DEFACTO - Automated detection of digital images falsifications

Home » DEFACTO - Automated detection of digital images falsifications
01/03/2017 to 31/12/2021

Project Description:

Photo-montage and counterfeit images are not a recent phenomenon. As soon as images have been used within a political or economical context, the reality and the authenticity of recorded scenes become a legitimate question. The emergence of digital data did not really modify that basic context.
The modification of digital images is now a fact, in particular in the domain of cyber-criminality. Modifications can be naive (slight modifications done in order to remove spots present in a facial pictures), controversial (removal of visual object's defaults on a online commercial website) or may have strong societal impacts (improbable meeting between two important politician persons).

This project takes place in the domain of image forensics. The main goal is to certify if an image is a clean or a doctored image. The associated decision process must be as reliable as possible because the digital proof of falsification is really credible only if the method of detection returns very limited number of errors.
In a first step, it is proposed to develop some methods to detect malicious modifications of digital images from two complementary approaches, a first approach based on the modelisation of the digital image acquisition process and a second approach based on machine learning. Considering that the two approaches are scientifically complementary, it will be then proposed to fuse them in order to form a unique detector of digital image integrity.


Wednesday, 12 December, 2018


The Commission made a commitment to launch a pilot phase under Horizon 2020 to help bring national cybersecurity centres together into a network.

Future Events

The Annual Computer Security Applications Conference (ACSAC) will be held in San Juan, Puerto Rico on 9-13 December 2019. 

09/12/2019 to 13/12/2019

The one-day Summit on the 13th of January brings together prominent security practitioners for in-depth talks focused on techniques that can be used to successfully identify, contain, and eliminate adversaries targeting your networks. Attendees will gain tools and methods to leverage as soon as they return to work.

The Summit will explore:

13/01/2020 to 19/01/2020