Tri-Path Backbone Network for Image Manipulation Localization

被引:1
作者
Song, H. [1 ]
Lin, Baichuan [1 ]
Ye, D. [2 ]
机构
[1] Minist Publ Secur, Inst Forens Sci, Beijing 100038, Peoples R China
[2] Jiangsu Police Inst, Nanjing 220019, Jiangsu, Peoples R China
关键词
Feature extraction; Semantics; Location awareness; Task analysis; Forgery; Image coding; Feeds; Image forensics; tampering localization; triple-path backbone; dual-path sensing attention; FORGERIES;
D O I
10.1109/ACCESS.2024.3410974
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a novel Tri-Path Backbone Network (TPB-Net) and train it end-to-end to effectively detect multiple types of image manipulations. The key challenge for image manipulation localization lies in the difficulty and diversity of extracting forgery features. To address this, we adopt a Triple-path Interconnected Backbone (TIB) scheme as the feature extractor, which enables the strong feature detection capabilities. Furthermore, we design and introduce the Dual-path Compressed Sensing Attention (DCSA) module, that incorporates a dual-path attention mechanism. The DCSA module intelligently compresses channels in the spatial path and spatial information in the channel path. These compression operations lead to improved learning efficiency, enhanced representation effectiveness, and increased model robustness. TPB-Net offers an end-to-end framework comprising trainable modules, facilitating joint optimization and enabling the achievement of optimal performance. Through rigorous experiments conducted on four standard image manipulation datasets, we demonstrate the superior performance of our method compared to previous state-of-the-art approaches.
引用
收藏
页码:83217 / 83227
页数:11
相关论文
共 40 条
[1]   Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries [J].
Bappy, Jawadul H. ;
Simons, Cody ;
Nataraj, Lakshmanan ;
Manjunath, B. S. ;
Roy-Chowdhury, Amit K. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2019, 28 (07) :3286-3300
[2]   Exploiting Spatial Structure for Localizing Manipulated Image Regions [J].
Bappy, Jawadul H. ;
Roy-Chowdhury, Amit K. ;
Bunk, Jason ;
Nataraj, Lakshmanan ;
Manjunath, B. S. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :4980-4989
[3]   Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection [J].
Bayar, Belhassen ;
Stamm, Matthew C. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) :2691-2706
[4]  
Bianchi T, 2011, IEEE IMAGE PROC
[5]   Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts [J].
Bianchi, Tiziano ;
Piva, Alessandro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1003-1017
[6]   MVSS-Net: Multi-View Multi-Scale Supervised Networks for Image Manipulation Detection [J].
Dong, Chengbo ;
Chen, Xinru ;
Hu, Ruohan ;
Cao, Juan ;
Li, Xirong .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (03) :3539-3553
[7]   Encoder-decoder based convolutional neural networks for image forgery detection [J].
El Biach, Fatima Zahra ;
Iala, Imad ;
Laanaya, Hicham ;
Minaoui, Khalid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (16) :22611-22628
[8]  
Fan Y, 2015, IEEE IMAGE PROC, P2940, DOI 10.1109/ICIP.2015.7351341
[9]   Dual Attention Network for Scene Segmentation [J].
Fu, Jun ;
Liu, Jing ;
Tian, Haijie ;
Li, Yong ;
Bao, Yongjun ;
Fang, Zhiwei ;
Lu, Hanqing .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :3141-3149
[10]   Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, :1026-1034