{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:05:00Z","timestamp":1767625500390,"version":"build-2065373602"},"reference-count":20,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T00:00:00Z","timestamp":1628121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Funds through the Portuguese funding agency, FCT-Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UIDB\/50014\/2020"],"award-info":[{"award-number":["UIDB\/50014\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data"],"abstract":"<jats:p>Deepfake and manipulated digital photos and videos are being increasingly used in a myriad of cybercrimes. Ransomware, the dissemination of fake news, and digital kidnapping-related crimes are the most recurrent, in which tampered multimedia content has been the primordial disseminating vehicle. Digital forensic analysis tools are being widely used by criminal investigations to automate the identification of digital evidence in seized electronic equipment. The number of files to be processed and the complexity of the crimes under analysis have highlighted the need to employ efficient digital forensics techniques grounded on state-of-the-art technologies. Machine Learning (ML) researchers have been challenged to apply techniques and methods to improve the automatic detection of manipulated multimedia content. However, the implementation of such methods have not yet been massively incorporated into digital forensic tools, mostly due to the lack of realistic and well-structured datasets of photos and videos. The diversity and richness of the datasets are crucial to benchmark the ML models and to evaluate their appropriateness to be applied in real-world digital forensics applications. An example is the development of third-party modules for the widely used Autopsy digital forensic application. This paper presents a dataset obtained by extracting a set of simple features from genuine and manipulated photos and videos, which are part of state-of-the-art existing datasets. The resulting dataset is balanced, and each entry comprises a label and a vector of numeric values corresponding to the features extracted through a Discrete Fourier Transform (DFT). The dataset is available in a GitHub repository, and the total amount of photos and video frames is 40,588 and 12,400, respectively. The dataset was validated and benchmarked with deep learning Convolutional Neural Networks (CNN) and Support Vector Machines (SVM) methods; however, a plethora of other existing ones can be applied. Generically, the results show a better F1-score for CNN when comparing with SVM, both for photos and videos processing. CNN achieved an F1-score of 0.9968 and 0.8415 for photos and videos, respectively. Regarding SVM, the results obtained with 5-fold cross-validation are 0.9953 and 0.7955, respectively, for photos and videos processing. A set of methods written in Python is available for the researchers, namely to preprocess and extract the features from the original photos and videos files and to build the training and testing sets. Additional methods are also available to convert the original PKL files into CSV and TXT, which gives more flexibility for the ML researchers to use the dataset on existing ML frameworks and tools.<\/jats:p>","DOI":"10.3390\/data6080087","type":"journal-article","created":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T09:35:32Z","timestamp":1628156132000},"page":"87","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A Dataset of Photos and Videos for Digital Forensics Analysis Using Machine Learning Processing"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8307-4499","authenticated-orcid":false,"given":"Sara","family":"Ferreira","sequence":"first","affiliation":[{"name":"Department of Computer Science, Faculty of Sciences, University of Porto, 4169-007 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-6726","authenticated-orcid":false,"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Centre (CIIC), School of Technology and Management, Polytechnic of Leiria, 2411-901 Leiria, Portugal"},{"name":"INESC TEC, CRACS, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2348-8075","authenticated-orcid":false,"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Sciences, University of Porto, 4169-007 Porto, Portugal"},{"name":"INESC TEC, CRACS, 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,8,5]]},"reference":[{"key":"ref_1","unstructured":"Nguyen, T.T., Nguyen, C.M., Nguyen, D.T., Nguyen, D.T., and Nahavandi, S. (2019). Deep learning for deepfakes creation and detection. arXiv."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Niyishaka, P., and Bhagvati, C. (2018, January 17\u201319). Digital image forensics technique for copy-move forgery detection using dog and orb. Proceedings of the International Conference on Computer Vision and Graphics, Warsaw, Poland.","DOI":"10.1007\/978-3-030-00692-1_41"},{"key":"ref_3","unstructured":"Durall, R., Keuper, M., Pfreundt, F.J., and Keuper, J. (2019). Unmasking deepfakes with simple features. arXiv."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., and Lyu, S. (2020, January 14\u201319). Celeb-df: A large-scale challenging dataset for deepfake forensics. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ferreira, S., Antunes, M., and Correia, M.E. (2021). Exposing Manipulated Photos and Videos in Digital Forensics Analysis. J. Imaging, 7.","DOI":"10.3390\/jimaging7070102"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ferreira, S., Antunes, M., and Correia, M.E. (2021, January 10\u201313). Forensic analysis of tampered digital photos. Proceedings of the 25th Iberoamerican Congress on Pattern Recognition (CIARP), IARP, Porto, Portugal.","DOI":"10.1007\/978-3-030-93420-0_43"},{"key":"ref_7","unstructured":"O\u2019Shea, K., and Nash, R. (2015). An introduction to convolutional neural networks. arXiv."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Jafar, M.T., Ababneh, M., Al-Zoube, M., and Elhassan, A. (2020, January 7\u20139). Forensics and Analysis of Deepfake Videos. Proceedings of the IEEE 2020 11th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan.","DOI":"10.1109\/ICICS49469.2020.239493"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Castillo Camacho, I., and Wang, K. (2021). A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics. J. Imaging, 7.","DOI":"10.3390\/jimaging7040069"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, P., Baracchi, D., Ni, R., Zhao, Y., Argenti, F., and Piva, A. (2020). A survey of deep learning-based source image forensics. J. Imaging, 6.","DOI":"10.3390\/jimaging6030009"},{"key":"ref_11","unstructured":"Karras, T., Aila, T., Laine, S., and Lehtinen, J. (2017). Progressive growing of gans for improved quality, stability, and variation. arXiv."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., and Aila, T. (2019, January 15\u201320). A style-based generator architecture for generative adversarial networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref_13","unstructured":"(2021, August 04). 100k Faces Generated. Available online: https:\/\/generated.photos."},{"key":"ref_14","unstructured":"(2021, August 04). This Person Does Not Exist Website. Available online: https:\/\/thispersondoesnotexist.com."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wen, B., Zhu, Y., Subramanian, R., Ng, T.T., Shen, X., and Winkler, S. (2016, January 25\u201328). COVERAGE\u2014A novel database for copy-move forgery detection. Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA.","DOI":"10.1109\/ICIP.2016.7532339"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Hsu, Y.F., and Chang, S.F. (2006, January 9\u201312). Detecting image splicing using geometry invariants and camera characteristics consistency. Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, ON, Canada.","DOI":"10.1109\/ICME.2006.262447"},{"key":"ref_17","unstructured":"(2021, August 04). Photos-Videos-Manipulations-Dataset. Available online: https:\/\/github.com\/saraferreirascf\/Photos-Videos-Manipulations-Dataset."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.jvcir.2018.01.010","article-title":"Image splicing localization using a multi-task fully convolutional network (MFCN)","volume":"51","author":"Salloum","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chen, M., Liao, X., and Wu, M. (2021, August 04). PulseEdit: Editing Physiological Signal in Facial Videos for Privacy Protection. Available online: https:\/\/www.techrxiv.org\/articles\/preprint\/PulseEdit_Editing_Physiological_Signal_in_Facial_Videos_for_Privacy_Protection\/14647377.","DOI":"10.36227\/techrxiv.14647377.v4"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"Hossin","year":"2015","journal-title":"Int. J. Data Min. Knowl. Manag. Process."}],"container-title":["Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2306-5729\/6\/8\/87\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:41:06Z","timestamp":1760164866000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2306-5729\/6\/8\/87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,5]]},"references-count":20,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,8]]}},"alternative-id":["data6080087"],"URL":"https:\/\/doi.org\/10.3390\/data6080087","relation":{},"ISSN":["2306-5729"],"issn-type":[{"type":"electronic","value":"2306-5729"}],"subject":[],"published":{"date-parts":[[2021,8,5]]}}}