FAKE IMAGE
DETECTION SYSTEM
Digital Image Forensics

A Transparent Approach to Authenticity

Presented by Bilal Ahmad

The Authenticity Crisis

In an era of deepfakes and AI filters, seeing is no longer believing.


Digital Glitch Background

A Three-Tier Solution

Frontend • Authentication • Forensic Backend

Project Objectives

Mobile First

Develop a Flutter app for accessible, on-the-go verification.

Forensics

Use ELA (Error Level Analysis) & Metadata, not just opaque AI.

Deployment

Deploy a real PHP/MySQL backend on a custom domain.

Clarity

Provide visual proof of why an image is fake.

System Workflow

1

Upload

User selects image via Flutter App.

2

Process

Server runs ELA & EXIF checks.

3

Score

Forensic tests calculate trust score.

4

Result

App shows "Real" or "Fake" with visual map.

System Architecture

Flutter App
User Interface
Image Picker
Result Visualization
Firebase
Secure Login
User Session
Real-time Auth
Custom Server
PHP + MySQL
Forensic Algorithms
Hosting
Separation of concerns ensures security and scalability.

Why Forensics?

Black-Box AI

  • ❌ High GPU Costs
  • ❌ No Explanation provided
  • ❌ Requires huge datasets

Digital Forensics (Ours)

  • ✅ Lightweight (CPU only)
  • Explainable (See the edits)
  • ✅ Works on shared hosting

Project Uniqueness

No "Black Boxes"

Pure mathematical analysis (ELA) instead of guessing. We show you where the image was touched.

Real Deployment

Not just localhost. Fully deployed on a custom domain with a real database connection.

Cost Effective

Runs efficiently on low-cost shared hosting without needing expensive GPU cloud clusters.

Hybrid Stack

Seamlessly combines modern Flutter UI with robust, legacy-compatible PHP backend logic.

Technology Stack

Component Technology
Frontend Flutter SDK (Dart)
Backend PHP (GD Library / Imagick)
Database MySQL
Auth Firebase Authentication

Execution Plan

Phase 1: Foundation

Week 1 & 2

UI Design, Firebase Setup, Core PHP Forensic Scripts.

Phase 2: Integration

Week 3 & 4

API Linking, Result Visualization, Live Deployment.

Expected Outcomes

Cybersecurity Concept