SlideShare a Scribd company logo
1 of 26
Download to read offline
Detecting malicious tampering in
digital images
Markos Zampoglou - markzampoglou@iti.gr
Information Technologies Institute (ITI)
Centre for Research and Technology Hellas (CERTH)
Workshop on Tools for Video Discovery & Verification in Social Media
Dec 14, 2017 @ Thessaloniki, Greece
Image forgeries in the news
https://www.snopes.com/photos/animals/puertorico.asp
Image forgeries in the news
http://www.imperfectedblog.com/2015/11/crimes-of-retouching-and-the-
importance-of-community/
Image forgeries in the news
https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-
too-many/
The promise of image forensics
Image verification: tools of the trade
• Metadata analysis
• Photoshop? Dates/locations? Copyrights?
• Reverse image search
• Content analysis / tampering localization
Tampering localization algorithms
Splicing
localization
Copy-move
detection
Block
matching
Keypoint
matching
High-frequency
noise
CFA
patterns
JPEG compression
traces
Filtering and
analysis
Camera-
specific (PRNU)
Quantization
artefacts
Compression grid
misalignment
JPEG ghosts,
ELA
REVEAL Media Verification Assistant (1/2)
http://reveal-mklab.iti.gr/
• REVEAL (FP7, 2013-2016)
• Second round of testing as part of InVID
• Collaboration between CERTH and DW
• Features:
• Metadata: listing, GPS geolocation, EXIF thumbnails
• Reverse image search: Google Images integration
• Tampering detection: Eight state-of-the-art algorithms
• Aims:
• a comprehensive, self-contained verification toolset
• an evaluation framework for verification tools and protocols
REVEAL Media Verification Assistant (2/2)
Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R., & Spangenberg, J. (2016, April). Web
and Social Media Image Forensics for News Professionals. In SMN@ ICWSM.
Comparison of verification tools
FotoForensics1 Forensically2 Ghiro3 REVEAL4
ELA X X X X
Ghost X
DW Noise X
Median Noise X X
Block Artifact X
Double Quantization X
Copy-move X*
Thumbnail X X
Metadata X X X X
Geotagging X X X X
Reverse search X
1http://fotoforensics.com
2http://29a.ch/photo-forensics/
3http://www.imageforensic.org/
4http://reveal-mklab.iti.gr/reveal/verify.html
*Forensically implements a very simple block-
matching algorithm with low robustness
Further features
• Open source1
• Public demo version
• Real-world examples of detections and non-
detections
• Tutorials and algorithm explanations
• “Magnifying glass” for examining fine details
• Scrolling image/map overlay
• Export personalized analysis as PDF
1https://github.com/MKLab-ITI/image-forensics
Usage distribution
France 401
Netherlands 262
Germany 214
UK 181
US 153
Argentina 96
Egypt 52
Current challenges (1/2)
• Absence of automatic methods to analyse metadata
• High computational requirements
• Interpretation of results not always intuitive
Current challenges (2/2)
• When applied in real-world cases, algorithms
perform significantly worse than in research
datasets
• This could partly be attributed to the effects of Social
Media dissemination
Identifying Untampered Images (1/2)
• Interpreting the results (especially for non-
detections) can be an issue
Untampered:
Tampered:
Algorithm: ADQ1 (Lin et al, 2009)
Identifying Untampered Images (2/2)
• Not all algorithms are created equal
• Still, some training is usually necessary
Untampered:
Tampered:
Algorithm: ADQ2 (Bianchi et al, 2011)
The pitfalls of image forensics
“MH17 – Forensic Analysis of Satellite Images
Released by the Russian Ministry of Defence”
• A report by Bellingcat1 using ELA to prove that the
Russian MoD had forged the images
• N. Krawetz: Bellingcat “misinterpreted the results”2
1https://www.bellingcat.com
2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
Future steps
• Add a tampering probability score
• Generate a “merged” tampering heat map
• Test new approaches based on deep learning
• Keep improving stability, speed, GUI responsiveness
Acknowledgements
• Dr. Chryssanthi Iakovidou (CAGI algorithm)
• Olga Papadopoulou (back-end development)
• Lazaros Apostolidis (front-end development)
• Dr. Symeon Papadopoulos (Overview & design)
• Ruben Bouwmeester, DW (Design and evaluation)
• Yiannis Kompatsiaris (Overview)
Thank you!
http://reveal-mklab.iti.gr/reveal
Get in touch!
Markos Zampoglou markzampoglou@iti.gr
Symeon Papadopoulos papadop@iti.gr
References
• Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis
for forgery localization in JPEG images." In Acoustics, Speech and Signal Processing
(ICASSP), 2011 IEEE International Conference on, pp. 2444-2447. IEEE, 2011.
• Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery
localization via fine-grained analysis of cfa artifacts." Information Forensics and Security,
IEEE Transactions on 7, no. 5 (2012): 1566-1577.
• Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and
Security, IEEE Transactions on 4, no. 1 (2009): 154-160.
• Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A
framework for decision fusion in image forensics based on dempster–shafer theory of
evidence." Information Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593-
607.
• Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine-
grained tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition
42, no. 11 (2009): 2492-2501.
• Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,”
Image and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009.
• Zampoglou, Markos, Symeon Papadopoulos, and Yiannis Kompatsiaris. "Detecting image
splicing in the wild (WEB)." In Multimedia & Expo Workshops (ICMEW), 2015 IEEE
International Conference on, pp. 1-6. IEEE, 2015.
Evaluation methodology
• Quantitative
• Six reference datasets (images + binary masks of tampering
= “ground truth”)
• Measures capturing the matching between ground truth
mask and algorithm output
• Comparison of 14 algorithms, “best” six plus a newly
proposed one ended up in the tool
• Qualitative
• Informal feedback has been received by end users
• Pertains to both usability and quality of results
Zampoglou, M., Papadopoulos, S., & Kompatsiaris, Y. (2017). Large-scale evaluation of splicing localization
algorithms for web images. Multimedia Tools and Applications, 76(4), 4801-4834.
Quantitative evaluations (1/3)
• To assess the performance of the implemented algorithms,
we evaluated their performance on a large number of
images
• Benchmark datasets:
• Columbia Uncompressed (Hsu and Chang 2006, “COLUMB”), First
Image Forensics Challenge (“CHAL”)1, Fontani et al 2013 (“FON”)
• Additional datasets
• The Wild Web Dataset (Zampoglou et al, 2015)
• The Deutsche Welle Image Forensics Dataset
1http://ifc.recod.ic.unicamp.br/fc
Quantitative evaluations (2/3)
• Evaluations on benchmark datasets:
• Robustness to resaves:
Quantitative evaluations (3/3)
• Performance on the Wild Web Dataset:
• Performance on the Deutsche Welle Image
Forensics Dataset:
• Successful detection for 2 out of 6 cases (4 out of 12
images)
Algorithm DQ GHO BLK ELA DWHF MED
Detections
(out of 80)
3 12 3 2 3 1
Time (sec) 0.27 6.12 13.40 1.29 122.13 0.54
Image verification software:
requirements
• Easy to use; requires little expertise and training
• Integrates easily in established workflows and IT
systems
• Provides all common functionalities
• Metadata analysis
• Reverse image search
• Tampering localization
• Clear, interpretable and transparent output
• No “black box” results
• Intuitive and simple interface
• Allows sharing and archiving of reports and
conclusions
• Comparable or better results than existing solutions

More Related Content

What's hot

Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelAlex Pinto
 
Fuzzing: Challenges and Reflections
Fuzzing: Challenges and ReflectionsFuzzing: Challenges and Reflections
Fuzzing: Challenges and Reflectionsmboehme
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
 
Use Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device FragmentationUse Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device FragmentationJosiah Renaudin
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of FindingsCellebrite
 

What's hot (6)

Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
 
Fuzzing: Challenges and Reflections
Fuzzing: Challenges and ReflectionsFuzzing: Challenges and Reflections
Fuzzing: Challenges and Reflections
 
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
 
Final october interviewing_techniques
Final october interviewing_techniquesFinal october interviewing_techniques
Final october interviewing_techniques
 
Use Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device FragmentationUse Combinatorial Testing for Mobile Device Fragmentation
Use Combinatorial Testing for Mobile Device Fragmentation
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of Findings
 

Similar to Detect digital image tampering with REVEAL forensics tool

Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsSymeon Papadopoulos
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsTELKOMNIKA JOURNAL
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryIRJET Journal
 
Microlearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsMicrolearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsDenis Havlik
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...IRJET Journal
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...IRJET Journal
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionJean-Paul Calbimonte
 
International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011Nicola Louise Beddall-Hill
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...IRJET Journal
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.sandipan paul
 
IRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning TechniquesIRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning TechniquesIRJET Journal
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Computer vision introduction
Computer vision  introduction Computer vision  introduction
Computer vision introduction Wael Badawy
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentationMrsShwetaBanait1
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object DetectionIRJET Journal
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approachesijtsrd
 
6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docxpriestmanmable
 
6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docxblondellchancy
 

Similar to Detect digital image tampering with REVEAL forensics tool (20)

Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic tools
 
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
Microlearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsMicrolearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitons
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
 
International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011International Visual Methods Conference Sept OU 2011
International Visual Methods Conference Sept OU 2011
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.
 
IRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning TechniquesIRJET- A Survey on Object Detection using Deep Learning Techniques
IRJET- A Survey on Object Detection using Deep Learning Techniques
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Computer vision introduction
Computer vision  introduction Computer vision  introduction
Computer vision introduction
 
Object tracking final
Object tracking finalObject tracking final
Object tracking final
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentation
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object Detection
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
 
6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx
 
6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx6950SafeAssign Originality ReportDigital Fore.docx
6950SafeAssign Originality ReportDigital Fore.docx
 

More from InVID Project

InVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID Project
 
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...InVID Project
 
Presentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesPresentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesInVID Project
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018InVID Project
 
IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018InVID Project
 
A state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionA state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionInVID Project
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationInVID Project
 
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...InVID Project
 
Presentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginPresentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginInVID Project
 
Overview of the InVID project
Overview of the InVID projectOverview of the InVID project
Overview of the InVID projectInVID Project
 
Second issue of the InVID newsletter
Second issue of the InVID newsletterSecond issue of the InVID newsletter
Second issue of the InVID newsletterInVID Project
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserInVID Project
 
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
Video Retrieval for Multimedia Verification  of Breaking News on Social NetworksVideo Retrieval for Multimedia Verification  of Breaking News on Social Networks
Video Retrieval for Multimedia Verification of Breaking News on Social NetworksInVID Project
 
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoThe InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoInVID Project
 
The InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabThe InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabInVID Project
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...InVID Project
 
InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID Project
 
ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016InVID Project
 
InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID Project
 
InVID platform presentation at SMVW16
InVID platform presentation at SMVW16InVID platform presentation at SMVW16
InVID platform presentation at SMVW16InVID Project
 

More from InVID Project (20)

InVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID at IFCN Global Fact V
InVID at IFCN Global Fact V
 
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
 
Presentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesPresentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologies
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
 
IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018
 
A state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionA state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detection
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verification
 
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
 
Presentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginPresentation of the InVID Verification Plugin
Presentation of the InVID Verification Plugin
 
Overview of the InVID project
Overview of the InVID projectOverview of the InVID project
Overview of the InVID project
 
Second issue of the InVID newsletter
Second issue of the InVID newsletterSecond issue of the InVID newsletter
Second issue of the InVID newsletter
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the Browser
 
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
Video Retrieval for Multimedia Verification  of Breaking News on Social NetworksVideo Retrieval for Multimedia Verification  of Breaking News on Social Networks
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
 
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoThe InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
 
The InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabThe InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLab
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
 
InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016
 
ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016
 
InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16
 
InVID platform presentation at SMVW16
InVID platform presentation at SMVW16InVID platform presentation at SMVW16
InVID platform presentation at SMVW16
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

Detect digital image tampering with REVEAL forensics tool

  • 1. Detecting malicious tampering in digital images Markos Zampoglou - markzampoglou@iti.gr Information Technologies Institute (ITI) Centre for Research and Technology Hellas (CERTH) Workshop on Tools for Video Discovery & Verification in Social Media Dec 14, 2017 @ Thessaloniki, Greece
  • 2. Image forgeries in the news https://www.snopes.com/photos/animals/puertorico.asp
  • 3. Image forgeries in the news http://www.imperfectedblog.com/2015/11/crimes-of-retouching-and-the- importance-of-community/
  • 4. Image forgeries in the news https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile- too-many/
  • 5. The promise of image forensics
  • 6. Image verification: tools of the trade • Metadata analysis • Photoshop? Dates/locations? Copyrights? • Reverse image search • Content analysis / tampering localization
  • 7. Tampering localization algorithms Splicing localization Copy-move detection Block matching Keypoint matching High-frequency noise CFA patterns JPEG compression traces Filtering and analysis Camera- specific (PRNU) Quantization artefacts Compression grid misalignment JPEG ghosts, ELA
  • 8. REVEAL Media Verification Assistant (1/2) http://reveal-mklab.iti.gr/ • REVEAL (FP7, 2013-2016) • Second round of testing as part of InVID • Collaboration between CERTH and DW • Features: • Metadata: listing, GPS geolocation, EXIF thumbnails • Reverse image search: Google Images integration • Tampering detection: Eight state-of-the-art algorithms • Aims: • a comprehensive, self-contained verification toolset • an evaluation framework for verification tools and protocols
  • 9. REVEAL Media Verification Assistant (2/2) Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R., & Spangenberg, J. (2016, April). Web and Social Media Image Forensics for News Professionals. In SMN@ ICWSM.
  • 10. Comparison of verification tools FotoForensics1 Forensically2 Ghiro3 REVEAL4 ELA X X X X Ghost X DW Noise X Median Noise X X Block Artifact X Double Quantization X Copy-move X* Thumbnail X X Metadata X X X X Geotagging X X X X Reverse search X 1http://fotoforensics.com 2http://29a.ch/photo-forensics/ 3http://www.imageforensic.org/ 4http://reveal-mklab.iti.gr/reveal/verify.html *Forensically implements a very simple block- matching algorithm with low robustness
  • 11. Further features • Open source1 • Public demo version • Real-world examples of detections and non- detections • Tutorials and algorithm explanations • “Magnifying glass” for examining fine details • Scrolling image/map overlay • Export personalized analysis as PDF 1https://github.com/MKLab-ITI/image-forensics
  • 12. Usage distribution France 401 Netherlands 262 Germany 214 UK 181 US 153 Argentina 96 Egypt 52
  • 13. Current challenges (1/2) • Absence of automatic methods to analyse metadata • High computational requirements • Interpretation of results not always intuitive
  • 14. Current challenges (2/2) • When applied in real-world cases, algorithms perform significantly worse than in research datasets • This could partly be attributed to the effects of Social Media dissemination
  • 15. Identifying Untampered Images (1/2) • Interpreting the results (especially for non- detections) can be an issue Untampered: Tampered: Algorithm: ADQ1 (Lin et al, 2009)
  • 16. Identifying Untampered Images (2/2) • Not all algorithms are created equal • Still, some training is usually necessary Untampered: Tampered: Algorithm: ADQ2 (Bianchi et al, 2011)
  • 17. The pitfalls of image forensics “MH17 – Forensic Analysis of Satellite Images Released by the Russian Ministry of Defence” • A report by Bellingcat1 using ELA to prove that the Russian MoD had forged the images • N. Krawetz: Bellingcat “misinterpreted the results”2 1https://www.bellingcat.com 2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
  • 18. Future steps • Add a tampering probability score • Generate a “merged” tampering heat map • Test new approaches based on deep learning • Keep improving stability, speed, GUI responsiveness
  • 19. Acknowledgements • Dr. Chryssanthi Iakovidou (CAGI algorithm) • Olga Papadopoulou (back-end development) • Lazaros Apostolidis (front-end development) • Dr. Symeon Papadopoulos (Overview & design) • Ruben Bouwmeester, DW (Design and evaluation) • Yiannis Kompatsiaris (Overview)
  • 20. Thank you! http://reveal-mklab.iti.gr/reveal Get in touch! Markos Zampoglou markzampoglou@iti.gr Symeon Papadopoulos papadop@iti.gr
  • 21. References • Bianchi, Tiziano, Alessia De Rosa, and Alessandro Piva. "Improved DCT coefficient analysis for forgery localization in JPEG images." In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, pp. 2444-2447. IEEE, 2011. • Ferrara, Pasquale, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. "Image forgery localization via fine-grained analysis of cfa artifacts." Information Forensics and Security, IEEE Transactions on 7, no. 5 (2012): 1566-1577. • Farid, Hany. "Exposing digital forgeries from JPEG ghosts." Information Forensics and Security, IEEE Transactions on 4, no. 1 (2009): 154-160. • Fontani, Marco, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, and Mauro Barni. "A framework for decision fusion in image forensics based on dempster–shafer theory of evidence." Information Forensics and Security, IEEE Transactions on 8, no. 4 (2013): 593- 607. • Lin, Zhouchen, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. "Fast, automatic and fine- grained tampered JPEG image detection via DCT coefficient analysis." Pattern Recognition 42, no. 11 (2009): 2492-2501. • Mahdian, Babak and Stanislav Saic, “Using noise inconsistencies for blind image forensics,” Image and Vision Computing, vol. 27, no. 10, pp. 1497–1503, 2009. • Zampoglou, Markos, Symeon Papadopoulos, and Yiannis Kompatsiaris. "Detecting image splicing in the wild (WEB)." In Multimedia & Expo Workshops (ICMEW), 2015 IEEE International Conference on, pp. 1-6. IEEE, 2015.
  • 22. Evaluation methodology • Quantitative • Six reference datasets (images + binary masks of tampering = “ground truth”) • Measures capturing the matching between ground truth mask and algorithm output • Comparison of 14 algorithms, “best” six plus a newly proposed one ended up in the tool • Qualitative • Informal feedback has been received by end users • Pertains to both usability and quality of results Zampoglou, M., Papadopoulos, S., & Kompatsiaris, Y. (2017). Large-scale evaluation of splicing localization algorithms for web images. Multimedia Tools and Applications, 76(4), 4801-4834.
  • 23. Quantitative evaluations (1/3) • To assess the performance of the implemented algorithms, we evaluated their performance on a large number of images • Benchmark datasets: • Columbia Uncompressed (Hsu and Chang 2006, “COLUMB”), First Image Forensics Challenge (“CHAL”)1, Fontani et al 2013 (“FON”) • Additional datasets • The Wild Web Dataset (Zampoglou et al, 2015) • The Deutsche Welle Image Forensics Dataset 1http://ifc.recod.ic.unicamp.br/fc
  • 24. Quantitative evaluations (2/3) • Evaluations on benchmark datasets: • Robustness to resaves:
  • 25. Quantitative evaluations (3/3) • Performance on the Wild Web Dataset: • Performance on the Deutsche Welle Image Forensics Dataset: • Successful detection for 2 out of 6 cases (4 out of 12 images) Algorithm DQ GHO BLK ELA DWHF MED Detections (out of 80) 3 12 3 2 3 1 Time (sec) 0.27 6.12 13.40 1.29 122.13 0.54
  • 26. Image verification software: requirements • Easy to use; requires little expertise and training • Integrates easily in established workflows and IT systems • Provides all common functionalities • Metadata analysis • Reverse image search • Tampering localization • Clear, interpretable and transparent output • No “black box” results • Intuitive and simple interface • Allows sharing and archiving of reports and conclusions • Comparable or better results than existing solutions