skip to main content

Classification of Real and Fake Images Using Error Level Analysis Technique and MobileNetV2 Architecture

Department of Informatics, Indonesia

Received: 15 May 2025; Revised: 26 May 2025; Accepted: 28 May 2025; Available online: 28 May 2025; Published: 31 May 2025.
Editor(s): Ferda Ernawan
Open Access Copyright (c) 2025 The authors. Published by Department of Informatics Universitas, Diponegoro
Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Citation Format:
Abstract

Advancements in technology have made image forgery increasingly difficult to detect, raising the risk of misinformation on social media. To address this issue, Error Level Analysis (ELA) feature extraction can be utilized to detect error level variations in lossy-formatted images such as JPEG. This study evaluates the contribution of ELA features in classifying authentic and forged images using the MobileNetV2 model. Two scenarios were tested using the CASIA 2.0 dataset: without ELA and with ELA. Fine-tuning was performed to adapt the model to the new problem. Experimental results show that incorporating ELA improves model accuracy up to 93.1%, compared to only 76.41% in the scenario without ELA. Validation using k-fold cross-validation yielded a high average f1-score of 96.83%, confirming the effectiveness of ELA in enhancing the classification performance of authentic and forged images.

Fulltext View|Download
Keywords: classification;error level analysis;mobilenetv2;fine tuning;k-fold cross validation;pretrained model

Article Metrics:

  1. A. Passarella, “A survey on content-centric technologies for the current Internet: CDN and P2P solutions,” Comput. Commun., vol. 35, no. 1, pp. 1–32, Jan. 2012, doi: 10.1016/j.comcom.2011.10.005
  2. M. Zanardelli, F. Guerrini, R. Leonardi, and N. Adami, “Image forgery detection: a survey of recent deep-learning approaches,” Multimed. Tools Appl., vol. 82, no. 12, pp. 17521–17566, May 2023, doi: 10.1007/s11042-022-13797-w
  3. S. J. Nightingale, K. A. Wade, and D. G. Watson, “Can people identify original and manipulated photos of real-world scenes?,” Cogn. Res. Princ. Implic., vol. 2, no. 1, p. 30, Dec. 2017, doi: 10.1186/s41235-017-0067-2
  4. M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen, “MobileNetV2: Inverted Residuals and Linear Bottlenecks,” Mar. 21, 2019, arXiv: arXiv:1801.04381. doi: 10.48550/arXiv.1801.04381
  5. R. R. Choudhary, S. Paliwal, and G. Meena, “Image Forgery Detection System using VGG16 UNET Model,” Procedia Comput. Sci., vol. 235, pp. 735–744, 2024, doi: 10.1016/j.procs.2024.04.070
  6. Y. Rao and J. Ni, “A deep learning approach to detection of splicing and copy-move forgeries in images,” in 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates: IEEE, Dec. 2016, pp. 1–6. doi: 10.1109/WIFS.2016.7823911
  7. N. S. A. Alsandi, “Image Splicing Detection Scheme Using Surf and Mean-LBP Based Morphological Operations,” Sci. J. Univ. Zakho, vol. 9, no. 4, pp. 178–183, Dec. 2021, doi: 10.25271/sjuoz.2021.9.4.866
  8. Thadomal Shahani Engineering College, India, N. K Hebbar, A. S Kunte, and Thadomal Shahani Engineering College, India, “TRANSFER LEARNING APPROACH FOR SPLICING AND COPY-MOVE IMAGE TAMPERING DETECTION,” ICTACT J. Image Video Process., vol. 11, no. 4, pp. 2447–2452, May 2021, doi: 10.21917/ijivp.2021.0348
  9. S. Shikalgar, R. K. Yadav, and P. N. Mahalle, “Lightweight MobileNet Model for Image Tempering Detection,” Int. J. Recent Innov. Trends Comput. Commun., vol. 11, no. 5, pp. 55–69, May 2023, doi: 10.17762/ijritcc.v11i5.6524
  10. H. Phan-Xuan, T. Le-Tien, T. Nguyen-Chinh, T. Do-Tieu, Q. Nguyen-Van, and T. Nguyen-Thanh, “Preserving Spatial Information to Enhance Performance of Image Forgery Classification,” in 2019 International Conference on Advanced Technologies for Communications (ATC), Hanoi, Vietnam: IEEE, Oct. 2019, pp. 50–55. doi: 10.1109/ATC.2019.8924504
  11. L. Zheng, Y. Zhang, and V. L. L. Thing, “A survey on image tampering and its detection in real-world photos,” J. Vis. Commun. Image Represent., vol. 58, pp. 380–399, Jan. 2019, doi: 10.1016/j.jvcir.2018.12.022
  12. Tian-Tsong Ng, Shih-Fu Chang, and Qibin Sun, “Blind detection of photomontage using higher order statistics,” in 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), Vancouver, BC, Canada: IEEE, 2004, p. V-688-V–691. doi: 10.1109/ISCAS.2004.1329901
  13. C. Jia, M. Long, and Y. Liu, “Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network,” Comput. Secur., vol. 137, p. 103640, Feb. 2024, doi: 10.1016/j.cose.2023.103640
  14. N. A. N. Azhan, R. A. Ikuesan, S. A. Razak, and V. R. Kebande, “Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis,” Electronics, vol. 11, no. 9, p. 1468, May 2022, doi: 10.3390/electronics11091468
  15. J. Dong, W. Wang, and T. Tan, “CASIA Image Tampering Detection Evaluation Database,” in 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China: IEEE, Jul. 2013, pp. 422–426. doi: 10.1109/ChinaSIP.2013.6625374

Last update:

No citation recorded.

Last update: 2025-05-30 23:20:21

No citation recorded.