Image Tampering Detection
Image Tampering Detection
2
Overview
3
Methodology
4
Libraries and Tools
5
ELA Conversion
1. Purpose of ELA
2. Conversion Process
I. Open Original Image
II. Resave Image
III. Calculate Differences
3. Scaling the ELA Image
I. Extract Extremes
II. Max Difference
III. Brightness Adjustment
4. Output 6
Image Preparation
1. Target Size
2. ELA Conversion
3. Pixel Value Scaling
4. Convert to Array
5. Returns a normalized, flattened ELA image
6. Significance
7
Dataset Preparation
9
CNN Architecture
10
CNN Model Training
history = model.fit(datagen.flow(X_train, Y_train, batch_size=32),
epochs=30,
validation_data=(X_val, Y_val))
model.save("CNN_model.keras")
● Accuracy: 85.68%
● Precision for Tampered: 0.89
● Recall for Tampered: 0.81
● F1-score for Tampered: 0.85
● Precision for Authentic: 0.83
● Recall for Authentic: 0.91
● F1-score for Authentic: 0.87
11
Random Forest Model
1. Flattening: Converts img to 1D, Dataset to 2D
2. Model Initialization:
rf_model = RandomForestClassifier
(n_estimators=300, random_state=42)
3. Model training: rf_model.fit(X_train_flat, Y_train)
● Accuracy: 84.74%
● Precision for Tampered: 0.85
● Recall for Tampered: 0.83
● F1-score for Tampered: 0.84
● Precision for Authentic: 0.84
● Recall for Authentic: 0.86
● F1-score for Authentic: 0.85
12
Results Visualization
13
Results Visualization
14
Conclusion
1. Effective Detection
2. Dual Approach
3. Image Quality Analysis
4. Model Performance
5. Visualization Tools
6. Real-World Application
15
Limitations
1. Dataset Diversity
2. Computational Resources
3. Overfitting Risk
4. Limited Interpretation
5. Dependency on ELA
6. Class Imbalance
16
Future Scope
1. Enhancing Dataset
2. Transfer Learning
3. Real-time Implementation
4. Multi-class Classification
5. Cross-modal Analysis
17
References
[1] https://www.researchgate.net/figure/Fig-Convolutional-Neural-Network-2-Web-portal-for-feeding-
input-biopsy-images-and_fig2_362911026
[2] https://www.researchgate.net/figure/Random-forest-Architecture_fig3_353593737
18
Thank You
Everyone
Feel free to ask any questions or seek clarification.
We welcome your inquiries about the Image
Tampering Detection project.
19