Abstract
This work introduces FLIDS (Fuzzy Logic-based Image Distortion Scoring), an interpretable and efficient system for image tampering detection based on hand-crafted features and fuzzy logic. FLIDS combines JPEG artifact analysis, edge consistency, co-occurrence entropy, and CFA disparities into a fuzzy rule-based system for assigning a tampering confidence score. In contrast to black-box deep learning systems, FLIDS prioritizes transparency and generalizability. Tests on CIFAR-10, MNIST, ImageNet Subset, and Deepfake datasets indicate FLIDS attains competitive accuracy compared to ResNet-18, Autoencoder, and hand-designed JPEG detectors in the majority of instances. FLIDS achieves 93.5% and 91.8% accuracy on CIFAR-10 and ImageNet Subset, respectively, as well as a balanced 90.2% on deepfake datasets. These findings point to FLIDS as a promising, interpretable solution to intricate deep learning systems in image forgery detection.
References
da Costa, K. A., J. P. Papa, L. A. Passos, D. Colombo, J. Del Ser, K. Muhammad, and V. H. C. de Albuquerque. “A Critical Literature Survey and Prospects on Tampering and Anomaly Detection in Image Data.” Applied Soft Computing 97 (2020): 106727.
Jana, M., B. Jana, and S. Joardar. “Local Feature Based Self-Embedding Fragile Watermarking Scheme for Tampered Detection and Recovery Utilizing AMBTC with Fuzzy Logic.” Journal of King Saud University–Computer and Information Sciences 34, no. 10 (2022): 9822–9835.
Thakkar, P., D. Patel, I. Hirpara, J. Jagani, S. Patel, M. Shah, and A. Kshirsagar. “A Comprehensive Review on Computer Vision and Fuzzy Logic in Forensic Science Application.” Annals of Data Science 10, no. 3 (2023): 761–785.
Kaur, M., and S. Gupta. “A Fusion Framework Based on Fuzzy Integrals for Passive-Blind Image Tamper Detection.” Cluster Computing 22, Suppl. 5 (2019): 11363–11378.
Karakış, R., İ. Güler, I. Capraz, and E. Bilir. “A Novel Fuzzy Logic-Based Image Steganography Method to Ensure Medical Data Security.” Computers in Biology and Medicine 67 (2015): 172–183.
Capizzi, G., G. L. Sciuto, C. Napoli, D. Połap, and M. Woźniak. “Small Lung Nodules Detection Based on Fuzzy-Logic and Probabilistic Neural Network with Bioinspired Reinforcement Learning.” IEEE Transactions on Fuzzy Systems 28, no. 6 (2019): 1178–1189.
Barni, M., and A. Costanzo. “Dealing with Uncertainty in Image Forensics: A Fuzzy Approach.” In 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 1753–1756. IEEE, 2012.
Kaur, K., and E. S. Kaur. “Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images.” International Journal of Advanced Research Ideas and Innovations in Technology 3, no. 1 (2016): 1–7.
Kanimozhi, R., and V. Padmavathi. “Robust and Secure Image Steganography with Recurrent Neural Network and Fuzzy Logic Integration.” Scientific Reports 15, no. 1 (2025): 13122.
Hashmi, M. F., and A. G. Keskar. “Block and Fuzzy Techniques Based Forensic Tool for Detection and Classification of Image Forgery.” Journal of Electrical Engineering and Technology 10, no. 4 (2015): 1886–1898.
Sahu, A. K. “A Logistic Map Based Blind and Fragile Watermarking for Tamper Detection and Localization in Images.” Journal of Ambient Intelligence and Humanized Computing 13, no. 8 (2022): 3869–3881.
Shuriya, B., and A. Rajendran. “A Fuzzy Responsibility-Based Access Organizer for Leukemia Record Protection Using KWatts Algorithm.” Applied Mathematics 13, no. 6 (2019): 1047–1052.
Gonge, S. S., and A. Ghatol. “Combination of Fuzzy Logic Digital Image Watermarking and Advanced Encryption Technique for Security and Authentication of Cheque Image.” In Intelligent Systems Technologies and Applications, 84–101. Springer, 2018.
Pillutla, H., and A. Arjunan. “A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues.” In 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 1–6. IEEE, 2018.
Korus, P., and J. Huang. “Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images.” IEEE Transactions on Image Processing 25, no. 3 (2016): 1312–1326.
Liu, H., Y. Zhou, Y. Zhang, and Y. Su. “A Rough Set Fuzzy Logic Algorithm for Visual Tracking of Blockchain Logistics Transportation Labels.” Journal of Intelligent & Fuzzy Systems 41, no. 4 (2021): 4965–4972.
Ebrahimi, M., S. H. R. Ahmadi, G. PourEbrahim, and A. Foroozani. “Ranking Medical Image Watermarking Algorithms Using the Fuzzy Analytical Hierarchy Process.” International Journal of Operational Research 30, no. 1 (2017): 120–141.
Phan-Ho, A. T., and F. Retraint. “A Comparative Study of Bayesian and Dempster-Shafer Fusion on Image Forgery Detection.” IEEE Access 10 (2022): 99268–99281.
Swaraja, K., and K. Meenakshi. “An Optimized Blind Dual Medical Image Watermarking Framework for Tamper Localization and Content Authentication in Secured Telemedicine.” Biomedical Signal Processing and Control 55 (2020): 101665.
Knorst, A. M., A. A. Vanti, R. A. E. Andrade, and S. L. Johann. “Aligning Information Security with the Image of the Organization and Prioritization Based on Fuzzy Logic for the Industrial Automation Sector.” JISTEM–Journal of Information Systems and Technology Management 8 (2011): 555–580.
Zhao, D., and X. Tian. “A Multiscale Fusion Lightweight Image-Splicing Tamper-Detection Model.” Electronics 11, no. 16 (2022): 2621.
Wang, J., W. Zhang, Z. Huang, and J. Li. “Boosting Robustness in Deep Neuro-Fuzzy Systems: Uncovering Vulnerabilities, Empirical Insights, and a Multi-Attack Defense Mechanism.” IEEE Transactions on Fuzzy Systems (2024).
R, Nagarathna C, Jayasri A, Chandana S, and Amrutha A. "Identification of Image Forgeries using Machine Learning - A Review." Journal of Innovative Image Processing 5, no. 3 (2023): 323-336.
Darney, P. Ebby. "Scam Image Detection on Copy-Move by JPEG Features and Classical Block Matching with Improved Variant." Journal of Innovative Image Processing 4, no. 4 (2022): 215-225.
Gowrisankar, B., and V. L. Thing. “An Adversarial Attack Approach for Explainable AI Evaluation on Deep Fake Detection Models.” Computers & Security 139 (2024): 103684.
Rohhila, S., and A. K. Singh. “Deep Learning-Based Encryption for Secure Transmission Digital Images: A Survey.” Computers and Electrical Engineering 116 (2024): 109236.
Uloli, Thiruvaazhi, R. M. Koushal Akash, A. G. Keerthika, and K. S. Dhanwanth. "Survey of Fake Image Synthesis and its Detection." Journal of Innovative Image Processing 4, no. 4 (2022): 278-297.
Karaköse, M., İ. İlhan, H. Yetiş, and S. Ataş. “A New Approach for Deep Fake Detection with the Choquet Fuzzy Integral.” Applied Sciences 14, no. 16 (2024): 7216.
Yadav, A., and D. K. Vishwakarma. “Datasets, Clues and State-of-the-Arts for Multimedia Forensics: An Extensive Review.” Expert Systems with Applications (2024): 123756.
