1
|
Nagm AM, Moussa MM, Shoitan R, Ali A, Mashhour M, Salama AS, AbdulWakel HI. Detecting image manipulation with ELA-CNN integration: a powerful framework for authenticity verification. PeerJ Comput Sci 2024; 10:e2205. [PMID: 39145198 PMCID: PMC11323046 DOI: 10.7717/peerj-cs.2205] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/28/2024] [Accepted: 06/26/2024] [Indexed: 08/16/2024]
Abstract
The exponential progress of image editing software has contributed to a rapid rise in the production of fake images. Consequently, various techniques and approaches have been developed to detect manipulated images. These methods aim to discern between genuine and altered images, effectively combating the proliferation of deceptive visual content. However, additional advancements are necessary to enhance their accuracy and precision. Therefore, this research proposes an image forgery algorithm that integrates error level analysis (ELA) and a convolutional neural network (CNN) to detect the manipulation. The system primarily focuses on detecting copy-move and splicing forgeries in images. The input image is fed to the ELA algorithm to identify regions within the image that have different compression levels. Afterward, the created ELA images are used as input to train the proposed CNN model. The CNN model is constructed from two consecutive convolution layers, followed by one max pooling layer and two dense layers. Two dropout layers are inserted between the layers to improve model generalization. The experiments are applied to the CASIA 2 dataset, and the simulation results show that the proposed algorithm demonstrates remarkable performance metrics, including a training accuracy of 99.05%, testing accuracy of 94.14%, precision of 94.1%, and recall of 94.07%. Notably, it outperforms state-of-the-art techniques in both accuracy and precision.
Collapse
Affiliation(s)
- Ahmad M. Nagm
- Department of Computer Engineering and Electronics, Cairo Higher Institute for Engineering, Computer Science and Management, Cairo, Egypt
| | - Mona M. Moussa
- Computer and Systems Department, Electronics Research Institute, Cairo, Egypt
| | - Rasha Shoitan
- Computer and Systems Department, Electronics Research Institute, Cairo, Egypt
| | - Ahmed Ali
- Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia
- Computer Science, Higher Future Institute for Specialized Technological Studies, Cairo, Egypt
| | - Mohamed Mashhour
- Department of Computer Engineering and Electronics, Cairo Higher Institute for Engineering, Computer Science and Management, Cairo, Egypt
- Computer Science Department, Faculty of Computers and Information, Minia University, Minia, Egypt
| | - Ahmed S. Salama
- Department of Computer Engineering and Electronics, Cairo Higher Institute for Engineering, Computer Science and Management, Cairo, Egypt
- Electrical Engineering Department, Faculty of Engineering & Technology, Future University in Egypt, New Cairo, Egypt
| | - Hamada I. AbdulWakel
- Computer Science Department, Faculty of Computers and Information, Minia University, Minia, Egypt
| |
Collapse
|
2
|
Das SK, Rahman MZ. A secured compression technique based on encoding for sharing electronic patient data in slow-speed networks. Heliyon 2022; 8:e10788. [PMID: 36203895 PMCID: PMC9529588 DOI: 10.1016/j.heliyon.2022.e10788] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2021] [Revised: 02/18/2022] [Accepted: 09/22/2022] [Indexed: 11/25/2022] Open
|