Deep learning methods and advancements in digital image forensics ; Méthodes et avancement d’apprentissage profond en criminalistique des images

Saved in:
Bibliographic Details
Title: Deep learning methods and advancements in digital image forensics ; Méthodes et avancement d’apprentissage profond en criminalistique des images
Authors: Berthet, Alexandre
Contributors: Eurecom Sophia Antipolis, Sorbonne Université, Jean-Luc Dugelay
Source: https://theses.hal.science/tel-03859790 ; Computer Aided Engineering. Sorbonne Université, 2022. English. ⟨NNT : 2022SORUS252⟩.
Publisher Information: CCSD
Publication Year: 2022
Subject Terms: AI-based compression, Camera recognition, Digital image forensics, Contre-Criminalistique, Protocoles d'Évaluation, Compression basée sur l'Intelligence Artificielle, Reconnaissance de Caméras, Criminalistique des Images, [INFO.INFO-IA]Computer Science [cs]/Computer Aided Engineering
Description: The volume of digital visual data is increasing dramatically year after year. At the same time, image editing has become easier and more precise. Malicious modifications are therefore more accessible. Image forensics provides solutions to ensure the authenticity of digital visual data. Recognition of the source camera and detection of falsified images are among the main tasks. At first, the solutions were classical methods based on the artifacts produced during the creation of a digital image. Then, as in other areas of image processing, the methods moved to deep learning. First, we present a state-of-the-art survey of deep learning methods for image forensics. Our state-of-the-art survey highlights the need to apply pre-processing modules to extract artifacts hidden by image content. We also highlight the problems concerning image recognition evaluation protocols. Furthermore, we address counter-forensics and present compression based on artificial intelligence, which could be considered as an attack. In a second step, this thesis details three progressive evaluation protocols that address camera recognition problems. The final protocol, which is more reliable and reproducible, highlights the impossibility of state-of-the-art methods to recognize cameras in a challenging context. In a third step, we study the impact of compression based on artificial intelligence on two tasks analyzing compression artifacts: tamper detection and social network recognition. The performances obtained show on the one hand that this compression must be taken into account as an attack, but that it leads to a more important decrease than other manipulations for an equivalent image degradation. ; Le volume de données visuelles numériques augmente considérablement d'année en années. En parallèle, l’édition d'images est devenue plus facile et plus précise. Les modifications malveillantes sont donc plus accessibles. La criminalistique des images fournit des solutions pour garantir l’authenticité des données visuelles numériques. Tout ...
Document Type: doctoral or postdoctoral thesis
Language: English
Relation: NNT: 2022SORUS252
Availability: https://theses.hal.science/tel-03859790
https://theses.hal.science/tel-03859790v1/document
https://theses.hal.science/tel-03859790v1/file/BERTHET_Alexandre_these_2022.pdf
Rights: info:eu-repo/semantics/OpenAccess
Accession Number: edsbas.6F1A5BFD
Database: BASE
Description
Abstract:The volume of digital visual data is increasing dramatically year after year. At the same time, image editing has become easier and more precise. Malicious modifications are therefore more accessible. Image forensics provides solutions to ensure the authenticity of digital visual data. Recognition of the source camera and detection of falsified images are among the main tasks. At first, the solutions were classical methods based on the artifacts produced during the creation of a digital image. Then, as in other areas of image processing, the methods moved to deep learning. First, we present a state-of-the-art survey of deep learning methods for image forensics. Our state-of-the-art survey highlights the need to apply pre-processing modules to extract artifacts hidden by image content. We also highlight the problems concerning image recognition evaluation protocols. Furthermore, we address counter-forensics and present compression based on artificial intelligence, which could be considered as an attack. In a second step, this thesis details three progressive evaluation protocols that address camera recognition problems. The final protocol, which is more reliable and reproducible, highlights the impossibility of state-of-the-art methods to recognize cameras in a challenging context. In a third step, we study the impact of compression based on artificial intelligence on two tasks analyzing compression artifacts: tamper detection and social network recognition. The performances obtained show on the one hand that this compression must be taken into account as an attack, but that it leads to a more important decrease than other manipulations for an equivalent image degradation. ; Le volume de données visuelles numériques augmente considérablement d'année en années. En parallèle, l’édition d'images est devenue plus facile et plus précise. Les modifications malveillantes sont donc plus accessibles. La criminalistique des images fournit des solutions pour garantir l’authenticité des données visuelles numériques. Tout ...