Fake-image detection with Robust Hashing

  title={Fake-image detection with Robust Hashing},
  author={Miki Tanaka and Hitoshi Kiya},
  journal={2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech)},
  • Miki Tanaka, H. Kiya
  • Published 2021
  • Computer Science
  • 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech)
In this paper, we investigate whether robust hashing has a possibility to robustly detect fake-images even when multiple manipulation techniques such as JPEG compression are applied to images for the first time. In an experiment, the proposed fake detection with robust hashing is demonstrated to outperform state-of-the-art one under the use of various datasets including fake images generated with GANs. 

Figures and Tables from this paper

A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain
Property of checkerboard artifacts in CNN-generated images are considered, and the spectrum of images is enhanced in accordance with the properties, and an ensemble of the proposed detector with emphasized spectrums and a conventional detector is proposed to improve the performance of these methods. Expand


Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images
In the case that images are shared via social networking services (SNS) and cloud photo storage services (CPSS), it is known that the JPEG images uploaded to the services are mostly re-compressed byExpand
Robust Image Hashing Based on Selective Quaternion Invariance
A quaternion invariance based hashing algorithm that can fuse complementary visual features to compact hash and an information theoretic based metric for feature quality assessment and a greedy strategy to select the optimal subset of features for hash computation are proposed. Expand
Exposing Deep Fakes Using Inconsistent Head Poses
  • X. Yang, Yuezun Li, Siwei Lyu
  • Computer Science
  • ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
  • 2019
This paper proposes a new method to expose AI-generated fake face images or videos based on the observations that Deep Fakes are created by splicing synthesized face region into the original image, and in doing so, introducing errors that can be revealed when 3D head poses are estimated from the face images. Expand
CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
A novel CycleGAN without any checkerboard artifacts for counter-forensics of fake-mage detection methods for the first time is proposed, as an example of GANs without checkerboards. Expand
Fighting Fake News: Image Splice Detection via Learned Self-Consistency
A learning algorithm for detecting visual image manipulations that is trained only using a large dataset of real photographs to determine whether an image is self-consistent — that is, whether its content could have been produced by a single imaging pipeline. Expand
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images
A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit the imagesExpand
Fragile Watermarking Based on Encoding of the Zeroes of the $z$-Transform
The newly proposed scheme is more secure than normal least-significant bits-based fragile watermarking techniques and can localize the portions of a watermarked image that have been tampered with with high accuracy. Expand
A deep learning approach to detection of splicing and copy-move forgeries in images
  • Y. Rao, J. Ni
  • Computer Science
  • 2016 IEEE International Workshop on Information Forensics and Security (WIFS)
  • 2016
A new image forgery detection method based on deep learning technique, which utilizes a convolutional neural network to automatically learn hierarchical representations from the input RGB color images to outperforms some state-of-the-art methods. Expand
Determining Image Origin and Integrity Using Sensor Noise
A unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformity noise (PRNU), which is a unique stochastic fingerprint of imaging sensors is provided. Expand
Learning Rich Features for Image Manipulation Detection
A two-stream Faster R-CNN network is proposed and trained end-to-end to detect the tampered regions given a manipulated image and fuse features from the two streams through a bilinear pooling layer to further incorporate spatial co-occurrence of these two modalities. Expand