File size: 4,292 Bytes
3d51aed 16e49af 17fca3d b658072 c8539bd 17fca3d 1ca68f1 17fca3d 1ca68f1 17fca3d 1ca68f1 17fca3d 1ca68f1 17fca3d 3d51aed 1e36881 3d51aed | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | ---
license: cc-by-4.0
---
# STFD Dataset
This folder contains the **STFD (Screenshot Text Forgery Dataset)** used in the paper:
**Learning to Locate the Text Forgery in Smartphone Screenshots**
Zeqin Yu, Bin Li, Yuzhen Lin, Jinhua Zeng, Jishen Zeng
ICASSP 2023
Project page: https://github.com/ZeqinYu/STFL-Net
STFD is designed for **text image forgery localization (T-IFL)** in smartphone screenshots.
The dataset contains tampered screenshots and their corresponding **pixel-level forgery masks**.
---
### Screenshot Sources
The screenshots were captured from real devices to reflect realistic usage scenarios.
| Category | Description |
|----------|-------------|
| Systems | Android, HarmonyOS, iOS, Windows |
| Scenes | Chat, Social Media, Mobile Payment, E-commerce, Online Banking, Maps & Transportation, Web Browsing, System Interfaces, Documents|
| Devices | Realme Q3 Pro, Oppo Reno1, Honor 9, Honor V30, Vivo X21s, Samsung Note20 Ultra, Vivo X60, Honor 30-1, Xiaomi 9, Honor V20, Nova 8, OnePlus 9, Huawei Mate30, Honor 30-2, Honor 20 Pro, iPhone 7, iPad Air 3, iPad 2020, iPhone 12, iPhone XS, iPhone 11, iPhone SE2, iPhone 14 Pro, MacBook Air 2015, MacBook Pro 2017, Win10 Dell Optiplex 7080, Win11 Xiaomi Air14, Win10 Xiaomi Air14 |
| Format | PNG / JPEG |
|Tampering Types| Copy-Move, Splicing, Removal, Insertion, Replacement |
### Tampering Examples
#### Copy-Move
Copy a text region and paste it to another location within the same image.
| Example1 | Example2 |
|---|---|
| <img src="0ba51385ddc8ade89a53f4b5881abf9b.png" width="100%"> | <img src="fe591d44ebe6f6fb7d5558cd2b655e49.png" width="100%"> |
#### Splicing
Paste text regions from another image into the target image.
| Example1 | Example2 |
|---|---|
| <img src="fcb556cba9a4ca85ed41a96ded1fa198.png" width="100%"> | <img src="c67e92a92e8bb4aa95541d6359f5e18e.png" width="100%"> |
#### Removal
Remove existing text and fill the region using inpainting.
| Example1 | Example2 |
|---|---|
| <img src="e8439b9e91077c3e2a1a549dd0fdaa07.png" width="100%"> | <img src="fc539af84b2ff19904f18b457c6856e6.png" width="100%"> |
#### Insertion
Insert new text content into blank regions.
| Example1 | Example2 |
|---|---|
| <img src="b9e25cfd9889269c1d60e10dda4539df.png" width="100%"> | <img src="e871a802328f0bbbf445fab592a319b1.png" width="100%"> |
#### Replacement
Replace original text with newly generated text.
| Example1 | Example2 |
|---|---|
| <img src="a0f61f66a5ebe69526b79f6f2b6879ed.png" width="100%"> | <img src="1d7b444730be83cb2f0c2aae0a78c315.png" width="100%"> |
---
## Dataset Structure
```
STFD/
├── 1_Copy-move/
│ ├── tamper/ # tampered screenshots
│ └── masks/ # binary forgery masks
├── 2_Splicing/
│ ├── tamper/
│ └── masks/
├── 3_Removal/
│ ├── tamper/
│ └── masks/
├── 4_Insertion/
│ ├── tamper/
│ └── masks/
└── 5_Replacement/
├── tamper/
└── masks/
```
Each image in `tamper/` has a corresponding mask with the **same filename** in `masks/`.
Example:
```
tamper/ffa3cedd4317633601c6fb82d94fc783.png
masks/ffa3cedd4317633601c6fb82d94fc783.png
```
The mask is a **binary image**, where:
* **0** = non-tampered region
* **255** = tampered region
---
## Citation
If you use this dataset in your research, please cite:
```bibtex
@inproceedings{yu2023learning,
title = {Learning to Locate the Text Forgery in Smartphone Screenshots},
author = {Yu, Zeqin and Li, Bin and Lin, Yuzhen and Zeng, Jinhua and Zeng, Jishen},
booktitle = {ICASSP 2023–2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
pages = {1--5},
year = {2023},
organization = {IEEE}
}
```
## License and Notice
* This dataset is released for **academic research purposes only**.
* All images are collected from **real-world scenarios** and have been manually screened to remove sensitive information.
* If you believe that any image may contain unintended information leakage, please notify us so that we can remove it promptly. We kindly ask users **not to redistribute such images**.
* For any concerns, please contact: **Zeqin Yu ([kimjyu@foxmail.com](mailto:kimjyu@foxmail.com))**.
|