File size: 21,803 Bytes
cbab20b 9cb64db 0ebcbdf 9cb64db 0ebcbdf 9cb64db 0ebcbdf 9cb64db 0ebcbdf cbab20b 0ebcbdf 9cb64db cbab20b 0ebcbdf 9cb64db 0ebcbdf 9cb64db 0ebcbdf 9cb64db 0ebcbdf 9cb64db 0ebcbdf 9cb64db cbab20b 9cb64db cbab20b 9cb64db cbab20b 9cb64db cbab20b 9cb64db cbab20b 0ebcbdf 9cb64db 0ebcbdf cbab20b 0ebcbdf 9cb64db cbab20b 0ebcbdf cbab20b 0ebcbdf cbab20b 0ebcbdf cbab20b 0ebcbdf cbab20b 9cb64db | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 | import gradio as gr
import numpy as np
import cv2
from PIL import Image, ImageChops, ImageEnhance
import io
import os
import random
import matplotlib.pyplot as plt
from matplotlib.colors import LinearSegmentedColormap
import tempfile
import json
import base64
from sklearn.metrics.pairwise import cosine_similarity
import shutil
from typing import Dict, Any
from scipy.spatial import cKDTree
from multiprocessing import Pool, cpu_count
import nest_asyncio
# Apply nest_asyncio to allow async operations
nest_asyncio.apply()
# Create temporary directory for saving files
TEMP_DIR = tempfile.mkdtemp()
print(f"Using temporary directory: {TEMP_DIR}")
#############################
# HELPER FUNCTIONS
#############################
def save_pil_image(img, path):
"""Save a PIL image and return the path"""
img.save(path)
return path
def pil_to_base64(img):
"""Convert PIL image to base64 string for JSON response"""
buffered = io.BytesIO()
img.save(buffered, format="PNG")
return base64.b64encode(buffered.getvalue()).decode('utf-8')
def base64_to_pil(base64_str):
"""Convert base64 string to PIL image"""
img_data = base64.b64decode(base64_str)
return Image.open(io.BytesIO(img_data))
#############################
# FORENSIC ANALYSIS FUNCTIONS
#############################
# Define find_matches as a global function instead of nested
def find_matches(args):
"""
Find matching blocks within the given indices.
Args:
args: A tuple containing (block_indices, blocks, tree, similarity_threshold)
Returns:
A set of matching block pairs
"""
block_indices, blocks, tree, similarity_threshold = args
local_matches = set()
for i in block_indices:
# Find all blocks within the similarity threshold
distances, indices = tree.query(blocks[i], k=10, distance_upper_bound=similarity_threshold)
for j, dist in zip(indices, distances):
# Skip self-matches and invalid indices
if j != i and j < len(blocks) and dist <= similarity_threshold:
# Store matches as sorted tuples to avoid duplicates
local_matches.add(tuple(sorted([i, j])))
return local_matches
def detect_clones(image_path, max_dimension=2000):
"""
Detects cloned/copy-pasted regions in the image with optimized performance.
Args:
image_path: Path to the image file
max_dimension: Maximum dimension to resize large images to
Returns:
PIL Image containing the clone detection result and count of clones
"""
# Read image
img = cv2.imread(image_path, cv2.IMREAD_GRAYSCALE)
if img is None:
raise ValueError(f"Could not read image at {image_path}")
height, width = img.shape
# Handle large images by resizing if needed
scale = 1.0
if height > max_dimension or width > max_dimension:
scale = max_dimension / max(height, width)
new_height, new_width = int(height * scale), int(width * scale)
img = cv2.resize(img, (new_width, new_height))
height, width = img.shape
# Create output image
clone_img = cv2.cvtColor(img, cv2.COLOR_GRAY2BGR)
# Define parameters
block_size = 16
stride = 8
# For very large images, increase stride
if (height * width) > 4000000:
stride = 16
# Extract block features
blocks = []
positions = []
# Apply DCT to each block for feature extraction (faster than raw pixels)
for y in range(0, height - block_size, stride):
for x in range(0, width - block_size, stride):
block = img[y:y+block_size, x:x+block_size].astype(np.float32)
# Apply DCT and keep only top 16 coefficients (reduces dimensionality)
dct = cv2.dct(block)
feature = dct[:4, :4].flatten() # Use only low-frequency components
blocks.append(feature)
positions.append((x, y))
# Convert to numpy array for faster processing
blocks = np.array(blocks, dtype=np.float32)
# Normalize features for better comparison
norms = np.linalg.norm(blocks, axis=1)
norms[norms == 0] = 1 # Avoid division by zero
blocks = blocks / norms[:, np.newaxis]
# Use KD-Tree for efficient nearest neighbor search (much faster than cosine_similarity)
tree = cKDTree(blocks)
# Find similar blocks using radius search (equivalent to high cosine similarity)
# This is much more efficient than computing the full similarity matrix
similarity_threshold = 0.04 # Equivalent to ~0.95 cosine similarity
matches = set()
# Use multiple processes to speed up the search
num_processes = min(8, cpu_count())
# Split work among processes
chunk_size = len(blocks) // num_processes + 1
block_chunks = [range(i, min(i + chunk_size, len(blocks))) for i in range(0, len(blocks), chunk_size)]
# Prepare arguments for the find_matches function
args_list = [(chunk, blocks, tree, similarity_threshold) for chunk in block_chunks]
with Pool(num_processes) as pool:
results = pool.map(find_matches, args_list)
# Combine results
for result in results:
matches.update(result)
# Draw rectangles for matches
for i, j in matches:
x1, y1 = positions[i]
x2, y2 = positions[j]
cv2.rectangle(clone_img, (x1, y1), (x1+block_size, y1+block_size), (0, 0, 255), 1)
cv2.rectangle(clone_img, (x2, y2), (x2+block_size, y2+block_size), (255, 0, 0), 1)
# Convert OpenCV image to PIL format
clone_result = Image.fromarray(cv2.cvtColor(clone_img, cv2.COLOR_BGR2RGB))
# Restore original scale if the image was resized
if scale != 1.0:
orig_size = (int(clone_img.shape[1]/scale), int(clone_img.shape[0]/scale))
clone_result = clone_result.resize(orig_size, Image.LANCZOS)
return clone_result, len(matches)
def error_level_analysis(image_path, quality=90, scale=10):
"""
Performs Error Level Analysis (ELA) on the image.
Args:
image_path: Path to the image file
quality: JPEG quality level for recompression
scale: Amplification factor for differences
Returns:
PIL Image containing the ELA result
"""
# Open the original image
original = Image.open(image_path).convert('RGB')
# Save and reopen a JPEG version at the specified quality
temp_filename = os.path.join(TEMP_DIR, "temp_ela_process.jpg")
original.save(temp_filename, 'JPEG', quality=quality)
recompressed = Image.open(temp_filename)
# Calculate the difference
diff = ImageChops.difference(original, recompressed)
# Amplify the difference for better visualization
diff = ImageEnhance.Brightness(diff).enhance(scale)
# Create a colored version of the diff for visualization
diff_array = np.array(diff)
# Convert to grayscale
if len(diff_array.shape) == 3:
diff_gray = np.mean(diff_array, axis=2)
else:
diff_gray = diff_array
# Apply colormap for better visualization
colormap = plt.get_cmap('jet')
colored_diff = (colormap(diff_gray / 255.0) * 255).astype(np.uint8)
# Create PIL image from the array (remove alpha channel)
colored_result = Image.fromarray(colored_diff[:, :, :3])
return colored_result
def extract_exif_metadata(image_path):
"""
Extracts EXIF metadata from the image and identifies potential manipulation indicators.
Args:
image_path: Path to the image file
Returns:
Dictionary with metadata and analysis
"""
try:
img = Image.open(image_path)
exif_data = img._getexif() or {}
# Map EXIF tags to readable names
exif_tags = {
271: 'Make', 272: 'Model', 306: 'DateTime',
36867: 'DateTimeOriginal', 36868: 'DateTimeDigitized',
37510: 'UserComment', 40964: 'RelatedSoundFile',
305: 'Software', 315: 'Artist', 33432: 'Copyright'
}
# Process EXIF data into readable format
metadata = {}
for tag_id, value in exif_data.items():
tag = exif_tags.get(tag_id, str(tag_id))
metadata[tag] = str(value)
# Check for potential manipulation indicators
indicators = []
# Check for editing software
editing_software = ['photoshop', 'lightroom', 'gimp', 'paint', 'editor', 'filter']
if 'Software' in metadata:
software = metadata['Software'].lower()
for editor in editing_software:
if editor in software:
indicators.append(f"Image edited with {metadata['Software']}")
break
# Check for date discrepancies
if 'DateTimeOriginal' in metadata and 'DateTime' in metadata:
if metadata['DateTimeOriginal'] != metadata['DateTime']:
indicators.append("Capture time differs from modification time")
# Missing original date
if 'DateTime' in metadata and 'DateTimeOriginal' not in metadata:
indicators.append("Original capture time missing")
# Create result dictionary
result = {
"metadata": metadata,
"indicators": indicators,
"summary": "Potential manipulation detected" if indicators else "No obvious manipulation indicators",
"analysis_count": len(metadata)
}
return result
except Exception as e:
return {
"metadata": {"Error": str(e)},
"indicators": ["Error extracting metadata"],
"summary": "Analysis failed",
"analysis_count": 0
}
def noise_analysis(image_path, amplification=15):
"""
Extracts and analyzes noise patterns in the image to detect inconsistencies.
Args:
image_path: Path to the image file
amplification: Factor to amplify noise for visualization
Returns:
PIL Image containing the noise analysis result
"""
# Read the image
img = cv2.imread(image_path)
# Convert to grayscale
gray = cv2.cvtColor(img, cv2.COLOR_BGR2GRAY)
# Apply Gaussian blur to extract base image without noise
blur = cv2.GaussianBlur(gray, (5, 5), 0)
# Extract noise by subtracting the blurred image from the original
noise = cv2.subtract(gray, blur)
# Amplify the noise for better visualization
noise = cv2.multiply(noise, amplification)
# Apply a colormap for visualization
noise_colored = cv2.applyColorMap(noise, cv2.COLORMAP_JET)
# Convert back to PIL format
noise_pil = Image.fromarray(cv2.cvtColor(noise_colored, cv2.COLOR_BGR2RGB))
return noise_pil
def manipulation_likelihood(image_path):
"""
Simulates a pre-trained model that evaluates the likelihood of image manipulation.
For demo purposes, this generates a random score with some biasing based on image properties.
Args:
image_path: Path to the image file
Returns:
Dictionary with manipulation probability and areas of interest
"""
# Open the image
img = np.array(Image.open(image_path).convert('RGB'))
# Get image dimensions
height, width = img.shape[:2]
# In a real implementation, you would use your pre-trained model here
# For demo purposes, we'll simulate a model output based on image characteristics
# Create a heatmap of "suspicious" areas (for demo purposes)
heatmap = np.zeros((height, width), dtype=np.float32)
# Add some "suspicious" regions for demonstration
# This would be replaced by actual model output in a real implementation
# 1. Add some random regions of interest
num_regions = random.randint(1, 4)
for _ in range(num_regions):
x = random.randint(0, width - 1)
y = random.randint(0, height - 1)
radius = random.randint(width//10, width//5)
# Create a circular region of interest
y_indices, x_indices = np.ogrid[:height, :width]
dist_from_center = ((y_indices - y)**2 + (x_indices - x)**2)
mask = dist_from_center <= radius**2
# Add to heatmap with random intensity
intensity = random.uniform(0.5, 1.0)
heatmap[mask] = np.maximum(heatmap[mask], intensity * np.exp(-dist_from_center[mask] / (2 * (radius/2)**2)))
# Normalize the heatmap
if np.max(heatmap) > 0:
heatmap = heatmap / np.max(heatmap)
# Convert to RGB for visualization using a colormap
cmap = LinearSegmentedColormap.from_list('custom', [(0, 0, 0, 0), (1, 0, 0, 0.7)])
heatmap_rgb = (cmap(heatmap) * 255).astype(np.uint8)
# Overlay heatmap on the original image
orig_img = np.array(Image.open(image_path).convert('RGB'))
overlay = orig_img.copy()
# Only add red channel where heatmap has values
for c in range(3):
if c == 0: # Red channel
overlay[:, :, c] = np.where(heatmap_rgb[:, :, 3] > 0,
(overlay[:, :, c] * 0.5 + heatmap_rgb[:, :, 0] * 0.5).astype(np.uint8),
overlay[:, :, c])
else: # Green and blue channels - reduce them in highlighted areas
overlay[:, :, c] = np.where(heatmap_rgb[:, :, 3] > 0,
(overlay[:, :, c] * 0.5).astype(np.uint8),
overlay[:, :, c])
# Generate a "manipulation probability" for demo purposes
# In a real implementation, this would come from your model
exif_result = extract_exif_metadata(image_path)
exif_factor = 0.3 if exif_result["indicators"] else 0.0
# Slightly bias probability based on file characteristics for the demo
img_factor = 0.1 if ".jpg" in image_path.lower() else 0.0
# Combine factors with a random component for the demo
base_probability = random.uniform(0.2, 0.8)
manipulation_probability = min(0.95, base_probability + exif_factor + img_factor)
# Create a more realistic result for the demo
overlay_image = Image.fromarray(overlay)
# Return results
return {
"probability": manipulation_probability,
"heatmap_image": overlay_image,
"explanation": get_probability_explanation(manipulation_probability),
"confidence": "medium" if 0.3 < manipulation_probability < 0.7 else "high"
}
def get_probability_explanation(prob):
"""Returns an explanation text based on the manipulation probability"""
if prob < 0.3:
return "The image appears to be authentic with no significant signs of manipulation."
elif prob < 0.6:
return "Some inconsistencies detected that might indicate limited manipulation."
else:
return "Strong indicators of digital manipulation detected in this image."
def get_clone_explanation(count):
"""Returns an explanation based on the number of clone matches found"""
if count == 0:
return "No copy-paste manipulations detected in the image."
elif count < 10:
return "Few potential copy-paste regions detected, might be false positives."
else:
return "Significant number of copy-paste regions detected, suggesting manipulation."
def save_uploaded_image(image):
"""Save a PIL image to disk and return the path"""
temp_path = os.path.join(TEMP_DIR, "temp_analyze.jpg")
image.save(temp_path)
return temp_path
def analyze_complete_image(image_path):
"""Comprehensive analysis of an image, running all forensic tests"""
# Read the image as PIL
image = Image.open(image_path)
# Run all analyses
exif_result = extract_exif_metadata(image_path)
manipulation_result = manipulation_likelihood(image_path)
clone_result, clone_count = detect_clones(image_path)
ela_result = error_level_analysis(image_path)
noise_result = noise_analysis(image_path)
# Compile combined analysis text
analysis_text = f"""
## Manipulation Analysis Results
**Overall Assessment: {manipulation_result['probability']*100:.1f}% likelihood of manipulation**
{manipulation_result['explanation']}
### Clone Detection Analysis:
Found {clone_count} potential cloned regions in the image.
{get_clone_explanation(clone_count)}
### EXIF Metadata Analysis:
{exif_result['summary']}
Indicators found: {len(exif_result['indicators'])}
"""
if exif_result['indicators']:
analysis_text += "\nDetailed indicators:\n"
for indicator in exif_result['indicators']:
analysis_text += f"- {indicator}\n"
# Return complete result object
return {
"manipulation_probability": manipulation_result["probability"],
"analysis_text": analysis_text,
"exif_data": exif_result["metadata"],
"clone_count": clone_count,
"original_image": image,
"ela_image": ela_result,
"noise_image": noise_result,
"heatmap_image": manipulation_result["heatmap_image"],
"clone_image": clone_result
}
#############################
# GRADIO INTERFACE FUNCTIONS
#############################
def analyze_image(image):
"""Main function for Gradio UI that processes the uploaded image"""
if image is None:
return None, None, None, None, None, "{}", "Please upload an image first.", 0
# Save the image
temp_path = save_uploaded_image(image)
try:
# Get analysis results
results = analyze_complete_image(temp_path)
# Return results in the format expected by Gradio
return (
image, # original_image
results["ela_image"], # ela_image
results["noise_image"], # noise_image
results["heatmap_image"], # heatmap_image
results["clone_image"], # clone_image
json.dumps(results["exif_data"], indent=2), # exif_data
results["analysis_text"], # analysis_results
results["manipulation_probability"] # probability_slider
)
except Exception as e:
error_message = f"Error occurred during analysis: {str(e)}"
print(error_message) # Log the error
return image, None, None, None, None, f"Error: {str(e)}", error_message, 0
#############################
# GRADIO INTERFACE
#############################
with gr.Blocks(title="Image Forensic & Fraud Detection Tool") as demo:
gr.Markdown("""
# Image Forensic & Fraud Detection Tool
Upload an image to analyze it for potential manipulation using various forensic techniques.
""")
with gr.Row():
with gr.Column(scale=1):
input_image = gr.Image(type="pil", label="Upload Image for Analysis")
analyze_button = gr.Button("Analyze Image", variant="primary")
gr.Markdown("### Manipulation Probability")
probability_slider = gr.Slider(
minimum=0, maximum=1, value=0,
label="Manipulation Probability",
interactive=False
)
gr.Markdown("### EXIF Metadata")
exif_data = gr.Code(language="json", label="EXIF Data", lines=10)
with gr.Column(scale=2):
with gr.Tab("Analysis Results"):
analysis_results = gr.Markdown()
with gr.Tab("Original Image"):
original_image = gr.Image(type="pil", label="Original Image")
with gr.Tab("Error Level Analysis (ELA)"):
gr.Markdown("""
Error Level Analysis reveals differences in compression levels. Areas with different compression levels
often indicate modifications. Brighter regions in the visualization suggest potential manipulations.
""")
ela_image = gr.Image(type="pil", label="ELA Result")
with gr.Tab("Noise Analysis"):
gr.Markdown("""
Noise Analysis examines the noise patterns in the image. Inconsistent noise patterns often indicate
areas that have been manipulated or added from different sources.
""")
noise_image = gr.Image(type="pil", label="Noise Pattern Analysis")
with gr.Tab("Clone Detection"):
gr.Markdown("""
Clone Detection identifies duplicated areas within the image. Red and blue rectangles highlight
matching regions that may indicate copy-paste manipulation.
""")
clone_image = gr.Image(type="pil", label="Clone Detection Result")
with gr.Tab("AI Detection Heatmap"):
gr.Markdown("""
This heatmap highlights regions identified by our AI model as potentially manipulated.
Red areas indicate suspicious regions with a higher likelihood of manipulation.
""")
heatmap_image = gr.Image(type="pil", label="AI-Detected Suspicious Regions")
# Set up event handlers
analyze_button.click(
fn=analyze_image,
inputs=[input_image],
outputs=[
original_image,
ela_image,
noise_image,
heatmap_image,
clone_image,
exif_data,
analysis_results,
probability_slider
]
)
# Launch the app
if __name__ == "__main__":
demo.launch(server_name="0.0.0.0", server_port=7860) |