Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning

被引:2
作者
Jonker, Simon [1 ]
Jelstrup, Malthe [1 ]
Meng, Weizhi [1 ]
Lampe, Brooke [1 ]
机构
[1] Tech Univ Denmark, DTU Compute, Richard Petersens Plads, DK-2800 Lyngby, Denmark
关键词
Multimedia data integrity; image forgery; fake news; post editing; fine tuning; transfer learning;
D O I
10.1145/3633284
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the domain of general image forgery detection, a myriad of different classification solutions have been developed to distinguish a "tampered" image from a "pristine" image. In this work, we aim to develop a new method to tackle the problem of binary image forgery detection. Our approach builds upon the extensive training that state-of-the-art image classification models have undergone on regular images from the ImageNet dataset, and transfers that knowledge to the image forgery detection space. By leveraging transfer learning and fine tuning, we can fit state-of-the-art image classification models to the forgery detection task. We train the models on a diverse and evenly distributed image forgery dataset. With five models-EfficientNetB0, VGG16, Xception, ResNet50V2, and NASNet-Large-we transferred and adapted pre-trained knowledge from ImageNet to the forgery detection task. Each model was fitted, fine-tuned, and evaluated according to a set of performance metrics. Our evaluation demonstrated the efficacy of large-scale image classification models-paired with transfer learning and fine tuning-at detecting image forgeries. When pitted against a previously unseen dataset, the best-performing model of EfficientNetB0 could achieve an accuracy rate of nearly 89.7%.
引用
收藏
页数:22
相关论文
共 46 条
[1]  
Baviskar M., 2022, P 2022 INT C COMP CO, P1
[2]  
Benhamza H., 2021, 2021 INT C INF SYST, P1
[3]   Threshold identity authentication signature: Impersonation prevention in social network services [J].
Chen, Zhanwen ;
Chen, Jiageng ;
Meng, Weizhi .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16)
[4]   A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection [J].
Chierchia, Giovanni ;
Poggi, Giovanni ;
Sansone, Carlo ;
Verdoliva, Luisa .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :554-567
[5]  
Choi HY, 2017, INT CONF SYST SIGNAL
[6]  
Cristin R., 2022, Lecture Notes in Electrical Engineering, V907, DOI [10.1007/978-981-19-4687-5_51, DOI 10.1007/978-981-19-4687-5_51]
[7]   Image Splicing Detection based on Deep Convolutional Neural Network and Transfer Learning [J].
Das, Debjit ;
Naskar, Ruchira .
2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
[8]  
Ernawati M., 2022, P 2022 6 INT C INF C, P134
[9]   ViXNet: Vision Transformer with Xception Network for deepfakes based video and image forgery detection [J].
Ganguly, Shreyan ;
Ganguly, Aditya ;
Mohiuddin, Sk ;
Malakar, Samir ;
Sarkar, Ram .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 210
[10]   Image Forgery Detection by CNN and Pretrained VGG16 Model [J].
Gupta, Pranjal Raaj ;
Sharma, Disha ;
Goel, Nidhi .
PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 :141-152