A preview of this full-text is provided by Springer Nature.
Content available from Multimedia Tools and Applications
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
Multimedia Tools and Applications
https://doi.org/10.1007/s11042-025-20684-7
Face image authentication scheme based onMTCNN andSLT
RashaThabit2 · MohanadA.Al‑Askari1· DunyaZekiMohammed3·
ElhamAbdulwahabAnaam4· ZainabH.Mahmood5· DinaJamalJabbar6·
ZahraaAqeelSalih7
Received: 20 July 2022 / Revised: 25 October 2023 / Accepted: 4 February 2025
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025
Abstract
DeepFakes and face image manipulation methods have been widely distributed in the
last few years and several techniques have been presented to check the authenticity of the
face image and detect manipulation if exists. Most of the available manipulation detec-
tion techniques have been successfully applied to reveal one type of manipulation under
specific conditions, however, many limitations and challenges can be encountered in this
field. To overcome some limitations and challenges, this paper presents a new face image
authentication (FIA) scheme based on Multi-Task Cascaded Conventional Neural Net-
works (MTCNN) and watermarking in Slantlet transform (SLT) domain. The proposed
FIA scheme has three main algorithms that are face detection and selection, embedding,
and extraction algorithms. Different block sizes have been used to divide the image into
non-overlapping blocks followed by classifying them into two groups that are blocks from
face area (FA) and blocks from the remaining area (RA) of the image. In the embedding
algorithms, the authentication information is generated from FA blocks and embedded in
the RA blocks. In the extraction algorithms, the embedded information is extracted from
RA blocks and compared with the calculated data from FA blocks to reveal manipulations
and localize the manipulated blocks if exist. Extensive experiments have been conducted
to evaluate the performance of the proposed FIA scheme for different face images. The
experimental work included tests for payload, capacity, visual quality, time complexity, and
localization of manipulations. The results proved the efficiency of the proposed scheme
in detecting and localizing different face image manipulations such as attributes attacks,
retouching attacks, expression swap, face swap, and morphing attacks. The proposed
scheme overcomes many limitations and it is 100% accurate in localizing the tampered
blocks which makes it a better candidate for practical applications.
Keywords DeepFakes detection· Face manipulation detection· Face manipulation
localization· Face image security· Multimedia forensics
Extended author information available on the last page of the article
Content courtesy of Springer Nature, terms of use apply. Rights reserved.