Abstract

Digital picture fraud detection is an increasing societal necessity due to the importance of verified images. The detection of picture copying, splicing, retouching, and re-sampling forgeries is included. In the absence of digital signatures or watermarks, passive picture authentication may serve as an alternative to active authentication. Passive techniques, every so often recognized as blind techniques, could take place without preceding knowledge of the picture or its reference. Identifying counterfeiting picture or tampering was a research field for long a period of time, triggered via the Internet, online platforms, social messaging platforms, and extensive digital image usage. The rate of failure could be a key factor for examining the alteration of picture or forgery, among other existing methods. The research applies almost six common algorithms related to machine learning in order to extract features from Lightweight, Spatial Exploitation, and Residual deep learning models on benchmark datasets MICC-F220, Columbia, and CoMoFoD. The models of incorporated deep learning could consist of AlexNet, GoogleNet, VGG16, VGG19, SqueezeNet, MobileNetV2, ShuffleNet, ResNet-18, ResNet-50, and ResNet-101 for spatial exploitation. Fine-tuning is applied to the top three deep learning models, optimizing hyperparameters centered on indicators of performance for every single benchmark dataset. Tweaked SqueezeNet, MobileNetV2, and ShuffleNet deep learning models with SGDM Optimizer and SVM classifier yielded the best results for MICC-F220 dataset. Fine-tuned VGG19, MobileNetV2, and ResNet-50 deep learning models with SGDM Optimizer and SVM v classifier yielded the best results for Columbia dataset. In CoMoFoD dataset, fine-tuned AlexNet, MobileNetV2, and ShuffleNet deep learning models with SGDM Optimizer and SVM classifier yielded the best results. The proposed approach, utilizing machine learning algorithms and deep learning features, enhanced forgery detection and reduced false positives. Results were validated on benchmark image forgery datasets and compared to current methods.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call