A Noise Convolution Network for Tampering Detection

被引:0
作者
Xie, Zhiyao [1 ]
Yuan, Xiaochen [1 ]
Lam, Chan-Tong [1 ]
Huang, Guoheng [2 ]
机构
[1] Macao Polytech Univ, Fac Sci Appl, Macau, Peoples R China
[2] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou, Peoples R China
来源
ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PART X | 2023年 / 14263卷
关键词
Tampering Detection; Noise enhancement; Deep Learning; Neural Network;
D O I
10.1007/978-3-031-44204-9_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The vulnerability of digital images to tampering is an ongoing information security issue in the multimedia field. Thus, identifying tampered digital images and locating the tampered regions in the images can help improve the security of information dissemination. A deep fusion neural network named NC-Net is designed in this paper, introducing pattern noise as assistance to fully exploit the tampered features present on the tampered image. The incorporation of noise texture information enabled NC-Net to acquire deeper tampered image features during the training phase. The extracted noise is incorporated as a crucial component within the convolutional structure of the model, serving as a potent activation signal for the tampered region. The performance of NC-Net is confirmed through relevant experiments on publicly available tampered datasets, and outstanding results are achieved in comparison to other methods.
引用
收藏
页码:38 / 48
页数:11
相关论文
共 21 条
  • [1] [Anonymous], 2009, Columbia image splicing detection evaluation dataset
  • [2] Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
    Bappy, Jawadul H.
    Simons, Cody
    Nataraj, Lakshmanan
    Manjunath, B. S.
    Roy-Chowdhury, Amit K.
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2019, 28 (07) : 3286 - 3300
  • [3] Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
    Bayar, Belhassen
    Stamm, Matthew C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) : 2691 - 2706
  • [4] Image Manipulation Detection by Multi-View Multi-Scale Supervision
    Chen, Xinru
    Dong, Chengbo
    Ji, Jiaqi
    Cao, Juan
    Li, Xirong
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 14165 - 14173
  • [5] Efficient Dense-Field Copy-Move Forgery Detection
    Cozzolino, Davide
    Poggi, Giovanni
    Verdoliva, Luisa
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2284 - 2297
  • [6] Cozzolino D, 2015, IEEE INT WORKS INFOR
  • [7] Rich Models for Steganalysis of Digital Images
    Fridrich, Jessica
    Kodovsky, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 868 - 882
  • [8] He KM, 2017, IEEE I CONF COMP VIS, P2980, DOI [10.1109/ICCV.2017.322, 10.1109/TPAMI.2018.2844175]
  • [9] Jing Dong, 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), P422, DOI 10.1109/ChinaSIP.2013.6625374
  • [10] Krawetz N., 2007, HACKER FACTOR SOLUTI, V6, P2