尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
VENKAT PROJECTS
Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110
Website: www.venkatjavaprojects.com What‘s app: +91 9966499110
Image Forgery Detection Based on Fusion of Lightweight Deep
Learning Models
ABSTARCT :
Capturing images has been increasingly popular in recent years, owing to the widespread
availability of cameras. Images are essential in our daily lives because they contain a wealth of
information, and it is often required to enhance images to obtain additional information. A
variety of tools are available to improve image quality; nevertheless, they are also frequently
used to falsify images, resulting in the spread of misinformation. This increases the severity and
frequency of image forgeries, which is now a major source of concern. Numerous traditional
techniques have been developed over time to detect image forgeries. In recent years,
convolutional neural networks (CNNs) have received much attention, and CNN has also
influenced the field of image forgery detection. However, most image forgery techniques based
on CNN that exist in the literature are limited to detecting a specific type of forgery (either image
splicing or copy-move). As a result, a technique capable of efficiently and accurately detecting
the presence of unseen forgeries in an image is required. In this paper, we introduce a robust
deep learning based system for identifying image forgeries in the context of double image
compression. The difference between an image’s original and recompressed versions is used to
train our model. The proposed model is lightweight, and its performance demonstrates that it is
faster than state-of-the-art approaches. The experiment results are encouraging, with an overall
validation accuracy of 92.23%.
VENKAT PROJECTS
Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110
Website: www.venkatjavaprojects.com What‘s app: +91 9966499110
EXISTING SYSTEM :
CNNs, which are inspired by the human visual system, are designed to be non-linear
interconnected neurons. They have already demonstrated extraordinary potential in a variety of
computer vision applications, including image segmentation and object detection. They may be
beneficial for a variety of additional purposes, including image forensics. With the various tools
available today, image forgery is fairly simple to do, and because it is extremely dangerous,
detecting it is crucial. When a fragment of an image is moved from one to another, a variety of
artifacts occur due to the images’ disparate origins. While these artifacts may be undetectable to
the naked eye, CNNs may detect their presence in faked images. Due to the fact that the source
of the forged region and the background images are distinct, when we recompress such images,
the forged is enhanced differently due to the compression difference. We use this concept in the
proposed approach by training a CNN-based model to determine if an image is genuine or a fake.
DISADVANTAGES OF EXISTING SYSTEM :
1) Less accuracy
2)low Efficiency
VENKAT PROJECTS
Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110
Website: www.venkatjavaprojects.com What‘s app: +91 9966499110
PROPOSED SYSTEM:
The working of the proposed technique, which has been explained here. We take the forged
image A (images shown in Figure 1b tamper images), and then recompress it; let us call the
recompressed image as Arecompressed (images shown in Figure 1c are recompressed forged
images). Now we take the difference of the original image and the recompressed image, let us
call it Adi f f (images shown in Figure 1e are the difference of Figure 1b,c, respectively). Now
due to the difference in the source of the forged part and the original part of the image, the forged
part gets highlighted in Adi f f (as we can observe in Figure 1d,e, respectively). We train a CNN-
based network to categorize an image as a forged image or a genuine one using Adi f f as our
input features (we label it as a featured image). Figure 2 gives the pictorial view of the overall
working of the proposed method.
ADVANTAGES OF PROPOSED SYSTEM :
1) High accuracy
2)High efficiency
VENKAT PROJECTS
Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110
Website: www.venkatjavaprojects.com What‘s app: +91 9966499110
SYSTEM ARCHITECTURE :
VENKAT PROJECTS
Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110
Website: www.venkatjavaprojects.com What‘s app: +91 9966499110
HARDWARE & SOFTWARE REQUIREMENTS:
HARD REQUIRMENTS :
 System : i3 or above
 Ram : 4GB Ram. 
 Hard disk : 40GB
SOFTWARE REQUIRMENTS :
 Operating system : Windows
 Coding Language : python

More Related Content

More from Venkat Projects

Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Venkat Projects
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
Venkat Projects
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
Venkat Projects
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
Venkat Projects
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
Venkat Projects
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
Venkat Projects
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
Venkat Projects
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
Venkat Projects
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
Venkat Projects
 
4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application
Venkat Projects
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
Venkat Projects
 
benchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediabenchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social media
Venkat Projects
 
trust based video management framework for social multimedia networks
trust based video management framework for social multimedia networkstrust based video management framework for social multimedia networks
trust based video management framework for social multimedia networks
Venkat Projects
 
collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...
Venkat Projects
 
dynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systemsdynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systems
Venkat Projects
 
security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...
Venkat Projects
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
Venkat Projects
 

More from Venkat Projects (20)

Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 
4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
benchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediabenchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social media
 
trust based video management framework for social multimedia networks
trust based video management framework for social multimedia networkstrust based video management framework for social multimedia networks
trust based video management framework for social multimedia networks
 
collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...collaborative content delivery in software defined heterogeneous vehicular ne...
collaborative content delivery in software defined heterogeneous vehicular ne...
 
dynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systemsdynamic network slicing and resource allocation in mobile edge computing systems
dynamic network slicing and resource allocation in mobile edge computing systems
 
security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...security enhanced content sharing in social io t a directed hypergraph based ...
security enhanced content sharing in social io t a directed hypergraph based ...
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
 

Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx

  • 1. VENKAT PROJECTS Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110 Website: www.venkatjavaprojects.com What‘s app: +91 9966499110 Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models ABSTARCT : Capturing images has been increasingly popular in recent years, owing to the widespread availability of cameras. Images are essential in our daily lives because they contain a wealth of information, and it is often required to enhance images to obtain additional information. A variety of tools are available to improve image quality; nevertheless, they are also frequently used to falsify images, resulting in the spread of misinformation. This increases the severity and frequency of image forgeries, which is now a major source of concern. Numerous traditional techniques have been developed over time to detect image forgeries. In recent years, convolutional neural networks (CNNs) have received much attention, and CNN has also influenced the field of image forgery detection. However, most image forgery techniques based on CNN that exist in the literature are limited to detecting a specific type of forgery (either image splicing or copy-move). As a result, a technique capable of efficiently and accurately detecting the presence of unseen forgeries in an image is required. In this paper, we introduce a robust deep learning based system for identifying image forgeries in the context of double image compression. The difference between an image’s original and recompressed versions is used to train our model. The proposed model is lightweight, and its performance demonstrates that it is faster than state-of-the-art approaches. The experiment results are encouraging, with an overall validation accuracy of 92.23%.
  • 2. VENKAT PROJECTS Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110 Website: www.venkatjavaprojects.com What‘s app: +91 9966499110 EXISTING SYSTEM : CNNs, which are inspired by the human visual system, are designed to be non-linear interconnected neurons. They have already demonstrated extraordinary potential in a variety of computer vision applications, including image segmentation and object detection. They may be beneficial for a variety of additional purposes, including image forensics. With the various tools available today, image forgery is fairly simple to do, and because it is extremely dangerous, detecting it is crucial. When a fragment of an image is moved from one to another, a variety of artifacts occur due to the images’ disparate origins. While these artifacts may be undetectable to the naked eye, CNNs may detect their presence in faked images. Due to the fact that the source of the forged region and the background images are distinct, when we recompress such images, the forged is enhanced differently due to the compression difference. We use this concept in the proposed approach by training a CNN-based model to determine if an image is genuine or a fake. DISADVANTAGES OF EXISTING SYSTEM : 1) Less accuracy 2)low Efficiency
  • 3. VENKAT PROJECTS Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110 Website: www.venkatjavaprojects.com What‘s app: +91 9966499110 PROPOSED SYSTEM: The working of the proposed technique, which has been explained here. We take the forged image A (images shown in Figure 1b tamper images), and then recompress it; let us call the recompressed image as Arecompressed (images shown in Figure 1c are recompressed forged images). Now we take the difference of the original image and the recompressed image, let us call it Adi f f (images shown in Figure 1e are the difference of Figure 1b,c, respectively). Now due to the difference in the source of the forged part and the original part of the image, the forged part gets highlighted in Adi f f (as we can observe in Figure 1d,e, respectively). We train a CNN- based network to categorize an image as a forged image or a genuine one using Adi f f as our input features (we label it as a featured image). Figure 2 gives the pictorial view of the overall working of the proposed method. ADVANTAGES OF PROPOSED SYSTEM : 1) High accuracy 2)High efficiency
  • 4. VENKAT PROJECTS Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110 Website: www.venkatjavaprojects.com What‘s app: +91 9966499110 SYSTEM ARCHITECTURE :
  • 5. VENKAT PROJECTS Email:venkatjavaprojects@gmail.com Mobile No: +91 9966499110 Website: www.venkatjavaprojects.com What‘s app: +91 9966499110 HARDWARE & SOFTWARE REQUIREMENTS: HARD REQUIRMENTS :  System : i3 or above  Ram : 4GB Ram.  Hard disk : 40GB SOFTWARE REQUIRMENTS :  Operating system : Windows  Coding Language : python
  翻译: