Nothing Special   »   [go: up one dir, main page]

Skip to main content

Enhancing Image Forensics with Transformer: A Multi-head Attention Approach for Robust Metadata Analysis

  • Conference paper
  • First Online:
Proceedings of Trends in Electronics and Health Informatics (TEHI 2023)

Abstract

Nowadays, vast images are generated daily as we capture, transfer, and receive them in various sectors. Images have become a pivotal component of data in many different industries, contributing to decision-making, documentation, and artistic expression. However, verifying image authenticity has become more complex with the widespread availability of sophisticated software and tools that enable image alteration. As a result, determining whether an image is original or manipulated has become a complex task. In this paper, we propose an enhanced Transformer architecture to classify between original and manipulated images by using their metadata and EXIF data. Two datasets are built to train the framework. Each dataset carries metadata and EXIF data of original and manipulated images, respectively. An augmentation technique has been applied to ensure dataset balance and robustness. The proposed framework uses a parallel multi-head attention mechanism, which speeds up convergence throughout the training process and results in more efficient model learning. This versatile proposed framework can perform on different image formats such as JPG/JPEG, PNG, and BMP, highlighting its adaptability and real-world applicability. This framework has achieved 96.42% accuracy, showing its potentiality and capability to distinguish between original and manipulated images in this digital age.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Canon camera features (2023). https://www.canon.co.za/pro/infobank/all-about-exif/. Accessed: 05 Aug 2023

  2. Sheykhmousa Mohammadreza, Mahdianpari Masoud, Ghanbari Hamid, Mohammadimanesh Fariba, Ghamisi Pedram, Homayouni Saeid (2020) Support vector machine versus random forest for remote sensing image classification: a meta-analysis and systematic review. IEEE J Sel Top Appl Earth Obs Remote Sens 13:6308–6325

    Article  Google Scholar 

  3. Bammey Q, Nikoukhah T, Gardella M, Grompone von Gioi R, Colom M, Morel J-M (2022) Non-semantic evaluation of image forensics tools: methodology and database. In: Proceedings of the IEEE/CVF winter conference on applications of computer vision, pp 3751–3760

    Google Scholar 

  4. Chen S, Sun P, Song Y, Luo P (2023) Diffusiondet: diffusion model for object detection. In: Proceedings of the IEEE/CVF international conference on computer vision, pp 19830–19843

    Google Scholar 

  5. Mo Yujian, Yan Wu, Yang Xinneng, Liu Feilin, Liao Yujun (2022) Review the state-of-the-art technologies of semantic segmentation based on deep learning. Neurocomputing 493:626–646

    Article  Google Scholar 

  6. Zhai M, Chen L, Tung F, He J, Nawhal M, Mori G, Gan L (2019) Continual learning for conditional image generation. In: Proceedings of the IEEE/CVF international conference on computer vision, pp 2759–2768

    Google Scholar 

  7. Pranto MAM, Asad NA, Palash MIA, Mohaiminul Islam AKM, Shamim Kaiser M (2022) Covid-19 chest x-ray classification with augmented gan. In: Proceedings of international conference on fourth industrial revolution and beyond. Springer, Berlin, pp 125–139

    Google Scholar 

  8. Asad NAl, Pranto MAM, Afreen S, Islam MM (2019) Depression detection by analyzing social media posts of user. In: 2019 IEEE international conference on signal processing, information, communication and systems (SPICSCON). IEEE, pp 13–17

    Google Scholar 

  9. Pranto MAM, Asad NA (2021) A comprehensive model to monitor mental health based on federated learning and deep learning. In: 2021 IEEE international conference on signal processing, information, communication systems (SPICSCON). IEEE, pp 18–21

    Google Scholar 

  10. Chen Xinying, Cong Peimin, Lv Shuo (2022) A long-text classification method of Chinese news based on Bert and CNN. IEEE Access 10:34046–34057

    Article  Google Scholar 

  11. Klimova B, Pikhart M, Delorme Benites A, Lehr C, Sanchez-Stockhammer C (2023) Neural machine translation in foreign language teaching and learning: a systematic review. Educ Inf Technol 28(1):663–682

    Google Scholar 

  12. Du X, Scanlon M (2019) Methodology for the automated metadata-based classification of incriminating digital forensic artefacts. In: Proceedings of the 14th international conference on availability, reliability and security, pp 1–8

    Google Scholar 

  13. van Baar RB, van Beek HMA, Van Eijk EJ (2014) Digital forensics as a service: a game changer. Digital Invest 11:S54–S62

    Google Scholar 

  14. Shichkina YA, Tishchenko VT, Fatkieva RR (2020) Synthesis of the method of operative image analysis based on metadata and methods of searching for embedded images. In: 2020 9th Mediterranean conference on embedded computing (MECO). IEEE

    Google Scholar 

  15. Bedi P, Mittal A, Gangwar M, Dua A (2020) Identifying forged images using image metadata. In: Proceedings of ICETIT 2019: emerging trends in information technology. Springer, Berlin, pp 1071–1081

    Google Scholar 

  16. Gangwar DP, Pathania A (2018) Authentication of digital image using exif metadata and decoding properties. Int J Sci Res Comput Sci Eng Inf Technol (IJSR CSEIT) 3(8):335–341

    Google Scholar 

  17. Ghosh P, Morariu V, B-Chun IS, Davis L et al (2017) Detection of metadata tampering through discrepancy between image content and metadata using multi-task deep learning. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 60–68

    Google Scholar 

  18. Padilha R, Salem T, Workman S, Andaló FA, Rocha A, Jacobs N (2022) Content-aware detection of temporal metadata manipulation. IEEE Trans Inf Forensics Secur 17:1316–1327

    Google Scholar 

  19. Madake J, Meshram J, Mondhe A, Mashalkar P (2023) Image tampering detection using error level analysis and metadata analysis. In: 2023 4th international conference for emerging technology (INCET). IEEE, pp 1–7

    Google Scholar 

  20. Fan J, Cao H, Kot AC (2013) Estimating exif parameters based on noise features for image manipulation detection. IEEE Trans Inf Forensics Secur 8(4):608–618

    Google Scholar 

  21. Mohammad RM (2018) A neural network based digital forensics classification, 2018 IEEE. In: ACS 15th international conference on computer systems and applications (AICCSA), Aqaba

    Google Scholar 

  22. Chen B-C, Davis LS (2019) Deep representation learning for metadata verification. In: 2019 IEEE winter applications of computer vision workshops (WACVW). IEEE, pp 73–82

    Google Scholar 

  23. Kaggle dataset (2023) https://www.kaggle.com/datasets/merveakdogan/real-vs-fake-turkey-earthquake?rvi=1. Accessed: 21 Aug 2023

  24. Kaggle dataset (2023) https://www.kaggle.com/datasets/muhammadarslanajmal/mango-pests. Accessed: 21 Aug 2023

  25. Kaggle dataset (2023) https://www.kaggle.com/datasets/yaswanthgali/sport-celebrity-image-classification?rvi=1. Accessed: 21 Aug 2023

  26. Coumbia image splicing detection evaluation dataset (2023). https://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/Auth SplicedDataSet.htm. Accessed: 01 Jan 2023

  27. Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, pp 422–426

    Google Scholar 

  28. Novozamsky A, Mahdian B, Saic S (2020) Imd2020: a large-scale annotated dataset tailored for detecting manipulated images. In: Proceedings of the IEEE/CVF winter conference on applications of computer vision workshops, pp 71–80

    Google Scholar 

  29. Jia S, Huang M, Zhou Z, Ju Y, Cai J, Lyu S (2023) Autosplice: a text-prompt manipulated image dataset for media forensics. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 893–903

    Google Scholar 

  30. Kaggle meta and exif data: Original and manipulated images. https://www.kaggle.com/datasets/mdappelmahmudpranto/meta-and-exif-data-original-and-manipulated-images

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Appel Mahmud Pranto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Appel Mahmud Pranto, M., Asad, N.A., Yousuf, M.A., Uddin, M.N., Moni, M.A. (2025). Enhancing Image Forensics with Transformer: A Multi-head Attention Approach for Robust Metadata Analysis. In: Mahmud, M., Kaiser, M.S., Bandyopadhyay, A., Ray, K., Al Mamun, S. (eds) Proceedings of Trends in Electronics and Health Informatics. TEHI 2023. Lecture Notes in Networks and Systems, vol 1034. Springer, Singapore. https://doi.org/10.1007/978-981-97-3937-0_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-3937-0_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-3936-3

  • Online ISBN: 978-981-97-3937-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics