An image is not fake until it is identified as such. To do so, it has to be compared to a ground truth and fail.

The ground truth can be the event itself or, for lack of a time machine, the original photograph of the event recorded at the time.

There are three types of fake photos: 

  • The out-of-context photo. Real content but altered timeline, description. What is depicted is not what is really happening.
real image ( after the Japanese earthquake), wrong context
Real image ( after the Japanese earthquake), wrong context

 

  • The altered-content photo. Some of the elements inside the images have been changed. A face is replaced. Objects are added or removed.
Example of an altered Fake image
Example of an altered image. Graffiti and broken head are alterations.
  • The 100% created image. The image is a fabrication. It is a 100% creation from scratch.
Portrait generated by a GAN (generative adversarial network)
Portrait generated by a GAN (generative adversarial network). This person is not real.

Each is an attempt to convince viewers of the reality of an event by means of deception.

 In other terms, fake photos falsify an event in 3 ways:

  1. The event did happen, but not when and how is it is described—the out-of-context photo.
  2. The event did happen, but not how it is visible in the image—the altered-content photo.
  3. The event never happened—the 100% created image.

So bar the viewer being an actual witness of the event and having a perfect memory of it, which is a very rare, if not impossible occurrence, the best way to proving an image is fake is comparing it to the original photograph.

Both 1. and 2. use an original image as the base to their deception. For 3. things are more complicated as we will see later. If the deceiving picture can be compared to its original unaltered version, including associated metadata, it can be debunked. Thus establishing the original image as ground truth is primordial to exposing fake photos.

Popular methods for 1. and 2. are:

  • Immediately inscribing image into a distributed ledger ( Blockchain)
  • Keeping a catalog of unaltered raw files in a secure server
  • Web crawling with date certification
  • Watermarking images

Each method has advantage and shortcomings:

Blockchain carries an aura of impenetrable and hack-free security. However, it has its flaws.

First, the registered image is not the image but a hash of the picture. Those vary depending on who creates them. The same image can have a different hash. Thus while the blockchain might be an independent network of servers, the creation of the input information is proprietary to those who create it. Not independent, not free, and certainly not impervious to influences.

Also, a hash is not an image. The link between the hash and its corresponding image and original caption is also held in a private proprietary server.

In other words, blockchain is not as secure and certified as it claims. Example

Keeping a core catalog. The most popular solution today. Risks and limitations are obvious. Servers are private, can fail, and their content can be altered or deleted. It can also be hard to retrieve corresponding files because of poor indexing and search capabilities. However, the original image and associated original metadata are associated in one place, establishing a ground truth. Example

Imatag's invisible watermark can spot an image alteration without having to compare it with the original file.
Imatag’s invisible watermark can spot an image alteration without having to compare it with the original file.

Invisible watermarking. New and very promising. Certification travels with the image. If an image element is altered, it is easily detectable ( part of the watermark is missing) An instant number 2 killer. To debunk out of context images, the unique watermark can easily trace back to the original file and its original metadata. Ground truth can quickly be established if linked to a core catalog. Example

Date certification. Reverse visual search is the poor people tool to identify fake photos and one of the most in use. Dropping it into a Google image search will reveal ( almost) every instance of its publication. Finding earlier, if not the earliest publication can establish the ground truth photo. Issues here are various:

  • The oldest publication of the image might not be original and thus faked as well.
  • Web crawling doesn’t come with a date of publication certification. The “published” date can easily be edited and only pretend to be an earlier version.
  • The internet is vast, and web searches are not extensive. The search result will probably leave out many instances, including the largest social media sites.

Ironically, photography has evolved mostly as a tool to alter reality rather than to reproduce it with fidelity. Capturing it with the highest accuracy possible only to alter it with the most advanced computerized imaging options. In its quest for popularisation, it has used modification as its most potent seductive attribute. Today, image falsification in all its forms is a multi-billion dollar industry. Not so much for reproduction fidelity.

There is much catching up to do.

Author: Paul Melcher

Paul Melcher is a highly influential and visionary leader in visual tech, with 20+ years of experience in licensing, tech innovation, and entrepreneurship. He is the Managing Director of MelcherSystem and has held executive roles at Corbis, Stipple, and more. Melcher received a Digital Media Licensing Association Award and is a board member of Plus Coalition, Clippn, and Anthology, and has been named among the “100 most influential individuals in American photography”

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.