skip to main content
research-article

Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection

Authors Info & Claims
Published:17 December 2020Publication History
Skip Abstract Section

Abstract

The guarantee of social stability comes from many aspects of life, and image information security as one of them is being subjected to various malicious attacks. As a means of information attack, image splicing forgery refers to copying some areas of an image to another image to hide the traces of the original information and leads to grave consequences. Image splicing forgery is extremely complex since the attributes of the two images subjected to the pasting and copying operations are greatly different. In order to solve the issue mentioned above, we propose a method by applying a neural learning network controlled by multiple scales (MCNL-Net) based on U-Net to identify whether an image has been tampered and to locate the tampered regions. Firstly, the learning capacity of MCNL-Net is enhanced by the combination of a residual propagation module and a residual feedback module. An ingenious strategy is designed to control the size of local receptive field in each building block of MCNL-Net. The strategy makes MCNL-Net able to achieve properties and superiorities of multi-scale structure and learn specified features. For further improving the detection performance of MCNL-Net, a block attention mechanism is proposed to control the advanced degree of the input information in each building block. In addition, a MaxBlurPool method is applied into image splicing forgery detection for the first time, preserving the shift-equivariance of a convolutional neural network. Through experiments, we demonstrate that MCNL-Net can achieve more promising results and offer stronger robustness than the state-of-the-art splicing forgery detection methods.

References

  1. Anurag Arnab, Ondrej Miksik, and Philip H. S. Torr. 2018. On the robustness of semantic segmentation models to adversarial attacks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 888--897.Google ScholarGoogle Scholar
  2. Jawadul H. Bappy, Amit K. Roy-Chowdhury, Jason Bunk, Lakshmanan Nataraj, and B. S. Manjunath. 2017. Exploiting spatial structure for localizing manipulated image regions. In Proceedings of the IEEE International Conference on Computer Vision. 4970--4979.Google ScholarGoogle Scholar
  3. Xiuli Bi, Yang Wei, Bin Xiao, and Weisheng Li. 2019. RRU-Net: The ringed residual U-net for image splicing forgery detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 0--0.Google ScholarGoogle ScholarCross RefCross Ref
  4. Tiziano Bianchi and Alessandro Piva. 2012. Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 1003--1017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Wen Chen, Yun Q. Shi, and Wei Su. 2007. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505. International Society for Optics and Photonics, 65050R.Google ScholarGoogle Scholar
  6. Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. 2012. Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Transactions on Information Forensics and Security 7, 5 (2012), 1566--1577.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hongmei Gou, Ashwin Swaminathan, and Min Wu. 2007. Noise features for image tampering detection and steganalysis. In ICIP (6). Citeseer, 97--100.Google ScholarGoogle Scholar
  8. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770--778.Google ScholarGoogle ScholarCross RefCross Ref
  9. Yu-Feng Hsu and Shih-Fu Chang. 2006. Detecting image splicing using geometry invariants and camera characteristics consistency. In 2006 IEEE International Conference on Multimedia and Expo. IEEE, 549--552.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-excitation networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 7132--7141.Google ScholarGoogle ScholarCross RefCross Ref
  11. Minyoung Huh, Andrew Liu, Andrew Owens, and Alexei A. Efros. 2018. Fighting fake news: Image splice detection via learned self-consistency. In Proceedings of the European Conference on Computer Vision (ECCV’18). 101--117.Google ScholarGoogle Scholar
  12. Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167.Google ScholarGoogle Scholar
  13. Micah K. Johnson and Hany Farid. 2007. Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security 2, 3 (2007), 450--461.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Micah K. Johnson and Hany Farid. 2007. Exposing digital forgeries through specular highlights on the eye. In International Workshop on Information Hiding. Springer, 311--325.Google ScholarGoogle Scholar
  15. P. Korus and J. Huang. 2017. Multi-scale analysis strategies in PRNU-based tampering localization. IEEE Transactions on Information Forensics and Security 12, 4 (2017), 809--824.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zhouchen Lin, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. 2009. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42, 11 (2009), 2492--2501.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Bo Liu and Chi-Man Pun. 2018. Deep fusion network for splicing forgery localization. In ECCV Workshop. 15.Google ScholarGoogle Scholar
  18. Siwei Lyu, Xunyu Pan, and Xing Zhang. 2014. Exposing region splicing forgeries with blind local noise estimation. International Journal of Computer Vision 110, 2 (2014), 202--221.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Babak Mahdian and Stanislav Saic. 2008. Detection of resampling supplemented with noise inconsistencies analysis for image forensics. In International Conference on Computational Sciences and Its Applications (ICCSA’08). IEEE, 546--556.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Vinod Nair and Geoffrey E. Hinton. 2010. Rectified linear units improve restricted Boltzmann machines. In Proceedings of the 27th International Conference on Machine Learning (ICML’10). 807--814.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yuan Rao and Jiangqun Ni. 2016. A deep learning approach to detection of splicing and copy-move forgeries in images. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS’16). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  22. Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-net: Convolutional networks for biomedical image segmentation. In International Conference on Medical Image Computing and Computer-assisted Intervention. Springer, 234--241.Google ScholarGoogle ScholarCross RefCross Ref
  23. John Shore and Rodney Johnson. 1980. Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy. IEEE Transactions on Information Theory 26, 1 (1980), 26--37.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Zhenjun Tang, Xianquan Zhang, Xianxian Li, and Shichao Zhang. 2016. Robust image hashing with ring partition and invariant vector distance. IEEE Transactions on Information Forensics and Security 11, 1 (2016), 200--214.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. CASIA v2.0. 2009. Retrieved from http://forensics.idealtest.org/casiav2/.Google ScholarGoogle Scholar
  26. Wei Wang, Jing Dong, and Tieniu Tan. 2009. Effective image splicing detection based on image chroma. In 2009 16th IEEE International Conference on Image Processing (ICIP’09). IEEE, 1257--1260.Google ScholarGoogle ScholarCross RefCross Ref
  27. Xiaofeng Wang, Kemu Pang, Xiaorui Zhou, Yang Zhou, Lu Li, and Jianru Xue. 2015. A visual model-based perceptual image hash for content authentication. IEEE Transactions on Information Forensics and Security 10, 7 (2015), 1336--1349.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Yuxin Wu and Kaiming He. 2018. Group normalization. arXiv preprint arXiv:1803.08494.Google ScholarGoogle Scholar
  29. Bin Xiao, Yang Wei, Xiuli Bi, Weisheng Li, and Jianfeng Ma. 2020. Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Information Sciences 511 (2020), 172--191.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Saining Xie, Ross Girshick, Piotr Dollár, Zhuowen Tu, and Kaiming He. 2017. Aggregated residual transformations for deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1492--1500.Google ScholarGoogle ScholarCross RefCross Ref
  31. Cai-Ping Yan, Chi-Man Pun, and Xiao-Chen Yuan. 2016. Quaternion-based image hashing for adaptive tampering localization. IEEE Transactions on Information Forensics and Security 11, 12 (2016), 2664--2677.Google ScholarGoogle ScholarCross RefCross Ref
  32. Shuiming Ye, Qibin Sun, and Ee-Chien Chang. 2007. Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In 2007 IEEE International Conference on Multimedia and Expo. IEEE, 12--15.Google ScholarGoogle ScholarCross RefCross Ref
  33. Markos Zampoglou, Symeon Papadopoulos, and Yiannis Kompatsiaris. 2017. Large-scale evaluation of splicing localization algorithms for web images. Multimedia Tools and Applications 76, 4 (2017), 4801--4834.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Richard Zhang. 2019. Making convolutional networks shift-invariant again. arXiv preprint arXiv:1904.11486.Google ScholarGoogle Scholar
  35. Ying Zhang, Jonathan Goh, Lei Lei Win, and Vrizlynn L. L. Thing. 2016. Image region forgery detection: A deep learning approach. In SG-CRC. 1--11.Google ScholarGoogle Scholar
  36. Xudong Zhao, Jianhua Li, Shenghong Li, and Shilin Wang. 2010. Detecting digital image splicing in chroma spaces. In International Workshop on Digital Watermarking. Springer, 12--22.Google ScholarGoogle Scholar
  37. Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao. 2013. Robust hashing for image authentication using Zernike moments and local features. IEEE Transactions on Information Forensics and Security 8, 1 (2013), 55--63.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Peng Zhou, Xintong Han, Vlad I. Morariu, and Larry S. Davis. 2018. Learning rich features for image manipulation detection. arXiv preprint arXiv:1805.04953.Google ScholarGoogle Scholar

Index Terms

  1. Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!