STFD / README.md
Zegkim's picture
Update README.md
3d51aed verified
metadata
license: cc-by-4.0

STFD Dataset

This folder contains the STFD (Screenshot Text Forgery Dataset) used in the paper:

Learning to Locate the Text Forgery in Smartphone Screenshots Zeqin Yu, Bin Li, Yuzhen Lin, Jinhua Zeng, Jishen Zeng ICASSP 2023

Project page: https://github.com/ZeqinYu/STFL-Net

STFD is designed for text image forgery localization (T-IFL) in smartphone screenshots. The dataset contains tampered screenshots and their corresponding pixel-level forgery masks.


Dataset Structure

STFD/
├── 1_Copy-move/
│   ├── tamper/   # tampered screenshots
│   └── masks/    # binary forgery masks
├── 2_Splicing/
│   ├── tamper/
│   └── masks/
├── 3_Removal/
│   ├── tamper/
│   └── masks/
├── 4_Insertion/
│   ├── tamper/
│   └── masks/
└── 5_Replacement/
    ├── tamper/
    └── masks/

Each image in tamper/ has a corresponding mask with the same filename in masks/.

Example:

tamper/ffa3cedd4317633601c6fb82d94fc783.png
masks/ffa3cedd4317633601c6fb82d94fc783.png

The mask is a binary image, where:

  • 0 = non-tampered region
  • 255 = tampered region

Tampering Types

STFD contains five common screenshot text manipulation operations:

  1. Copy-Move: copy a text region and paste it to another location within the same image.
  2. Splicing: paste text regions from another image into the target image.
  3. Removal: remove existing text and fill the region using inpainting.
  4. Insertion: insert new text content into blank regions.
  5. Replacement: replace original text with newly generated text.

Screenshot Sources

The screenshots were captured from real devices to reflect realistic usage scenarios.

Category Description
Systems Android, HarmonyOS, iOS, Windows
Scenes Chat, Social Media, Mobile Payment, E-commerce, Online Banking, Maps & Transportation, Web Browsing, System Interfaces, Documents
Devices Realme Q3 Pro, Oppo Reno1, Honor 9, Honor V30, Vivo X21s, Samsung Note20 Ultra, Vivo X60, Honor 30-1, Xiaomi 9, Honor V20, Nova 8, OnePlus 9, Huawei Mate30, Honor 30-2, Honor 20 Pro, iPhone 7, iPad Air 3, iPad 2020, iPhone 12, iPhone XS, iPhone 11, iPhone SE2, iPhone 14 Pro, MacBook Air 2015, MacBook Pro 2017, Win10 Dell Optiplex 7080, Win11 Xiaomi Air14, Win10 Xiaomi Air14
Format PNG / JPEG

Citation

If you use this dataset in your research, please cite:

@inproceedings{yu2023learning,
  title        = {Learning to Locate the Text Forgery in Smartphone Screenshots},
  author       = {Yu, Zeqin and Li, Bin and Lin, Yuzhen and Zeng, Jinhua and Zeng, Jishen},
  booktitle    = {ICASSP 2023–2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
  pages        = {1--5},
  year         = {2023},
  organization = {IEEE}
}

License and Notice

  • This dataset is released for academic research purposes only.

  • All images are collected from real-world scenarios and have been manually screened to remove sensitive information.

  • If you believe that any image may contain unintended information leakage, please notify us so that we can remove it promptly. We kindly ask users not to redistribute such images.

  • For any concerns, please contact: Zeqin Yu (kimjyu@foxmail.com).