Using Machine Learning To Spot Photoshopped Images

Experts around the world are getting increasingly worried about new AI tools that make it easier than ever to edit images and videos — especially with social media’s power to share shocking content quickly and without fact-checking. Some of those tools are being developed by Adobe, but the company is also working on an antidote of sorts by researching how machine learning can be used to automatically spot edited pictures.

The company’s latest work, showcased this month at the CVPR computer vision conference, demonstrates how digital forensics done by humans can be automated by machines in much less time.

The research paper does not represent a breakthrough in the field, and it’s not yet available as a commercial product, but it’s interesting to see Adobe — a name synonymous with image editing — take an interest in this line of work.

Speaking to The Verge, a spokesperson for the company said that this was an “early-stage research project,” but in the future, the company wants to play a role in “developing technology that helps monitor and verify authenticity of digital media.” Exactly what this might mean isn’t clear, since Adobe has never before released software designed to spot fake images. But, the company points to its work with law enforcement (using digital forensics to help find missing children, for example) as evidence of its responsible attitude toward its technology.

The new research paper shows how machine learning can be used to identify three common types of image manipulation: splicing, where two parts of different images are combined; cloning, where objects within an image are copy and pasted; and removal, when an object is edited out altogether.

To spot this sort of tampering, digital forensics experts typically look for clues in hidden layers of the image. When these sorts of edits are made, they leave behind digital artifacts, like inconsistencies in the random variations in color and brightness created by image sensors (also known as image noise). When you splice together two different images, for example, or copy and paste an object from one part of an image to another, this background noise doesn’t match, like a stain on a wall covered with a slightly different paint color.

As with many other machine learning systems, Adobe’s was taught using a large dataset of edited images. From this, it learned to spot the common patterns that indicate tampering. It scored higher in some tests than similar systems built by other teams, but not dramatically so. However, the research has no direct application in spotting deepfakes, a new breed of edited videos created using artificial intelligence.

“The benefit of these new ML approaches is that they hold the potential to discover artifacts that are not obvious and not previously known,” digital forensics expert Hany Farid told The Verge. “The drawback of these approaches is that they are only as good as the training data fed into the networks, and are, for now at least, less likely to learn higher-level artifacts like inconsistencies in the geometry of shadows and reflections.”

These caveats aside, it’s good to see more research being done that can help us spot digital fakes. If those sounding the alarm are right and we’re headed to some sort of post-truth world, we’re going to need all the tools we can get to sort fact from fiction. AI can hurt, but it can help as well.

The Verge:

You Might Also Read:

Six Benefits From Artificial Intelligence & Machine Learning

 

« White House Reorganisation Addresses Cyber Workforce Gap
US Accuses Russia Of Interfering With Undersea Cables »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.