Image Forgery Detection Using Attention-Aware Hierarchical-Feature Fusion Module Approach
Keywords:
Image forgery detection, Attention-aware Hierarchical-feature Fusion Module, Deep learning techniques.Abstract
Image forgery detection is a crucial task in digital forensics, aiming to identify manipulated or tampered images. Traditional approaches commonly use handcrafted features, which struggle to effectively capture complex patterns of forgeries. Deep learning techniques have shown promise in this domain, but leveraging hierarchical features while dynamically attending to relevant information remains a challenge. The Attention-aware Hierarchical-feature Fusion Module (AHFM) is proposed to address this issue. The module uses attention mechanisms to selectively fuse hierarchical features extracted from different levels of a convolutional neural network (CNN), enhancing the discriminative power of the network for forgery detection tasks. Experimental results show the AHFM achieves state-of-the-art performance in accuracy and robustness against various forgery techniques. Qualitative analyses provide insights into the interpretability and efficacy of the attention mechanism in identifying forged regions within images. We conduct experiments on a typical dataset of CASIA v1.0 and v2.0 fabricated images, both before and after processing, to illustrate the theoretical concept of the suggested method. Furthermore, we relate the results to those of contemporary methods in order to demonstrate our superior detection rates.
Downloads
References
Bunk, Jason & Bappy, Jawadul & Mohammed, Tajuddin Manhar & Nataraj, Lakshmanan & Flenner, Arjuna & Manjunath, B. & Chandrasekaran, Shivkumar & Roy-Chowdhury, Amit & Peterson, Lawrence. (2017). Detection and Localization of Image Forgeries using Resampling Features and Deep Learning.
Narasimha, Vadthe, and M. Dhanalakshmi. "Risk Factor of Diabetes with Comorbidity Using Machine Learning Techniques." ICCCE 2021: Proceedings of the 4th International Conference on Communications and Cyber Physical Engineering. Singapore: Springer Nature Singapore, 2022.
Muhammad, Ghulam & Al-Hammadi, Muneer & Hussain, Muhammad & Bebis, George. (2014). Image Forgery Detection Using Steerable Pyramid Transform and Local Binary Pattern. Machine Vision and Applications. 25. 985-995. 10.1007/s00138-013-0547-4.
Sabeena, M & Abraham, Lizy & Varghese, Anju. (2021). Digital Image Forgery Detection Using Local Binary Pattern (LBP) and Harlick Transform with classification. 1-6. 10.1109/IPRECON52453. 2021. 9640976.
C. Chen, J. Ni, and J. Huang, "Blind detection of median filtering in digital images: A difference domain-based approach," IEEE Transactions on Image Processing, vol. 22, pp. 4699-4710, 2013.
X. Lin, J.-H. Li, S.-L. Wang, A.-W.-C. Liew, F. Cheng, and X.-S. Huang, "Recent Advances in Passive Digital Image Security Forensics: A Brief Review," Engineering, 2018/02/17/ 2018.
M. D. Ansari, S. P. Ghrera, and V. Tyagi, "Pixel-based image forgery detection: A review," IETE journal of education, vol. 55, pp. 40-46, 2014.
Du PJ, Xia JS, Zhang W, Tan K, Liu Y, Liu SC. Multiple classifier system for remote sensing image classification: A review. Sensors 2012; 12: 4764–4792. https://doi.org/10.3390/s120404764 PMID: 22666057
Zhu S, Sun X, Jin D. Multi-view semi-supervised learning for image classification. Neurocomputing 2016; 208: 136–142.
Fernando B, Fromont E, Tuytelaars T. Mining mid-level features for image classification. Int J Comput Vis. 2014; 108: 186–203.
Mehrjardi, Fatemeh & Latif, Alimohammad & Zarchi, Mohsen. (2023). Copy-Move Forgery Detection and Localization Using Deep Learning. International Journal of Pattern Recognition and Artificial Intelligence. 37. 10.1142/S0218001423520122.
Koshy, Litty & PraylaShyry, S.. (2024). YOLO-FORGERY: Forgery Detection in images via Deep Clifford gradient-based YOLOv4 Network. Signal, Image and Video Processing. 1-9. 10.1007/s11760-023-02854-y.
Archana, M. & Biradar, Deepak & Dayanand, J.. (2023). Image forgery detection in forensic science using optimization based deep learning models. Multimedia Tools and Applications. 1-22. 10.1007/s11042-023-17316-3.
Kalluvilayil Venugopalan, Akash & Gopakumar, Gopalakrishna Pillai. (2023). Keypoint-Based Detection and Region Growing-Based Localization of Copy-Move Forgery in Digital Images. 513-524. 10.1007/978-981-19-7867-8_41.
Zhang, Yulan & Zhu, Guopu & Wang, Xing & Luo, Xiangyang & Zhou, Yicong & Zhang, Hongli & Wu, Ligang. (2022). CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/Target Distinguishment. IEEE Transactions on Circuits and Systems for Video Technology. PP. 1-1. 10.1109/TCSVT.2022.3220630.
Elaskily, Mohamed & Alkinani, Haider & Sedik, Ahmed & Dessouky, Mohamed. (2021). Deep learning based algorithm (ConvLSTM) for Copy Move Forgery Detection. Journal of Intelligent & Fuzzy Systems. 40. 4385-4405. 10.3233/JIFS-201192..
Dong, Jing & Wang, Wei & Tan, Tieniu. (2013). CASIA Image Tampering Detection Evaluation Database. 422-426. 10.1109/ChinaSIP.2013.6625374.
Yuan GL, Xue MG, Han YS, Zhou PC. Mean shift object tracking based on adaptive multi-features fusion, J Comput Res Develop. 2010; 47: 1663–1671.
Wu Y, Li L. Sample normalization methods in quantitative metabolomics. J Chromatography A. 2016; 1430: 80–95.
Narasimha, Vadthe, and Dr M. Dhanalakshmi. "Detection and severity identification of Covid-19 in chest X-ray images using deep learning." International Journal of Electrical and Electronics Research 10.2 (2022): 364-369.
Narasimha, Vadthe, and M. Dhanalakshmi. "Identification and Characterization of Effects on Levels of COVID-19 and Diabetes Types using Machine Learning Approaches.".
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


