A New Face Image Authentication Scheme based on Bicubic Interpolation

Authors

  • Muntadher H. Al-Hadaad Department of Computer Engineering, Al-Iraqia University, Baghdad, Iraq
  • Rasha Thabit Department of Computer Engineering, Al-Iraqia University, Baghdad, Iraq
  • Khamis A. Zidan Vice Rector of Al-Iraqia University for Scientific Affairs, Al-Iraqia University, Baghdad, Iraq

DOI:

https://doi.org/10.58564/IJSER.2.2.2023.68

Keywords:

Bicubic interpolation, Face image manipulation detection, DeepFakes, watermarking image

Abstract

 Nowadays, image manipulation algorithms are increasingly being used even by people who do not have any deep knowledge of technology, and one can easily find an application to manipulate face image for various purposes. After the development of image processing algorithms, the research community highlighted the need to develop a technology that detects image manipulation, but it did not highlight the recovery of the facial region after manipulation localization, which would be very useful in practical applications. In this paper, a new face image modification detection and recovery scheme based on image watermarking and bicubic interpolation algorithm is presented. Several experiments were conducted to evaluate the performance of the proposed scheme, which proved its effectiveness in generating high-quality watermarked images, detecting different types of manipulation, localizing the manipulated blocks in the face region, and restoring the face region with good visual quality. A comparison with the latest detection techniques demonstrates the superiority of the proposed scheme.

References

J. M. Zain and A. R. M. Fauzi, "Medical image watermarking with tamper detection and recovery", in 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, 2006, pp. 3270–3273. DOI: https://doi.org/10.1109/IEMBS.2006.260767

J. M. Zain and A. R. M. Fauzi, "Evaluation of medical image watermarking with tamper detection and recovery (AW-TDR)", in 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, 2007, pp. 5661–5664. DOI: https://doi.org/10.1109/IEMBS.2007.4353631

B. Bitesize, "Deepfakes: what are they and why would i make one", BBC Bitesize Articles, 2019. [Online]. Available: https://www.bbc.co.uk/bitesize/articles/zfkwcqt

J. Kietzmann, L. W. Lee, I. P. McCarthy, and T. C. Kietzmann, "Deepfakes: Trick or treat?", Bus Horiz, vol. 63, no. 2, pp. 135–146, 2020, https://doi.org/10.1016/j.bushor.2019.11.006. DOI: https://doi.org/10.1016/j.bushor.2019.11.006

M. M. Waldrop, "Synthetic media: The real trouble with deepfakes", Knowable Magazine, Mar. 2020, 10.1146/KNOWABLE-031320-1/FEATURE/MEDIA/G-NEURAL-NETWORK-MODEL.SVG. DOI: https://doi.org/10.1146/knowable-031320-1

M. Kulkarni and Mr. R. T. Patil, "Tamper Detection & Recovery in Medical Image with secure data hiding using Reversible watermarking", 2012.

A. M. Almars, "Deepfakes Detection Techniques Using Deep Learning: A Survey", Journal of Computer and Communications, vol. 09, no. 05, 2021, 10.4236/jcc.2021.95003. DOI: https://doi.org/10.4236/jcc.2021.95003

F. Matern, C. Riess, and M. Stamminger, "Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations", in 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), 2019, pp. 83–92. 10.1109/WACVW.2019.00020. DOI: https://doi.org/10.1109/WACVW.2019.00020

S. Fadnavis, "MicroLearn: Framework for machine learning, reconstruction, optimization and microstructure modeling View project Image Interpolation Techniques in Digital Image Processing: An Overview", 2014. [Online]. Available: www.ijera.com

Z. A. Salih, R. Thabit, K. A. Zidan, and B. E. Khoo, "Challenges of Face Image Authentication and Suggested Solutions", in 2022 International Conference on Information Technology Systems and Innovation, ICITSI 2022 - Proceedings, 2022. 10.1109/ICITSI56531.2022.9970797. DOI: https://doi.org/10.1109/ICITSI56531.2022.9970797

H. Li, B. Li, S. Tan, and J. Huang, "Detection of Deep Network Generated Images Using Disparities in Color Components", ArXiv, vol. abs/1808.0, 2018.

R. Thabit and B. E. Khoo, "Medical image authentication using SLT and IWT schemes", Multimed Tools Appl, vol. 76, no. 1, pp. 309–332, Jan. 2017, doi: 10.1007/s11042-015-3055-x. DOI: https://doi.org/10.1007/s11042-015-3055-x

Z. A. Salih, R. Thabit, K. A. Zidan, and B. E. Khoo, "A new face image manipulation reveal scheme based on face detection and image watermarking", in 2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), 2022, pp. 1–6. doi: 10.1109/IICAIET55139.2022.9936838.

R. Thabit and B. E. Khoo, "Capacity improved robust lossless image watermarking", IET Image Process, vol. 8, no. 11, pp. 662–670, Nov. 2014, 10.1049/iet-ipr.2013.0862. DOI: https://doi.org/10.1049/iet-ipr.2013.0862

[13] Z. A. Salih, R. Thabit, K. A. Zidan, “A new manipulation detection and localization scheme for digital face images,” J. Eng. Sci. Technol., vol. 18, no. 2, pp. 1164–1183, 2023, [Online]. Available: https://jestec.taylors.edu.my/Vol 18 Issue 2 April 2023/18_2_21.pdf

S. H. Silva, M. Bethany, A. M. Votto, I. H. Scarff, N. Beebe, and P. Najafirad, "Deepfake forensics analysis: An explainable hierarchical ensemble of weakly supervised models", Forensic Sci Int, vol. 4, p. 100217, 2022, https://doi.org/10.1016/j.fsisyn.2022.100217. DOI: https://doi.org/10.1016/j.fsisyn.2022.100217

S. Kolagati, T. Priyadharshini, and V. Mary Anita Rajam, "Exposing deepfakes using a deep multilayer perceptron – convolutional neural network model", International Journal of Information Management Data Insights, vol. 2, no. 1, p. 100054, 2022, https://doi.org/10.1016/j.jjimei.2021.100054. DOI: https://doi.org/10.1016/j.jjimei.2021.100054

R. Thabit and B. E. Khoo, "Robust reversible watermarking scheme using Slantlet transform matrix", Journal of Systems and Software, vol. 88, no. 1, 2014, 10.1016/j.jss.2013.09.033. DOI: https://doi.org/10.1016/j.jss.2013.09.033

R. Walia, "Zooming Digital Images using Modal Interpolation International Journal of Application or Innovation in Engineering & Management (IJAIEM)", 2013. [Online]. Available: https://www.researchgate.net/publication/274702043

Z. A. Salih, R. Thabit, K. A. Zidan, and B. E. Khoo, "A new face image manipulation reveal scheme based on face detection and image watermarking", in 4th IEEE International Conference on Artificial Intelligence in Engineering and Technology, IICAIET 2022, 2022. 10.1109/IICAIET55139.2022.9936838. DOI: https://doi.org/10.1109/IICAIET55139.2022.9936838

Downloads

Published

2023-06-01

How to Cite

H. Al-Hadaad, M., Thabit, R., & A. Zidan, K. (2023). A New Face Image Authentication Scheme based on Bicubic Interpolation. Al-Iraqia Journal for Scientific Engineering Research, 2(2), 29–36. https://doi.org/10.58564/IJSER.2.2.2023.68

Issue

Section

Articles

Deprecated: json_decode(): Passing null to parameter #1 ($json) of type string is deprecated in /var/www/vhosts/ijser.aliraqia.edu.iq/httpdocs/plugins/generic/citations/CitationsPlugin.inc.php on line 49