Abstract
The guarantee of social stability comes from many aspects of life, and image information security as one of them is being subjected to various malicious attacks. As a means of information attack, image splicing forgery refers to copying some areas of an image to another image to hide the traces of the original information and leads to grave consequences. Image splicing forgery is extremely complex since the attributes of the two images subjected to the pasting and copying operations are greatly different. In order to solve the issue mentioned above, we propose a method by applying a neural learning network controlled by multiple scales (MCNL-Net) based on U-Net to identify whether an image has been tampered and to locate the tampered regions. Firstly, the learning capacity of MCNL-Net is enhanced by the combination of a residual propagation module and a residual feedback module. An ingenious strategy is designed to control the size of local receptive field in each building block of MCNL-Net. The strategy makes MCNL-Net able to achieve properties and superiorities of multi-scale structure and learn specified features. For further improving the detection performance of MCNL-Net, a block attention mechanism is proposed to control the advanced degree of the input information in each building block. In addition, a MaxBlurPool method is applied into image splicing forgery detection for the first time, preserving the shift-equivariance of a convolutional neural network. Through experiments, we demonstrate that MCNL-Net can achieve more promising results and offer stronger robustness than the state-of-the-art splicing forgery detection methods.
- Anurag Arnab, Ondrej Miksik, and Philip H. S. Torr. 2018. On the robustness of semantic segmentation models to adversarial attacks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 888--897.Google Scholar
- Jawadul H. Bappy, Amit K. Roy-Chowdhury, Jason Bunk, Lakshmanan Nataraj, and B. S. Manjunath. 2017. Exploiting spatial structure for localizing manipulated image regions. In Proceedings of the IEEE International Conference on Computer Vision. 4970--4979.Google Scholar
- Xiuli Bi, Yang Wei, Bin Xiao, and Weisheng Li. 2019. RRU-Net: The ringed residual U-net for image splicing forgery detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 0--0.Google Scholar
Cross Ref
- Tiziano Bianchi and Alessandro Piva. 2012. Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 1003--1017.Google Scholar
Digital Library
- Wen Chen, Yun Q. Shi, and Wei Su. 2007. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505. International Society for Optics and Photonics, 65050R.Google Scholar
- Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. 2012. Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Transactions on Information Forensics and Security 7, 5 (2012), 1566--1577.Google Scholar
Digital Library
- Hongmei Gou, Ashwin Swaminathan, and Min Wu. 2007. Noise features for image tampering detection and steganalysis. In ICIP (6). Citeseer, 97--100.Google Scholar
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770--778.Google Scholar
Cross Ref
- Yu-Feng Hsu and Shih-Fu Chang. 2006. Detecting image splicing using geometry invariants and camera characteristics consistency. In 2006 IEEE International Conference on Multimedia and Expo. IEEE, 549--552.Google Scholar
Cross Ref
- Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-excitation networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 7132--7141.Google Scholar
Cross Ref
- Minyoung Huh, Andrew Liu, Andrew Owens, and Alexei A. Efros. 2018. Fighting fake news: Image splice detection via learned self-consistency. In Proceedings of the European Conference on Computer Vision (ECCV’18). 101--117.Google Scholar
- Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167.Google Scholar
- Micah K. Johnson and Hany Farid. 2007. Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security 2, 3 (2007), 450--461.Google Scholar
Digital Library
- Micah K. Johnson and Hany Farid. 2007. Exposing digital forgeries through specular highlights on the eye. In International Workshop on Information Hiding. Springer, 311--325.Google Scholar
- P. Korus and J. Huang. 2017. Multi-scale analysis strategies in PRNU-based tampering localization. IEEE Transactions on Information Forensics and Security 12, 4 (2017), 809--824.Google Scholar
Digital Library
- Zhouchen Lin, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. 2009. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42, 11 (2009), 2492--2501.Google Scholar
Digital Library
- Bo Liu and Chi-Man Pun. 2018. Deep fusion network for splicing forgery localization. In ECCV Workshop. 15.Google Scholar
- Siwei Lyu, Xunyu Pan, and Xing Zhang. 2014. Exposing region splicing forgeries with blind local noise estimation. International Journal of Computer Vision 110, 2 (2014), 202--221.Google Scholar
Digital Library
- Babak Mahdian and Stanislav Saic. 2008. Detection of resampling supplemented with noise inconsistencies analysis for image forensics. In International Conference on Computational Sciences and Its Applications (ICCSA’08). IEEE, 546--556.Google Scholar
Digital Library
- Vinod Nair and Geoffrey E. Hinton. 2010. Rectified linear units improve restricted Boltzmann machines. In Proceedings of the 27th International Conference on Machine Learning (ICML’10). 807--814.Google Scholar
Digital Library
- Yuan Rao and Jiangqun Ni. 2016. A deep learning approach to detection of splicing and copy-move forgeries in images. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS’16). IEEE, 1--6.Google Scholar
Cross Ref
- Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-net: Convolutional networks for biomedical image segmentation. In International Conference on Medical Image Computing and Computer-assisted Intervention. Springer, 234--241.Google Scholar
Cross Ref
- John Shore and Rodney Johnson. 1980. Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy. IEEE Transactions on Information Theory 26, 1 (1980), 26--37.Google Scholar
Digital Library
- Zhenjun Tang, Xianquan Zhang, Xianxian Li, and Shichao Zhang. 2016. Robust image hashing with ring partition and invariant vector distance. IEEE Transactions on Information Forensics and Security 11, 1 (2016), 200--214.Google Scholar
Digital Library
- CASIA v2.0. 2009. Retrieved from http://forensics.idealtest.org/casiav2/.Google Scholar
- Wei Wang, Jing Dong, and Tieniu Tan. 2009. Effective image splicing detection based on image chroma. In 2009 16th IEEE International Conference on Image Processing (ICIP’09). IEEE, 1257--1260.Google Scholar
Cross Ref
- Xiaofeng Wang, Kemu Pang, Xiaorui Zhou, Yang Zhou, Lu Li, and Jianru Xue. 2015. A visual model-based perceptual image hash for content authentication. IEEE Transactions on Information Forensics and Security 10, 7 (2015), 1336--1349.Google Scholar
Digital Library
- Yuxin Wu and Kaiming He. 2018. Group normalization. arXiv preprint arXiv:1803.08494.Google Scholar
- Bin Xiao, Yang Wei, Xiuli Bi, Weisheng Li, and Jianfeng Ma. 2020. Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Information Sciences 511 (2020), 172--191.Google Scholar
Digital Library
- Saining Xie, Ross Girshick, Piotr Dollár, Zhuowen Tu, and Kaiming He. 2017. Aggregated residual transformations for deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1492--1500.Google Scholar
Cross Ref
- Cai-Ping Yan, Chi-Man Pun, and Xiao-Chen Yuan. 2016. Quaternion-based image hashing for adaptive tampering localization. IEEE Transactions on Information Forensics and Security 11, 12 (2016), 2664--2677.Google Scholar
Cross Ref
- Shuiming Ye, Qibin Sun, and Ee-Chien Chang. 2007. Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In 2007 IEEE International Conference on Multimedia and Expo. IEEE, 12--15.Google Scholar
Cross Ref
- Markos Zampoglou, Symeon Papadopoulos, and Yiannis Kompatsiaris. 2017. Large-scale evaluation of splicing localization algorithms for web images. Multimedia Tools and Applications 76, 4 (2017), 4801--4834.Google Scholar
Digital Library
- Richard Zhang. 2019. Making convolutional networks shift-invariant again. arXiv preprint arXiv:1904.11486.Google Scholar
- Ying Zhang, Jonathan Goh, Lei Lei Win, and Vrizlynn L. L. Thing. 2016. Image region forgery detection: A deep learning approach. In SG-CRC. 1--11.Google Scholar
- Xudong Zhao, Jianhua Li, Shenghong Li, and Shilin Wang. 2010. Detecting digital image splicing in chroma spaces. In International Workshop on Digital Watermarking. Springer, 12--22.Google Scholar
- Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao. 2013. Robust hashing for image authentication using Zernike moments and local features. IEEE Transactions on Information Forensics and Security 8, 1 (2013), 55--63.Google Scholar
Digital Library
- Peng Zhou, Xintong Han, Vlad I. Morariu, and Larry S. Davis. 2018. Learning rich features for image manipulation detection. arXiv preprint arXiv:1805.04953.Google Scholar
Index Terms
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection
Recommendations
An integrated method of copy-move and splicing for image forgery detection
Splicing and copy-move are two well known methods of passive image forgery. In this paper, splicing and copy-move forgery detection are performed simultaneously on the same database CASIA v1.0 and CASIA v2.0. Initially, a suspicious image is taken and ...
Image splicing forgery detection using noise level estimation
AbstractDigital image forgery has become one of the serious issues in today’s era. Digital images can be forged in several ways. Image splicing is a simple and most commonly used forgery technique. In image splicing, two or more images are used to create ...
DCU-Net: a dual-channel U-shaped network for image splicing forgery detection
AbstractThe detection and location of image splicing forgery are a challenging task in the field of image forensics. It is to study whether an image contains a suspicious tampered area pasted from another image. In this paper, we propose a new image ...






Comments