The outbreak of digital devices on the Internet, the exponential diffusion of data (images, video, audio, and text), along with their manipulation/generation also by Artificial Intelligence (AI) models, e.g., Generative Adversarial Networks (GANs), have created a great deal of concern in the field of forensics. A malicious use can affect relevant application domains, which often include counterfeiting biomedical images, and deceiving biometric authentication systems, as well as their use in scientific publications, in the political world, and even in school activities. It has been demonstrated that manipulated pictures most likely represent indications of malicious behavior, such as photos of minors to promote child prostitution or false political statements. Following this widespread behavior, various forensic techniques have been proposed in the scientific literature over time both to defeat these spoofing attacks as well as to guarantee the integrity of the information. Focusing on Image Forensics, which is currently a very hot topic area in Multimedia Forensics, this paper will discuss the whole scenario in which a target image could be modified. The aim of this comprehensive survey will be 1) to provide an overview of the types of attacks and contrasting techniques and 2) to evaluate to what extent the former can deceive prevention methods and the latter can identify counterfeit images. The results of this study highlight how forgery detection techniques, sometimes limited to a single type of real scenario, are not able to provide exhaustive countermeasures and could/should therefore be combined. Currently, the use of neural networks, such as CNNs, is already heading, synergistically, in this direction.

A Comprehensive Survey on Methods for Image Integrity

Capasso, Paola
Investigation
;
Cattaneo, Giuseppe
Investigation
;
De Marsico, Maria
Investigation
2023-01-01

Abstract

The outbreak of digital devices on the Internet, the exponential diffusion of data (images, video, audio, and text), along with their manipulation/generation also by Artificial Intelligence (AI) models, e.g., Generative Adversarial Networks (GANs), have created a great deal of concern in the field of forensics. A malicious use can affect relevant application domains, which often include counterfeiting biomedical images, and deceiving biometric authentication systems, as well as their use in scientific publications, in the political world, and even in school activities. It has been demonstrated that manipulated pictures most likely represent indications of malicious behavior, such as photos of minors to promote child prostitution or false political statements. Following this widespread behavior, various forensic techniques have been proposed in the scientific literature over time both to defeat these spoofing attacks as well as to guarantee the integrity of the information. Focusing on Image Forensics, which is currently a very hot topic area in Multimedia Forensics, this paper will discuss the whole scenario in which a target image could be modified. The aim of this comprehensive survey will be 1) to provide an overview of the types of attacks and contrasting techniques and 2) to evaluate to what extent the former can deceive prevention methods and the latter can identify counterfeit images. The results of this study highlight how forgery detection techniques, sometimes limited to a single type of real scenario, are not able to provide exhaustive countermeasures and could/should therefore be combined. Currently, the use of neural networks, such as CNNs, is already heading, synergistically, in this direction.
File in questo prodotto:
File Dimensione Formato  
3633203.pdf

accesso aperto

Licenza: Creative commons
Dimensione 847.9 kB
Formato Adobe PDF
847.9 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4854160
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact