Enriching Fake Colorized Image Detection
Enriching Fake Colorized Image Detection
Key Words: Gaussian Distribution model, Image Features, Convolution neural network.
I.INTRODUCTION
People say that a picture is worth a thousand words, which holds truer than ever, owing to the
digital age and the enormous influx of cameras and Smartphone that are equipped with the latest sensor
hardware. These factors contribute to an exponential growth in the number of photographs. As the number
of images keeps increasing, there is also an influx of an almost equal number of forged images. We live in an
age where anything can be altered or manipulated with assistance from technology. The forged images are
designed with nefarious purposes to discredit the original owner by persons with malicious intents.
Due to a large number of forged images, it is necessary to be able to discern an original image from
the forged ones. The researchers infer that the two most widely used techniques of forgery are Copy-Move
forgery and Image Splicing. The copy-move method is more common in comparison to the Image splicing
technique. With the introduction of innovative image editing applications such as Photoshop, GIMP etc. the
process of forgery has been simplified and introduce modifications discreetly. Therefore, the discovery of
forged images is paramount to maintain the integrity and authenticity of the original image.
Machine Learning imitates human-like response, this is necessary for certain applications where
reasoning is heavily required for the process to be completed. This is usually achieved with the help of
certain computational networks known as neural networks. Machine learning could be fed data about the
types of image forgery techniques, as it learns, with every picture, the algorithm gets faster and a lot more
accurate. Once the relationship in-between all the system components is completely established, the
machine learning algorithm is stopped. Its addition into the forged image detection can be very useful as a
machine would not be biased and a person cannot go through a large set of images efficiently. Machine
learning can help identify the patterns in the image to verify its validity. Application of machine learnin g into
the image forgery speeds up the process and generally out-performs most of the conventional methods.
Colorization of grayscale images is not a complex task for the creative human brain. A person is only
required to recall that grass is green and the sky is blue, for various other objects, the mind is free to
imagine several possible colors. Deep CNN can assist as tools to consolidate localization and semantic
parsing into a colorization system. The researchers have done an extensive study on the image forgery
techniques and their detections and provide us with an exhaustive evaluation of the detection methods
utilized in determining the type of forgery, copy-move, re-sampling, splicing, retouching etc. For the purpose
of identification of fake images, it is imperative that we look for the sources of the
II.LITERATURE REVIEW
J. Li[1] introduces a method of the image with CMF consists of no less than a few areas in which
contents are indistinguishable. CMF maybe conducted by a forger pursuing to enhance the visual effect of
the image or to cover the truth. In this light, the researchers propose to segment the test image into a
number of non-overlapped patches. Therefore, by coinciding these patches CMFD can be executed , as long
Research Paper IJRAR- International Journal of Research and Analytical Reviews 255𝗑
[ VOLUME 6 I ISSUE 2 I APRIL– JUNE 2019] E ISSN 2348 –1269, PRINT ISSN 2349-5138
as the copying source regions and the pasting target does not exist in the same patch. This paper mainly
focuses on the detection of the segment copied from one image into another image for the purpose of faking
an image. Here a source image is needed to identify the forgery. This paper proposed a CMFD strategy
established on image segmentation. The proposed method is very computationally taxing and could be done
in a better way with the integration of parallel processing.
G. Larsson[2] narrates about Colorization of grayscale images. The technique of automatic
colorization transforms two impulsive observations into a design philosophy. Firstly, semantic information
matters. In order to colorize random images, a system must perceive the semantic configuration of the scene
in addition to localizing objects. Deep CNNs can assist as tools to consolidate localization and semantic
parsing into a colorization system. The article presents a system that demonstrates the conventional ability
to automatically color grayscale images. Two innovative offerings enable this development: a color
histogram prediction framework and a deep neural architecture that is trained to integrate semantically
significant features of diverse complexity into colorization.
M.A. Qureshi[3] explores the advent of digital images and their proliferation in this new internet
age. The extensive use of smartphones and cameras has led to an abundance of images which in turn has
increased the probability of persons with mischievous intents to tamper and forge images by leaving very
little or no trace. The researchers have done an extensive study on the image forgery techniques and their
detections and provide us with an exhaustive evaluation of the detection methods utilized in determining
the type of forgery, copy-move, resampling, splicing, retouching etc. The researchers after having done an
extensive evaluation of the techniques have come across an observation that the researchers who have been
actively developing methods and algorithms for tampering detection have not been paying attention to the
research that goes into counter-forensics or anti-forensics. This area of research focuses on the explicit
removal of tampering traces been sought after by these forgery detection methods.
D. Gragnaniello [4] explains that due to the inflation of social media as it turns into a quite powerful
communication tool. Due to the boom of social media, there has been an enormous influx of manipulated
images. This has led to an epidemic and there are researchers that have been trying to combat this problem
with the inclusion of CNN's in their detectors. As recent studies have shown that CNN based detection
methods are vulnerable to attacks. Therefore, to ameliorate this effect the researchers have analyzed the
adversarial attacks done on various different CNN based detection systems and tested their performance
adequately. The study concentrates only on the attacks that take place on a CNN based network, which is
very limiting and have not proposed any remedial systems that can be used in the absence of a CNN based
approach.
Y. Guo [5] introduces the different types of forgeries that can be done on an image and the various
ways that can be used to detect the fakes. But this does not take into account the colorization of grayscale
images. This is difficult to detect as there aren’t many techniques that have been developed for the detection
of fake colorization of the images. Therefore, to detect fake colorized image the authors proposed two
different methods, the first one is the FCID-HIST Histogram based Fake Colorized Image Detection, and the
other one is the FCID-FE which stands for Feature Encoding based Fake Colorized Image Detection. These
techniques have been proven to be better than the traditional detection methods by a big margin. As with
any learning method, most of the detection depends on the kind of training given to the system and is
limited by that perspective, as it cannot detect forgery even when the image is forged, but the system is
limited to its understanding.
III.PROPOSED METHODOLOGY
The proposed idea of finding fake colorized images is depicted in the below proposed methodology
figure 1. And the steps involved in this process are elaborated deeply with the below mentioned steps.
256𝗑 IJRAR- International Journal of Research and Analytical Reviews Research Paper
[VOLUME 6 I ISSUE 2 I APRIL – JUNE 2019] e ISSN 2348 –1269, Print ISSN 2349-5138
http://ijrar.com/ Cosmos Impact Factor 4.236
Step 1: Feature Extraction - This is the very first and very important step of the proposed model.
Here the base features are like Hue, alpha channel and RGB values are extracted from the input image and
process in a list.
To fetch these features proposed system take input to traverse each and every pixel to get a signed integer
(PSIGN) . Then on right shifting 24 bits and then AND one hexadecimal value yields Alpha channel value. Right
shifting 16,8 and 0 bits and then AND one hexadecimal value yields the Red, Green and blue channels
respectively. This can be shown in the equation (1,2,3,4)
Where
PSIGN - A Singed Integer
HEX -Hexadecimal Number
Hue Feature- It indicates the frequency of the light that eventually is represented by a single
variable. Hue can be estimated using the ratio of difference between the other two colors for maximum of
RGB to the difference between max and min.
Histogram feature - The image Intensity is adjusted based on the histogram of the pixels, which can
be evaluated using the equation 5.
Where
PN - Image with N pixels
Step 2: Edge Estimation - If an image is morphed or colorized, then the edges of the objects in the
image are always tend behave out of the natural values. These edges are eventually helping us to identify the
border area of the objects in the image.
Edge Detection is used for this purpose, which works based on the 5 following steps.
i) Smoothing - Here image is blurred using the Gaussian blur technique to widen the edges of the objects in
the image. For this Gaussian distribution technique is used as shown in equation no 6.
Research Paper IJRAR- International Journal of Research and Analytical Reviews 257𝗑
[ VOLUME 6 I ISSUE 2 I APRIL– JUNE 2019] E ISSN 2348 –1269, PRINT ISSN 2349-5138
ii) Finding the gradients- Here the edges with the maximum width is identified.
iii) Non- maximum Suppression - Edges with the maximum width is labeled.
iv) Double Thresholding - Here the edges which are already labeled are doubled by their width.
v) Edge Tracking- Here all the threshold edges are traversed recursively to mark them in white color and
rests of the pixels are marked with the black color.
2
x
1 2 2
f (x | , ) e _________ (6)
2
Step 4: Second Layer of the CNN ( Edge Traversing) - Here in this step once the Edge image pixel
position for white pixel is recorded as I,J. then, with respect to this I and J RGB of the original image is
extracted to evaluate the luminance based on the equation no 6.
258𝗑 IJRAR- International Journal of Research and Analytical Reviews Research Paper
[VOLUME 6 I ISSUE 2 I APRIL – JUNE 2019] e ISSN 2348 –1269, Print ISSN 2349-5138
http://ijrar.com/ Cosmos Impact Factor 4.236
______________(8)
Where
x is the entities of Query image
y is the entities of trained images from database
n is the array Size
Step 6: Fuzzy Classification- Here in this step a correlation array result which is in the range of 0 to
1 is divided into 5 parts with respect to the Fuzzy crisp values. Fuzzy Crisp values are VERY LOW, LOW,
MEDIUM , HIGH AND VERY HIGH.
A fuzzyfier engine is used to classify the value for the fake or original based on the classification
label of crisp values. Any value which is nearer to 1 is rated as thevery highly fake . Where as the any value
which is nearer to 0 is rated as non fake or original.
IV. RESULTS AND DISCUSSIONS
In this section the proposed system of fake image detection using the features like histogram and
CNN, which is boosted using fuzzy classification is subjected to some experiments to evaluate its
performance with comparison of same existed methodology. The proposed model is deployed in real time
scenario using Java programming language and Netbeans as the IDE in Core i5 Environment with the
primary memory of 6GB.
Histogram Equalization Result (HTER)-Proposed model is put under hammer for HTER with the
comparison of the two different methods are used to identify the fake colorized images as FCID-HIST and
FCID - FE[5].
FCID-HIST: Here in this step four features are being extracted from the images like Hue, Saturation,
Dark Channel, and Bright Channel. Once these features are being extracted, then they are aggregated to
normalize the histogram. And then the proposed methodology deploys the features into Support vector
machine (SVM) to get the classification values which are being used to classify the fake colored images.
FCID - FE: Here in this step again four features are being extracted as mentioned in FCID-HIST and
then these features are subject to identify the distribution of data using Gaussian mixture model and
exploring the divergence inside the different moments of the distribution. And finally Gaussian mixture
model is blended with the SVM training Classifier. Where LIBSVM Classification protocol is being used to
identify the Fake images.
Cross Validations are performed on the basis of histogram role to identify the fake images on FCID-
HIST, FCID-FE of [5] and with the proposed model of FCID- CNN on various image folders belong different
categories like sports, nature, sky etc. The table 1 represents the cross validation result between the FCID-
HIST, FCID -FE and FCID-CNN.
Table 1 : HTER Results of Cross Validation in Percentage
On observing the values and the plot in figure 2 and 3 it clearly indicates the fact that FCID -CNN provides
better performance than that of FCID-HIST and FCID-FE. Where average HTER of FCID -HIST is around
18.423%, Average HTER of FCID-FE is around 16.994 % and average FCID-CCN is about 14.47%.
Research Paper IJRAR- International Journal of Research and Analytical Reviews 259𝗑
[ VOLUME 6 I ISSUE 2 I APRIL– JUNE 2019] E ISSN 2348 –1269, PRINT ISSN 2349-5138
Figure 2: HTER Comparisons of Cross Validation between FCID- HIST and FCID-CNN
260𝗑 IJRAR- International Journal of Research and Analytical Reviews Research Paper
[VOLUME 6 I ISSUE 2 I APRIL – JUNE 2019] e ISSN 2348 –1269, Print ISSN 2349-5138
http://ijrar.com/ Cosmos Impact Factor 4.236
VI. REFERENCES
1. J. Li, X. Li, B. Yang,and X. Sun, “Segmentation-Based Image Copy-MoveForgery Detection Scheme,” IEEE Trans.
Inf. Forensics and Security, vol.10, no. 3, pp. 507-518, 2015.
2. G. Larsson, M. Maire,and G. Shakhnarovich, “Learning representations for automatic colorization,” in Proc.
European Conf. Comp. Vision (ECCV), pp. 577-593, 2016.
3. M.A. Qureshi and M. Deriche, “A bibliography of pixel-based blind image forgery detection techniques,” Signal
Process.: Image Communication,vol. 39, pp. 46-74, 2015.
4. Diego Gragnaniello, Francesco Marra, Giovanni Poggi, Luisa Verdoliva, “Analysis of Adversarial Attacks against
CNN-based Image Forgery Detectors”, 26th European Signal Processing Conference. 2018.
5. Y. Guo, X. Cao, W. Zhang,and Rui Wang, “Fake Colorized Image Detection”, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, 2018
6. Y. Zhao, X. Zhang, M. Xu, Z. Sun and G. Liu, “Web Identification Image Recognition Based on Deep Learning”, 3rd
International Conference on Information Science and Control Engineering, 2018.
7. M. Bachtiar, D. Gusti, M. Hidajat and I. Wijaya, “Web-Based Application Development for False Images Detection
for Multi Images Through Demosaicing Detection”, International Conference on Information Management and
Technology, 2018.
8. Tushar D. Gadhiya, Anil K. Roy, Suman K. Mitra,and Vinod Mall, “Use of Discrete Wavelet Transform Method for
Detection and Localization of Tampering in a Digital Medical Image”, IEEE Region 10 Symposium, 2017.
Research Paper IJRAR- International Journal of Research and Analytical Reviews 261𝗑