Enhanced copy-move forgery detection using deep convolutional neural network (DCNN) employing the ResNet-101 transfer learning model

被引:14
作者
Vaishali, Sharma [1 ]
Neetu, Singh [1 ]
机构
[1] Jaypee Inst informat & technol, Elect & Commun, Ghaziabad 201309, Uttar Pradesh, India
关键词
Hyper-parameters; Cyclical learning rate; Forensics; Deep convolutional neural network; Authentication; Vanishing and exploding gradients; ROBUST-DETECTION; ALGORITHM; DCT;
D O I
10.1007/s11042-023-15724-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of high-quality false images on social media sites calls for research on legitimate image recognition systems. Copy-move forgery (CMF), which involves copying portions of an image, is one of the most commonly used image altering methods. Due to the problem of exploding and vanishing gradients, the present Convolutional Neural Network (CNN) model must be trained for up to 100 epochs to achieve the greatest accuracy. In this work, a deep CNN (DCNN) model using the residual network with 101 deep layers has been used. In order to solve the problem of exploding and disappearing gradients, the concept of skip connections has been included in the residual network. In addition, in order to maximize the performance of the suggested ResNet-101 model, the cyclical learning rate (CLR) hyper-parameter is utilized to further tune the model. The model was trained and evaluated using a variety of datasets, including MICC-F600, MICC-F2000, MICC-F220, and CoMoFoD v2. Accuracy, error rate, true positive rate (TPR), false positive rate (FPR), true negative rate (TNR), and false negative rate (FNR) were analyzed quantitatively. The proposed model achieves highest accuracy of 97.75% only after training the model for 5 epochs only for CoMoFoD v2 dataset. For MICC-F220, MICC-F600 and MICC-F2000 datasets the achieved accuracy was 96.09%, 97.63% and 96.87% respectively only after training the model up to 10 epochs. In order to demonstrate the efficacy of the suggested approach, a comparative study with various state-of-the-art-models available in the literature has been presented.
引用
收藏
页码:10839 / 10863
页数:25
相关论文
共 41 条
[1]   Copy-Move Forgery Detection and Localization Using a Generative Adversarial Network and Convolutional Neural-Network [J].
Abdalla, Younis ;
Iqbal, M. Tariq ;
Shehata, Mohamed .
INFORMATION, 2019, 10 (09)
[2]  
ABIDIN AB, 2019, 2019 6 INT C RES INN, P1
[3]   An efficient copy move forgery detection using deep learning feature extraction and matching algorithm [J].
Agarwal, Ritu ;
Verma, Om Prakash .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) :7355-7376
[4]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[5]   DETECTING MULTIPLE COPIES IN TAMPERED IMAGES [J].
Ardizzone, E. ;
Bruno, A. ;
Mazzola, G. .
2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, :2117-2120
[6]   Copy-Move Forgery Detection by Matching Triangles of Keypoints [J].
Ardizzone, Edoardo ;
Bruno, Alessandro ;
Mazzola, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2084-2094
[7]  
Bashar M, 2010, IEEE Trans Image Process, DOI 10.1109/TIP.2010.2046599
[8]   Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (08) :1759-1770
[9]   A robust detection algorithm for copy-move forgery in digital images [J].
Cao, Yanjun ;
Gao, Tiegang ;
Fan, Li ;
Yang, Qunting .
FORENSIC SCIENCE INTERNATIONAL, 2012, 214 (1-3) :33-43
[10]   Survey On Keypoint Based Copy-move Forgery Detection Methods On Image [J].
Chauhan, Devanshi ;
Kasat, Dipali ;
Jain, Sanjeev ;
Thakare, Vilas .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 :206-212