METHOD FOR GENERATING A SET OF FAKE IMAGES FOR TRAINING A “COPY-MOVE” TYPE FAKE DETECTION SYSTEM УДК 004.056+004.932

Main Article Content

Руслан Николаевич Спирин Email: spirinruslan2002@mail.ru
Рауф Салаватович Насретдинов Email: uniform97@gmail.com

Abstract

In today's world, image forgery is very common. The most common method of falsifying images is «copy-move». The advantage of «copy-move» over other modification methods is that an area from the same image is inserted, that is, it has the same brightness and contrast as other objects. Also, these images can be subject to various post-processing techniques and various manipulations, such as JPEG compression, brightening or straightening, which can reduce traces that make detection difficult. In order to train copy-move counterfeit detection systems or evaluate the quality of their work, special data sets are needed. This paper presents a method for adaptively generating a set of fake images for training a copy-move type forgery detection system based on the BusterNet neural network model [1]. The method of adaptive generation of a set of images proposed in the work demonstrated a high level of quality of the created fakes. During its work, a wide range of pre- and post-processing methods was used, which made it possible to make the generated set resistant to detection by modern neural network methods. Its use will make it possible in the future to effectively carry out further training of new methods for detecting «copy-move» counterfeits.

Downloads

Download data is not yet available.

Article Details

How to Cite
1. Спирин Р. Н., Насретдинов Р. С. METHOD FOR GENERATING A SET OF FAKE IMAGES FOR TRAINING A “COPY-MOVE” TYPE FAKE DETECTION SYSTEM // ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ, 2023. № 11. P. 52-60. URL: http://journal.asu.ru/ptzi/article/view/14202.
Section
Проблемы технического обеспечения информационной безопасности

References

Dong, W. Wang, T. Tan. CASIA Image Tampering Detection Evaluation Database / Dong, Jing et al. “CASIA Image Tampering Detection Evaluation Database.” 2013 IEEE China Summit and International Conference on Signal and Information Processing. 2013. С. 422-426.

D. Tralic, I. Zupancic, S. Grgic, M. Grgic. CoMoFoD — New database for «copy-move» forgery detection / Proceedings ELMAR-2013. 2013. С. 49-54.

Yue Wu, Wael Abd-Almageed, Prem Natarajan “BusterNet: Detecting «copy-move» Image Forgery with Source/Target Localization” / Proceedings of the European Conference on Computer Vision (ECCV). 2018. С. 168-184.

Detectron2. github.com: сайт. URL: https://github.com/facebookresearch/detectron2 (дата обращения: 23.11.2023).

Microsoft COCO: Common Objects in Context arXiv.org: сайт. URL: https://arxiv.org/abs/1405.0312 (дата обращения: 23.11.2023).

Note on the Inception Score. arXiv.org: сайт. URL: https://arxiv.org/abs/1801.01973 (дата обращения: 23.11.2023).

A. Mittal, A. K. Moorthy, A. C. Bovik. No-Reference Image Quality Assessment in the Spatial Domain. / Transactions on Image Processing. 2012. № 21 (12). С. 4695-4708.

B. Schölkopf, A. J. Smola, R. C. Williamson, P. L. Bartlett Multiscale skewed heavy-tailed model for texture analysis. / Neural Computю 2000. № 12 (5) С. 1207– 1245.