTAI), 2015 IEEE 27th international conference on, 2015.
[28]
Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv:1412.6980.
[29]
S. Lee, C. Lee, Multiscale morphology based illumination normalization with enhanced local textures for face recognition, Expert Systems with Applications 62 (2016) 347–357.
[30]
C. Lu, H. Ke, G. Zhang, Y. Mei, H. Xu, An improved weighted extreme learning machine for imbalanced data classification, Memetic Computing 11 (1) (2017) 1–8.
[31]
H. Moon, P.J. Phillips, Computational and performance aspects of PCA-based face-recognition algorithms, Perception 30 (3) (2001) 303–321.
[32]
T.-T. Ng, J. Hsu, S.-F. Chang, Columbia image splicing detection evaluation dataset: Apos, 2009.
[33]
T.N. Nguyen, C.H. Thai, H. Nguyen-Xuan, J. Lee, Geometrically nonlinear analysis of functionally graded material plates using an improved moving Kriging meshfree method based on a refined plate theory, Composite Structures 193 (2018) 268–280.
[34]
O.M. Parkhi, A. Vedaldi, A. Zisserman, Deep face recognition, in: Paper presented at the BMVC, 2015.
[35]
B. Peng, W. Wang, J. Dong, T. Tan, Optimized 3D lighting environment estimation for image forgery detection, IEEE Transactions on Information Forensics and Security 12 (2) (2017) 479–494.
[36]
P.J. Phillips, H. Moon, S.A. Rizvi, P.J. Rauss, The FERET evaluation methodology for face-recognition algorithms, IEEE Transactions on Pattern Analysis and Machine Intelligence 22 (10) (2000) 1090–1104.
[37]
S. Ren, B. Liao, W. Zhu, Z. Li, W. Liu, K. Li, The Gradual Resampling Ensemble for mining imbalanced data streams with concept drift, Neurocomputing 286 (2018) 150–166.
[38]
F. Wu, X.-Y. Jing, S. Shan, W. Zuo, J.-Y. Yang, Multiset feature learning for highly imbalanced data classification, in: Paper presented at the AAAI, 2017.
[39]
H. Yao, S. Wang, X. Zhang, C. Qin, J. Wang, Detecting image splicing based on noise level inconsistency, Multimedia Tools and Applications 76 (10) (2017) 12457–12479.
[40]
L. Yu, R. Zhou, L. Tang, R. Chen, A DBN-based resampling SVM ensemble learning paradigm for credit classification with imbalanced data, Applied Soft Computing 69 (2018) 192–202.
[41]
H. Zeng, Y. Zhan, X. Kang, X. Lin, Image splicing localization using PCA-based noise level estimation, Multimedia Tools and Applications 76 (4) (2017) 4783–4799.
[42]
P. Zhou, X. Han, V.I. Morariu, L.S. Davis, Two-stream neural networks for tampered face detection, in: Paper presented at the 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW) IEEE, 2017.

Cited By

View all
  • (2024)Exif2Vec: A Framework to Ascertain Untrustworthy Crowdsourced Images Using MetadataACM Transactions on the Web10.1145/364509418:3(1-27)Online publication date: 13-Feb-2024
  • (2023)Exposing Deepfake Face Forgeries With Guided ResidualsIEEE Transactions on Multimedia10.1109/TMM.2023.323716925(8458-8470)Online publication date: 1-Jan-2023
  • (2022)Detection of AI-Manipulated Fake Faces via Mining Generalized FeaturesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/349902618:4(1-23)Online publication date: 4-Mar-2022
  • Show More Cited By

Index Terms

  1. Face image manipulation detection based on a convolutional neural network
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Expert Systems with Applications: An International Journal
      Expert Systems with Applications: An International Journal  Volume 129, Issue C
      Sep 2019
      311 pages

      Publisher

      Pergamon Press, Inc.

      United States

      Publication History

      Published: 01 September 2019

      Author Tags

      1. Image manipulation
      2. Deep learning
      3. AdaBoost
      4. XGBoost
      5. Imbalanced dataset
      6. Boosting

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 26 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Exif2Vec: A Framework to Ascertain Untrustworthy Crowdsourced Images Using MetadataACM Transactions on the Web10.1145/364509418:3(1-27)Online publication date: 13-Feb-2024
      • (2023)Exposing Deepfake Face Forgeries With Guided ResidualsIEEE Transactions on Multimedia10.1109/TMM.2023.323716925(8458-8470)Online publication date: 1-Jan-2023
      • (2022)Detection of AI-Manipulated Fake Faces via Mining Generalized FeaturesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/349902618:4(1-23)Online publication date: 4-Mar-2022
      • (2022)Countering Malicious DeepFakes: Survey, Battleground, and HorizonInternational Journal of Computer Vision10.1007/s11263-022-01606-8130:7(1678-1734)Online publication date: 1-Jul-2022
      • (2022)Full-convolution Siamese network algorithm under deep learning used in tracking of facial video image in newbornsThe Journal of Supercomputing10.1007/s11227-022-04439-x78:12(14343-14361)Online publication date: 1-Aug-2022

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media