forensic / app.py
HunzalaRasheed1's picture
Create app.py
08d02ba verified
from fastapi import FastAPI, UploadFile, File
from fastapi.responses import JSONResponse, FileResponse
import numpy as np
import cv2
from PIL import Image, ImageChops, ImageEnhance
import io
import os
import random
import matplotlib.pyplot as plt
from matplotlib.colors import LinearSegmentedColormap
import tempfile
import json
import base64
from sklearn.metrics.pairwise import cosine_similarity
from fastapi.middleware.cors import CORSMiddleware
import shutil
from typing import Dict, Any
# Create temporary directory for saving files
# Use environment variable for Docker compatibility
TEMP_DIR = os.environ.get('TEMP_DIR', tempfile.mkdtemp())
os.makedirs(TEMP_DIR, exist_ok=True)
print(f"Using temporary directory: {TEMP_DIR}")
app = FastAPI(title="Image Forensic & Fraud Detection API")
# Add CORS middleware to allow requests from any origin
app.add_middleware(
CORSMiddleware,
allow_origins=["*"],
allow_credentials=True,
allow_methods=["*"],
allow_headers=["*"],
)
#############################
# HELPER FUNCTIONS
#############################
def save_pil_image(img, path):
"""Save a PIL image and return the path"""
img.save(path)
return path
def pil_to_base64(img):
"""Convert PIL image to base64 string for JSON response"""
buffered = io.BytesIO()
img.save(buffered, format="PNG")
return base64.b64encode(buffered.getvalue()).decode('utf-8')
#############################
# FORENSIC ANALYSIS FUNCTIONS
#############################
@app.post("/api/detect_clones")
async def api_detect_clones(file: UploadFile = File(...)):
"""API endpoint for clone detection"""
# Save uploaded file
temp_path = os.path.join(TEMP_DIR, f"temp_clone_{random.randint(1000, 9999)}.jpg")
with open(temp_path, "wb") as f:
shutil.copyfileobj(file.file, f)
try:
# Run detection
clone_img, clone_count = detect_clones(temp_path)
# Return results
result = {
"image": pil_to_base64(clone_img),
"clone_count": clone_count,
"explanation": get_clone_explanation(clone_count)
}
finally:
# Clean up the temporary file
if os.path.exists(temp_path):
os.remove(temp_path)
return result
# Define find_matches as a global function instead of nested
def find_matches(args):
"""
Find matching blocks within the given indices.
Args:
args: A tuple containing (block_indices, blocks, tree, similarity_threshold)
Returns:
A set of matching block pairs
"""
block_indices, blocks, tree, similarity_threshold = args
local_matches = set()
for i in block_indices:
# Find all blocks within the similarity threshold
distances, indices = tree.query(blocks[i], k=10, distance_upper_bound=similarity_threshold)
for j, dist in zip(indices, distances):
# Skip self-matches and invalid indices
if j != i and j < len(blocks) and dist <= similarity_threshold:
# Store matches as sorted tuples to avoid duplicates
local_matches.add(tuple(sorted([i, j])))
return local_matches
def detect_clones(image_path, max_dimension=2000):
"""
Detects cloned/copy-pasted regions in the image with optimized performance.
Args:
image_path: Path to the image file
max_dimension: Maximum dimension to resize large images to
Returns:
PIL Image containing the clone detection result and count of clones
"""
import cv2
import numpy as np
from PIL import Image
from scipy.spatial import cKDTree
from multiprocessing import Pool, cpu_count
# Read image
img = cv2.imread(image_path, cv2.IMREAD_GRAYSCALE)
if img is None:
raise ValueError(f"Could not read image at {image_path}")
height, width = img.shape
# Handle large images by resizing if needed
scale = 1.0
if height > max_dimension or width > max_dimension:
scale = max_dimension / max(height, width)
new_height, new_width = int(height * scale), int(width * scale)
img = cv2.resize(img, (new_width, new_height))
height, width = img.shape
# Create output image
clone_img = cv2.cvtColor(img, cv2.COLOR_GRAY2BGR)
# Define parameters
block_size = 16
stride = 8
# For very large images, increase stride
if (height * width) > 4000000:
stride = 16
# Extract block features
blocks = []
positions = []
# Apply DCT to each block for feature extraction (faster than raw pixels)
for y in range(0, height - block_size, stride):
for x in range(0, width - block_size, stride):
block = img[y:y+block_size, x:x+block_size].astype(np.float32)
# Apply DCT and keep only top 16 coefficients (reduces dimensionality)
dct = cv2.dct(block)
feature = dct[:4, :4].flatten() # Use only low-frequency components
blocks.append(feature)
positions.append((x, y))
# Convert to numpy array for faster processing
blocks = np.array(blocks, dtype=np.float32)
# Normalize features for better comparison
norms = np.linalg.norm(blocks, axis=1)
norms[norms == 0] = 1 # Avoid division by zero
blocks = blocks / norms[:, np.newaxis]
# Use KD-Tree for efficient nearest neighbor search (much faster than cosine_similarity)
tree = cKDTree(blocks)
# Find similar blocks using radius search (equivalent to high cosine similarity)
# This is much more efficient than computing the full similarity matrix
similarity_threshold = 0.04 # Equivalent to ~0.95 cosine similarity
matches = set()
# Use multiple processes to speed up the search
num_processes = min(8, cpu_count())
# Split work among processes
chunk_size = len(blocks) // num_processes + 1
block_chunks = [range(i, min(i + chunk_size, len(blocks))) for i in range(0, len(blocks), chunk_size)]
# Prepare arguments for the find_matches function
args_list = [(chunk, blocks, tree, similarity_threshold) for chunk in block_chunks]
with Pool(num_processes) as pool:
results = pool.map(find_matches, args_list)
# Combine results
for result in results:
matches.update(result)
# Draw rectangles for matches
for i, j in matches:
x1, y1 = positions[i]
x2, y2 = positions[j]
cv2.rectangle(clone_img, (x1, y1), (x1+block_size, y1+block_size), (0, 0, 255), 1)
cv2.rectangle(clone_img, (x2, y2), (x2+block_size, y2+block_size), (255, 0, 0), 1)
# Convert OpenCV image to PIL format
clone_result = Image.fromarray(cv2.cvtColor(clone_img, cv2.COLOR_BGR2RGB))
# Restore original scale if the image was resized
if scale != 1.0:
orig_size = (int(clone_img.shape[1]/scale), int(clone_img.shape[0]/scale))
clone_result = clone_result.resize(orig_size, Image.LANCZOS)
return clone_result, len(matches)
@app.post("/api/error_level_analysis")
async def api_error_level_analysis(file: UploadFile = File(...), quality: int = 90, scale: int = 10):
"""API endpoint for error level analysis"""
# Save uploaded file with random suffix to avoid conflicts
temp_path = os.path.join(TEMP_DIR, f"temp_ela_{random.randint(1000, 9999)}.jpg")
with open(temp_path, "wb") as f:
shutil.copyfileobj(file.file, f)
try:
# Run analysis
ela_img = error_level_analysis(temp_path, quality, scale)
# Return results
result = {
"image": pil_to_base64(ela_img)
}
finally:
# Clean up the temporary file
if os.path.exists(temp_path):
os.remove(temp_path)
return result
def error_level_analysis(image_path, quality=90, scale=10):
"""
Performs Error Level Analysis (ELA) on the image.
Args:
image_path: Path to the image file
quality: JPEG quality level for recompression
scale: Amplification factor for differences
Returns:
PIL Image containing the ELA result
"""
# Open the original image
original = Image.open(image_path).convert('RGB')
# Save and reopen a JPEG version at the specified quality
temp_filename = os.path.join(TEMP_DIR, f"temp_ela_process_{random.randint(1000, 9999)}.jpg")
original.save(temp_filename, 'JPEG', quality=quality)
try:
recompressed = Image.open(temp_filename)
# Calculate the difference
diff = ImageChops.difference(original, recompressed)
# Amplify the difference for better visualization
diff = ImageEnhance.Brightness(diff).enhance(scale)
# Create a colored version of the diff for visualization
diff_array = np.array(diff)
# Convert to grayscale
if len(diff_array.shape) == 3:
diff_gray = np.mean(diff_array, axis=2)
else:
diff_gray = diff_array
# Apply colormap for better visualization
colormap = plt.get_cmap('jet')
colored_diff = (colormap(diff_gray / 255.0) * 255).astype(np.uint8)
# Create PIL image from the array (remove alpha channel)
colored_result = Image.fromarray(colored_diff[:, :, :3])
return colored_result
finally:
# Clean up temporary file
if os.path.exists(temp_filename):
os.remove(temp_filename)
@app.post("/api/extract_exif_metadata")
async def api_extract_exif_metadata(file: UploadFile = File(...)):
"""API endpoint for EXIF metadata extraction"""
# Save uploaded file
temp_path = os.path.join(TEMP_DIR, f"temp_exif_{random.randint(1000, 9999)}.jpg")
with open(temp_path, "wb") as f:
shutil.copyfileobj(file.file, f)
try:
# Run analysis
exif_result = extract_exif_metadata(temp_path)
# Return results
return exif_result
finally:
# Clean up the temporary file
if os.path.exists(temp_path):
os.remove(temp_path)
def extract_exif_metadata(image_path):
"""
Extracts EXIF metadata from the image and identifies potential manipulation indicators.
Args:
image_path: Path to the image file
Returns:
Dictionary with metadata and analysis
"""
try:
img = Image.open(image_path)
exif_data = img._getexif() or {}
# Map EXIF tags to readable names
exif_tags = {
271: 'Make', 272: 'Model', 306: 'DateTime',
36867: 'DateTimeOriginal', 36868: 'DateTimeDigitized',
37510: 'UserComment', 40964: 'RelatedSoundFile',
305: 'Software', 315: 'Artist', 33432: 'Copyright'
}
# Process EXIF data into readable format
metadata = {}
for tag_id, value in exif_data.items():
tag = exif_tags.get(tag_id, str(tag_id))
metadata[tag] = str(value)
# Check for potential manipulation indicators
indicators = []
# Check for editing software
editing_software = ['photoshop', 'lightroom', 'gimp', 'paint', 'editor', 'filter']
if 'Software' in metadata:
software = metadata['Software'].lower()
for editor in editing_software:
if editor in software:
indicators.append(f"Image edited with {metadata['Software']}")
break
# Check for date discrepancies
if 'DateTimeOriginal' in metadata and 'DateTime' in metadata:
if metadata['DateTimeOriginal'] != metadata['DateTime']:
indicators.append("Capture time differs from modification time")
# Missing original date
if 'DateTime' in metadata and 'DateTimeOriginal' not in metadata:
indicators.append("Original capture time missing")
# Create result dictionary
result = {
"metadata": metadata,
"indicators": indicators,
"summary": "Potential manipulation detected" if indicators else "No obvious manipulation indicators",
"analysis_count": len(metadata)
}
return result
except Exception as e:
return {
"metadata": {"Error": str(e)},
"indicators": ["Error extracting metadata"],
"summary": "Analysis failed",
"analysis_count": 0
}
@app.post("/api/noise_analysis")
async def api_noise_analysis(file: UploadFile = File(...), amplification: int = 15):
"""API endpoint for noise analysis"""
# Save uploaded file
temp_path = os.path.join(TEMP_DIR, f"temp_noise_{random.randint(1000, 9999)}.jpg")
with open(temp_path, "wb") as f:
shutil.copyfileobj(file.file, f)
try:
# Run analysis
noise_img = noise_analysis(temp_path, amplification)
# Return results
return {
"image": pil_to_base64(noise_img)
}
finally:
# Clean up the temporary file
if os.path.exists(temp_path):
os.remove(temp_path)
def noise_analysis(image_path, amplification=15):
"""
Extracts and analyzes noise patterns in the image to detect inconsistencies.
Args:
image_path: Path to the image file
amplification: Factor to amplify noise for visualization
Returns:
PIL Image containing the noise analysis result
"""
# Read the image
img = cv2.imread(image_path)
# Convert to grayscale
gray = cv2.cvtColor(img, cv2.COLOR_BGR2GRAY)
# Apply Gaussian blur to extract base image without noise
blur = cv2.GaussianBlur(gray, (5, 5), 0)
# Extract noise by subtracting the blurred image from the original
noise = cv2.subtract(gray, blur)
# Amplify the noise for better visualization
noise = cv2.multiply(noise, amplification)
# Apply a colormap for visualization
noise_colored = cv2.applyColorMap(noise, cv2.COLORMAP_JET)
# Convert back to PIL format
noise_pil = Image.fromarray(cv2.cvtColor(noise_colored, cv2.COLOR_BGR2RGB))
return noise_pil
@app.post("/api/manipulation_likelihood")
async def api_manipulation_likelihood(file: UploadFile = File(...)):
"""API endpoint for manipulation likelihood analysis"""
# Save uploaded file
temp_path = os.path.join(TEMP_DIR, f"temp_manipulation_{random.randint(1000, 9999)}.jpg")
with open(temp_path, "wb") as f:
shutil.copyfileobj(file.file, f)
try:
# Run analysis
result = manipulation_likelihood(temp_path)
# Convert image to base64
result["heatmap_image_base64"] = pil_to_base64(result["heatmap_image"])
del result["heatmap_image"] # Remove PIL image from JSON response
# Return results
return result
finally:
# Clean up the temporary file
if os.path.exists(temp_path):
os.remove(temp_path)
def manipulation_likelihood(image_path):
"""
Simulates a pre-trained model that evaluates the likelihood of image manipulation.
For demo purposes, this generates a random score with some biasing based on image properties.
Args:
image_path: Path to the image file
Returns:
Dictionary with manipulation probability and areas of interest
"""
# Open the image
img = np.array(Image.open(image_path).convert('RGB'))
# Get image dimensions
height, width = img.shape[:2]
# In a real implementation, you would use your pre-trained model here
# For demo purposes, we'll simulate a model output based on image characteristics
# Create a heatmap of "suspicious" areas (for demo purposes)
heatmap = np.zeros((height, width), dtype=np.float32)
# Add some "suspicious" regions for demonstration
# This would be replaced by actual model output in a real implementation
# 1. Add some random regions of interest
num_regions = random.randint(1, 4)
for _ in range(num_regions):
x = random.randint(0, width - 1)
y = random.randint(0, height - 1)
radius = random.randint(width//10, width//5)
# Create a circular region of interest
y_indices, x_indices = np.ogrid[:height, :width]
dist_from_center = ((y_indices - y)**2 + (x_indices - x)**2)
mask = dist_from_center <= radius**2
# Add to heatmap with random intensity
intensity = random.uniform(0.5, 1.0)
heatmap[mask] = np.maximum(heatmap[mask], intensity * np.exp(-dist_from_center[mask] / (2 * (radius/2)**2)))
# Normalize the heatmap
if np.max(heatmap) > 0:
heatmap = heatmap / np.max(heatmap)
# Convert to RGB for visualization using a colormap
cmap = LinearSegmentedColormap.from_list('custom', [(0, 0, 0, 0), (1, 0, 0, 0.7)])
heatmap_rgb = (cmap(heatmap) * 255).astype(np.uint8)
# Overlay heatmap on the original image
orig_img = np.array(Image.open(image_path).convert('RGB'))
overlay = orig_img.copy()
# Only add red channel where heatmap has values
for c in range(3):
if c == 0: # Red channel
overlay[:, :, c] = np.where(heatmap_rgb[:, :, 3] > 0,
(overlay[:, :, c] * 0.5 + heatmap_rgb[:, :, 0] * 0.5).astype(np.uint8),
overlay[:, :, c])
else: # Green and blue channels - reduce them in highlighted areas
overlay[:, :, c] = np.where(heatmap_rgb[:, :, 3] > 0,
(overlay[:, :, c] * 0.5).astype(np.uint8),
overlay[:, :, c])
# Generate a "manipulation probability" for demo purposes
# In a real implementation, this would come from your model
exif_result = extract_exif_metadata(image_path)
exif_factor = 0.3 if exif_result["indicators"] else 0.0
# Slightly bias probability based on file characteristics for the demo
img_factor = 0.1 if ".jpg" in image_path.lower() else 0.0
# Combine factors with a random component for the demo
base_probability = random.uniform(0.2, 0.8)
manipulation_probability = min(0.95, base_probability + exif_factor + img_factor)
# Create a more realistic result for the demo
overlay_image = Image.fromarray(overlay)
# Return results
return {
"probability": manipulation_probability,
"heatmap_image": overlay_image,
"explanation": get_probability_explanation(manipulation_probability),
"confidence": "medium" if 0.3 < manipulation_probability < 0.7 else "high"
}
def get_probability_explanation(prob):
"""Returns an explanation text based on the manipulation probability"""
if prob < 0.3:
return "The image appears to be authentic with no significant signs of manipulation."
elif prob < 0.6:
return "Some inconsistencies detected that might indicate limited manipulation."
else:
return "Strong indicators of digital manipulation detected in this image."
def get_clone_explanation(count):
"""Returns an explanation based on the number of clone matches found"""
if count == 0:
return "No copy-paste manipulations detected in the image."
elif count < 10:
return "Few potential copy-paste regions detected, might be false positives."
else:
return "Significant number of copy-paste regions detected, suggesting manipulation."
@app.post("/api/analyze_image")
async def api_analyze_image(file: UploadFile = File(...)):
"""Main API endpoint for complete image analysis"""
# Save uploaded file
temp_path = os.path.join(TEMP_DIR, f"temp_analyze_{random.randint(1000, 9999)}.jpg")
with open(temp_path, "wb") as f:
shutil.copyfileobj(file.file, f)
try:
# Read the image as PIL
image = Image.open(temp_path)
# Run all analyses
exif_result = extract_exif_metadata(temp_path)
manipulation_result = manipulation_likelihood(temp_path)
clone_result, clone_count = detect_clones(temp_path)
# Compile combined analysis text
analysis_text = f"""
## Manipulation Analysis Results
**Overall Assessment: {manipulation_result['probability']*100:.1f}% likelihood of manipulation**
{manipulation_result['explanation']}
### Clone Detection Analysis:
Found {clone_count} potential cloned regions in the image.
{get_clone_explanation(clone_count)}
### EXIF Metadata Analysis:
{exif_result['summary']}
Indicators found: {len(exif_result['indicators'])}
"""
if exif_result['indicators']:
analysis_text += "\nDetailed indicators:\n"
for indicator in exif_result['indicators']:
analysis_text += f"- {indicator}\n"
# Return complete result object
return {
"manipulation_probability": manipulation_result["probability"],
"analysis_text": analysis_text,
"exif_data": exif_result["metadata"],
"clone_count": clone_count,
"original_image": pil_to_base64(image),
"ela_image": pil_to_base64(error_level_analysis(temp_path)),
"noise_image": pil_to_base64(noise_analysis(temp_path)),
"heatmap_image": pil_to_base64(manipulation_result["heatmap_image"]),
"clone_image": pil_to_base64(clone_result)
}
finally:
# Clean up the temporary file
if os.path.exists(temp_path):
os.remove(temp_path)
# Add a health check endpoint
@app.get("/health")
async def health_check():
"""Health check endpoint for monitoring"""
return {"status": "healthy", "service": "Image Forensic API"}
# Add a root endpoint with API documentation
@app.get("/")
async def root():
"""Root endpoint with API information"""
return {
"name": "Image Forensic & Fraud Detection API",
"version": "1.0.0",
"endpoints": [
"/api/analyze_image",
"/api/detect_clones",
"/api/error_level_analysis",
"/api/extract_exif_metadata",
"/api/noise_analysis",
"/api/manipulation_likelihood"
],
"docs": "/docs"
}
if __name__ == "__main__":
import uvicorn
uvicorn.run(app, host="0.0.0.0", port=7860)