Vol. 4 No. 3 (2025): July
RESEARCH ARTICLES

Bridging Restoration and Forensics: A Novel Framework for Image Tampering Detection

M N Vinitha Reddy
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
K Thirumalesh
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
P Devraju
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
M Waseem Baig
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
S Mohammed Ali
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India

Published 2025-04-14

Keywords

  • Image forensics,
  • tampering detection,
  • ranking-based localization,
  • image restoration,
  • post-processing robustness

How to Cite

M N Vinitha Reddy, K Thirumalesh, P Devraju, M Waseem Baig, & S Mohammed Ali. (2025). Bridging Restoration and Forensics: A Novel Framework for Image Tampering Detection. International Journal of Computational Learning & Intelligence, 4(3), 513–521. https://doi.org/10.5281/zenodo.15210515

Abstract

With the widespread manipulation of digital images, accurately detecting and localizing tampered regions has become a critical task in image forensics. However, most existing tampering localization methods struggle when images undergo post-processing operations such as compression, which obscure crucial tampering traces. To address this, we propose a ranking-based tampering detection framework that evaluates image authenticity by assigning ranks, calculating distances between images, and identifying possible tampering. Our system processes images by extracting key features and assigning a rank based on specific parameters. The framework then measures the distance between different images, helping determine the extent of modifications and detect potential forgeries. Additionally, to enhance tampering localization, we integrate a restoration module that refines the quality of processed images, improving the detection of altered regions. Unlike conventional methods, our approach not only identifies tampered areas but also assesses the degree of alteration through a structured ranking mechanism. To validate our method, we implemented extensive experiments using a variety of datasets, evaluating the framework’s accuracy in detecting tampered images. The results demonstrate that our approach significantly improves the robustness of tampering detection, particularly under image compression and other post-processing effects. Furthermore, the ranking-based distance calculation method enhances the ability to differentiate between authentic and manipulated images, making our system an effective tool for real-world image forensics applications.

 

References

  1. Babimol, R. F., & Thomas, G. (2012). Image tampering detection and localization: Survey.
  2. Busireddy Seshakagari Haranadha Reddy. (2025). Deep learning-based detection of hair and scalp diseases using CNN and image processing. Milestone Transactions on Medical Technometrics, 3(1), 145–5. https://doi.org/10.5281/zenodo.14965660
  3. Busireddy Seshakagari Haranadha Reddy, Venkatramana, R., & Jayasree, L. (2025). Enhancing apple fruit quality detection with augmented YOLOv3 deep learning algorithm. International Journal of Human Computations & Intelligence, 4(1), 386–396. https://doi.org/10.5281/zenodo.14998944
  4. Chen, X., Li, C., & Feng, Z. (2020). Tampering detection and localization based on sample guidance and individual camera device's CNN features. Expert Systems.
  5. Dong, J., Wang, W., & Tan, T. (2013). A survey of passive image tampering detection. IEEE Transactions on Information Forensics and Security.
  6. Dwaram, J. R., & Madapuri, R. K. (2022). Crop yield forecasting by long short‐term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India. Concurrency and Computation: Practice and Experience, 34(27). https://doi.org/10.1002/cpe.7310
  7. Kamble, S., Yadav, A., & Tripathi, M. (2024). A survey on image tampering detection using CNN. International Research Journal of Modernization in Engineering Technology and Science (IRJMETS).
  8. Kaur, M., & Singh, A. (2022). A comprehensive survey on image authentication for tamper detection. Journal of Multimedia Tools and Applications.
  9. Kumar, S., Singh, P., & Chauhan, R. (2020). Detection and localization of image tampering in digital images with fused features.
  10. Madapuri, R. K., & Senthil Mahesh, P. C. (2017). HBS-CRA: Scaling impact of change request towards fault proneness: Defining a heuristic and biases scale (HBS) of change request artifacts (CRA). Cluster Computing, 22(S5), 11591–11599. https://doi.org/10.1007/s10586-017-1424-0
  11. Verdoliva, L. (2020). Image forgery detection: A survey of recent deep-learning approaches. Journal of Visual Communication and Image Representation. Elsevier.
  12. Wang, Z., Liu, H., & Gao, Y. (2022). Fighting malicious media data: A survey on tampering detection and deepfake detection. IEEE Transactions on Emerging Topics in Computational Intelligence.
  13. Yadav, S., & Vishwakarma, D. (2024). Datasets, clues, and state-of-the-arts for multimedia forensics: An extensive review. arXiv preprint.
  14. Zheng, H., & Farid, H. (2018). A survey on image tampering and its detection in real-world photos. Journal of Visual Communication and Image Representation. Elsevier.
  15. Ahmed, S. T., Kaladevi, A. C., Shankar, A., & Alqahtani, F. (2025). Privacy Enhanced Edge-AI Healthcare Devices Authentication: A Federated Learning Approach. IEEE Transactions on Consumer Electronics.
  16. Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0545-0548). IEEE.
  17. Syed Thouheed Ahmed, S., Sandhya, M., & Shankar, S. (2018, August). ICT’s role in building and understanding indian telemedicine environment: A study. In Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017 (pp. 391-397). Singapore: Springer Singapore.
  18. Sreedhar Kumar, S., Ahmed, S. T., & NishaBhai, V. B. (2019). Type of supervised text classification system for unstructured text comments using probability theory technique. International Journal of Recent Technology and Engineering (IJRTE), 8(10).
  19. Ahmed, S. T., Basha, S. M., Arumugam, S. R., & Kodabagi, M. M. (2021). Pattern Recognition: An Introduction. MileStone Research Publications.