STFD / README.md
Zegkim's picture
Update README.md
3d51aed verified
---
license: cc-by-4.0
---
# STFD Dataset
This folder contains the **STFD (Screenshot Text Forgery Dataset)** used in the paper:
**Learning to Locate the Text Forgery in Smartphone Screenshots**
Zeqin Yu, Bin Li, Yuzhen Lin, Jinhua Zeng, Jishen Zeng
ICASSP 2023
Project page: https://github.com/ZeqinYu/STFL-Net
STFD is designed for **text image forgery localization (T-IFL)** in smartphone screenshots.
The dataset contains tampered screenshots and their corresponding **pixel-level forgery masks**.
---
## Dataset Structure
```
STFD/
├── 1_Copy-move/
│ ├── tamper/ # tampered screenshots
│ └── masks/ # binary forgery masks
├── 2_Splicing/
│ ├── tamper/
│ └── masks/
├── 3_Removal/
│ ├── tamper/
│ └── masks/
├── 4_Insertion/
│ ├── tamper/
│ └── masks/
└── 5_Replacement/
├── tamper/
└── masks/
```
Each image in `tamper/` has a corresponding mask with the **same filename** in `masks/`.
Example:
```
tamper/ffa3cedd4317633601c6fb82d94fc783.png
masks/ffa3cedd4317633601c6fb82d94fc783.png
```
The mask is a **binary image**, where:
* **0** = non-tampered region
* **255** = tampered region
---
## Tampering Types
STFD contains five common screenshot text manipulation operations:
1. **Copy-Move**: copy a text region and paste it to another location within the same image.
2. **Splicing**: paste text regions from another image into the target image.
3. **Removal**: remove existing text and fill the region using inpainting.
4. **Insertion**: insert new text content into blank regions.
5. **Replacement**: replace original text with newly generated text.
---
### Screenshot Sources
The screenshots were captured from real devices to reflect realistic usage scenarios.
| Category | Description |
|----------|-------------|
| Systems | Android, HarmonyOS, iOS, Windows |
| Scenes | Chat, Social Media, Mobile Payment, E-commerce, Online Banking, Maps & Transportation, Web Browsing, System Interfaces, Documents|
| Devices | Realme Q3 Pro, Oppo Reno1, Honor 9, Honor V30, Vivo X21s, Samsung Note20 Ultra, Vivo X60, Honor 30-1, Xiaomi 9, Honor V20, Nova 8, OnePlus 9, Huawei Mate30, Honor 30-2, Honor 20 Pro, iPhone 7, iPad Air 3, iPad 2020, iPhone 12, iPhone XS, iPhone 11, iPhone SE2, iPhone 14 Pro, MacBook Air 2015, MacBook Pro 2017, Win10 Dell Optiplex 7080, Win11 Xiaomi Air14, Win10 Xiaomi Air14 |
| Format | PNG / JPEG |
---
## Citation
If you use this dataset in your research, please cite:
```bibtex
@inproceedings{yu2023learning,
title = {Learning to Locate the Text Forgery in Smartphone Screenshots},
author = {Yu, Zeqin and Li, Bin and Lin, Yuzhen and Zeng, Jinhua and Zeng, Jishen},
booktitle = {ICASSP 2023–2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
pages = {1--5},
year = {2023},
organization = {IEEE}
}
```
## License and Notice
* This dataset is released for **academic research purposes only**.
* All images are collected from **real-world scenarios** and have been manually screened to remove sensitive information.
* If you believe that any image may contain unintended information leakage, please notify us so that we can remove it promptly. We kindly ask users **not to redistribute such images**.
* For any concerns, please contact: **Zeqin Yu ([kimjyu@foxmail.com](mailto:kimjyu@foxmail.com))**.