0% found this document useful (0 votes)
15 views11 pages

THRTEEN

The project report titled 'Fake Image Identification Using Convolutional Neural Network' presents a method for detecting fake images using a Convolutional Neural Network (CNN) based on Local Binary Pattern (LBP) feature extraction. The report outlines the motivation, objectives, and methodology for developing a machine learning model to differentiate between real and fake images, addressing the challenges posed by generative adversarial networks (GANs). The project is submitted in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering at Jawaharlal Nehru Technological University Hyderabad.

Uploaded by

alakuntla937
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views11 pages

THRTEEN

The project report titled 'Fake Image Identification Using Convolutional Neural Network' presents a method for detecting fake images using a Convolutional Neural Network (CNN) based on Local Binary Pattern (LBP) feature extraction. The report outlines the motivation, objectives, and methodology for developing a machine learning model to differentiate between real and fake images, addressing the challenges posed by generative adversarial networks (GANs). The project is submitted in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering at Jawaharlal Nehru Technological University Hyderabad.

Uploaded by

alakuntla937
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

FAKE IMAGE IDENTIFICATION USING CONVOLUTIONAL NEURAL NETWORK

A Project Report Submitted to


Jawaharlal Nehru Technological University Hyderabad
In partial fulfillment of the requirements
for the award of the degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

By
Maloth Guna Siddarth 21E11A0520
Alakuntla Anil 21E11A0502
Aleti Ajay Kumar 22E15A0501
Srinagaram Vamshi 21E11A0531

Under the guidance of


MR. G. RAGHAVENDER
Assistant Professor
Department of Computer Science and Engineering

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
An Autonomous Institution
Accredited by NAAC A Grade, Accredited by NBA (UG Programmes: CSE, ECE, EEE &
Mechanical) Approved by AICTE, Affiliated to JNTUH Hyderabad
Ibrahimpatnam -501 510, Hyderabad, Telangana
JUNE 2025

i
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
An Autonomous Institution
Accredited by NAAC A Grade Accredited by NBA (UG Programmes: CSE, ECE, EEE &
Mechanical) Approved by AICTE, Affiliated to JNTUH Hyderabad
Ibrahimpatnam -501 510, Hyderabad, Telangana

Certificate
This is to certify that the Project work ( Phase2) entitled “FAKE
IMAGE IDENTIFICATION USING CONVOLUTIONAL NEURAL NETWORK” is the
bonafide work done
By
Maloth Guna Siddarth 21E11A0520
Alakuntla Anil 21E11A0502
Aleti Ajay Kumar 22E15A0501
Srinagaram Vamshi 21E11A0531

in the Department of Computer Science and Engineering, BHARAT INSTITUTE OF


ENGINEERING AND TECHNOLOGY, Ibrahimpatnam is submitted to Jawaharlal
Nehru Technological University, Hyderabad in partial fulfillment of the requirements
for the award of B.Tech degree in Computer Science and Engineering during 2024-
2025.
Supervisor: Department I/C
Mr.G.Raghavender
Dr.Deepak
Assistant Professor Assosciate Professor
Dept of Computer Science and Engineering Dept of Computer Science and Engineering
BharatInstituteof Engineeringand Technology BharatInstituteof Engineeringand Technology
Ibrahimpatnam–501 510, Hyderabad Ibrahimpatnam– 501 510, Hyderabad

Viva-Voce held on……………………………………………

Internal Examiner External Examiner

ii
ACKNOWLEDGEMENT

The satisfaction that accompanies the successful completion of the task would be put
incomplete without the mention of the people who made it possible, whose constant guidance and
encouragement crown all the efforts with success.

We avail this opportunity to express our deep sense of gratitude and hearty thanks to
Sri CH. Venugopal Reddy, Chairman of BIET, for providing congenial atmosphere and
encouragement.

We would like to thank Prof. G. Kumaraswamy Rao, Former Director & O.S. of DLRL
Ministry of Defence, Sr. Director R&D, BIET, and Dr. V Srinivasa Rao, Dean CSE, for having
provided all the facilities and support.

We would like to thank our Department Incharge Dr. Deepak, for encouragement at
various levels of our Project.

We are thankful to our Project Coordinator Dr. Rama Prakasha Reddy, Assistant
Professor, Computer Science and Engineering for support and cooperation throughout the process
of this project.

We are thankful to our guide Mr. G. Raghavender, Assistant Professor, Computer Science
and Engineering for his sustained inspiring Guidance and cooperation throughout the process of
this project. His wise counsel and suggestions were invaluable.

We express our deep sense of gratitude and thanks to all the Teaching and Non-Teaching
Staff of our college who stood with us during the project and helped us to make it a successful
venture.

We place highest regards to our Parent, our Friends and Well-wishers who helped a lot in
making the report of this project

Maloth Guna Siddarth 21E11A0520


Alakuntla Anil 21E11A0502
Aleti Ajay Kumar 22E15A0501
Srinagaram Vamshi 21E11A0531

iii
Declaration

We hereby declare that this Project work (phase-2) is titled FAKE IMAGE
IDENTIFCATION USING CONVOLUTIONAL NEURAL NETWORK is a
Project work carried out by us, In B.Tech (Computer Science and Engineering)
degree course of Jawaharlal Nehru Technology University Hyderabad,
Hyderabad and has not been submitted to any other course or university for
the award of my degree by me.

Signatures of the Project team members

1.

2.

3.

4.

iv
2024-2025

ABSTRACT

Now-a-days biometric systems are useful in recognizing person’s identity but criminals change
their appearance in behaviour and psychological to deceive recognition system. To overcome from
this problem we are using new technique called Deep Texture Features extraction from images
and then building train machine learning model using CNN (Convolution Neural Networks)
algorithm. This technique refer as LBP Net or NLBP Net as this technique heavily dependent on
features extraction using LBP (Local Binary Pattern) algorithm. In this project we are designing
LBP Based machine learning Convolution Neural Network called LBPNET to detect fake face
images. Here first we will extract LBP from images and then train LBP descriptor images with
Convolution Neural Network to generate training model. Whenever we upload new test image then
that test image will be applied on training model to detect whether test image contains fake image
or non- fake image. Below we can see some details on LBP. Local binary patterns (LBP) is a type
of visual descriptor used for classification in computer vision and is a simple yet very efficient
texture operator which labels the pixels of an image by thresholding the neighborhood of each
pixel and considers the result as a binary number. Due to its discriminative power and
computational simplicity, LBP texture operator has become a popular approach in various
applications. It can be seen as a unifying approach to the traditionally divergent statistical and
structural models of texture analysis. Perhaps the most important property of the LBP operator in
real- world applications is its robustness to monotonic gray-scale changes caused, for example, by
illumination variations. Another important property is its computational The feature vector can now
be processed using the Support vector machine.
KEYWORDS
Convolutional Neural Networks (CNN), Image Forgery, Digital Media Integrity, Image
Classification, Forgery Detection Algorithms, Data Analysis.

v
TABLE OF CONTENT
Contents
Chapter no. Title Page no

Acknowledgements …………………………………………………………………………………………………….. iii

Abstract……………………………………………………………………………………………………………………. v

Table of Contents………………………………………………………………………………………………………….. vi

List of Figures……………………………………………………………………………………………………………… viii

List of Symbols and Abbreviations………………………… …………………………… x

1. Introduction……………………………………………………………………………………………………………………. 1

1.1 Literature Survey………………………………………….…………………………………………………………….. 2

1.2 Modules……………………………………………………………………………………………………………. 3

2. System Analysis……………………………………………………………………………………... 6

2.1 Existing System & its Disadvantages: ……………………………………………… 6

2.2 Proposed System & it’s Advantages….……………………………………………… 7

3. Motivation……………………………………………………………………………………………………………………….. 8

4. Objectives…………………………………………………………………………………......................................... 9

4.1 Feasibility Study……………………………………………………………………………………………………... 9

5. Problem Statement…………………………………………………………………………………........................................... 11

6. Design Methodology…..……………………………………………………………….……………………………………..… 12

6.1.1 UML Diagram…………………………………………………………………………………………………..… 12

6.1.2 System Architecture……………………………………………………………………………….…………. 13

6.2.1 Class Diagram……………………………………………………………………………………………………. 14

6.2.2 Collaboration Diagram……………………………………………………………………………..………… 14

6.2.3 Sequence Diagram…………………………………………………………………………………………….. 15

vi
6.2.4 Use Case Diagram…………………………………………………………………………………………... . 15

6.3 Requirements Specification…………………………………………………………………………….. 16

6.4 System Design with Algorithm……………………………………………………………………….... 16

6.5 System Modules…………………………………………………………………………………………….. 19

7. Experimental Studies……………………………………………………………………………………………………… 24
27
7.1 Test Cases…………………………………………………………………………………………………………
28
7.2 Result Analysis………………………………………………………………………………………………….
30
8. Conclusion and Future Scope………………………………………………………………………………………….
33
9. Reference………………………………………………………………………………………………………………………. 35

vii
LIST OF FIGURES

Figure Caption Page No.


No.

6.1.1 UML Diagram……………………………………………………………………………..………… 12

6.1.2 System Architecture……………………………………… …..…………………………..………………… 14

6.2.1 Class Diagram……………………………………………………………….………………………... 20

6.2.2 Collaboration Diagram………………………………………………………………………… 21

6.2.3 Sequence Diagram…………………………………………………… 22

6.2.4 Use Case Diagram………………………………………………………. 24

7.2 Result Analysis for Fake Image Identification using CNN………………… 27

8.1 Convolution neural network………………………………………………. 30

8.2 Image training and model Testing interface…………………………… … 31

8.3 Upload Test image……………………………………………………… 32

8.4 Test image selection……………………………………………………… 32

8.5 Image selection for detection……………………………………………... 33

8.6 Classification of real or fake image………………………………………… 33

8.7 Real time detection of test image………………………………………….. 34

viii
LIST OF TABLES

Table .No Caption Page No.

7.1 Test cases for image identification……… 26

ix
LIST OF SYMBOLS AND ABBREVATIONS

Symbol Description

CNN Convolutional Neural Network

AI Artificial Intelligence

ML Machine Learning

ID Integrated Development

IP Internet Protocol

SR Software Requirement

SVM Support Vector Machine

UML Unified Modelling Language


DFD Data Flow

x
2024-2025

1. INTRODUCTION

Recently, the generative model based on deep learning such as the generative adversarial
net (GAN) is widely used to synthesize the photo-realistic partial or whole content of the image
and video. Furthermore, recent research of GANs such as progressive growth of GANs
(PGGAN)[1] and Big GAN could be used to synthesize a highly photo-realistic image or video
so that the human cannot 20 recognize whether the image is fake or not in the limited time.
In general, the generative applications can be used to perform the image translation tasks
[3]. However, it may lead to a serious problem once the fake or synthesized image is improperly
used on social network or platform. For instance, cycle GAN is used to synthesize the fake face
image in a pornography video [4]. Furthermore, GANs may be used to create a speech video with
the synthesized facial content of any famous politician, causing severe problems on the society,
political, and commercial activities. Therefore, an effective fake face image detection technique
is desired. In this paper, we have extended our previous study associated with paper ID #1062 to
effectively and efficiently address these issues.

In traditional image forgery detection approach, two types of forensics scheme are widely used:
active schemes and passive schemes. With the active schemes, the externally additive signal (i.e.,
watermark) will be embedded in the source image without visual artifacts. In order to identify
whether the image has tampered or not, the watermark extraction process will be performed on the
target image to restore the watermark [6]. The extracted watermark image can be used to localize
or detect the tampered regions in the target image. However, there is no "source image" for the
generated images by GANs such that the active image forgery detector cannot be used to extract
the watermark image. The second one-passive image forgery detector–uses the statistical
information in the source image that will be highly consistency be information can be used to detect
the fake region in the image. In addition, such a supervised learning strategy will tend to learn the
discriminative features for a fake image generated by each GANs. In this situation, the learned
detector may not be effective for the fake image generated by another new GAN excluded in the
training phase. In order to meet the massive requirement of the fake image detection for GANs-
based generator, we propose novel network architecture with a pairwise learning approach, called
common fake feature network (CFFN). Based on our previous approach, it is clear that the pairwise
learning approach can overcome the shortcomings of the supervised learning-based CNN such as
methods in [9][10].
1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy