Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization

被引:70
作者
Zhuo, Long [1 ,2 ,3 ,4 ]
Tan, Shunquan [1 ,2 ,3 ,4 ,5 ]
Li, Bin [1 ,2 ,3 ,4 ]
Huang, Jiwu [1 ,2 ,3 ,4 ]
机构
[1] Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Guangdong Lab Artificial Intelligence & Digital S, Shenzhen 518060, Peoples R China
[4] Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518172, Peoples R China
[5] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
关键词
Forgery; Training; Location awareness; Feature extraction; Training data; Splicing; Semantics; Forgery localization; forgery attention; coarse-to-fine network; self-adversarial training; NETWORK; STEGANALYSIS;
D O I
10.1109/TIFS.2022.3152362
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Image editing techniques enable people to modify the content of an image without leaving visual traces and thus may cause serious security risks. Hence the detection and localization of these forgeries become quite necessary and challenging. Furthermore, unlike other tasks with extensive data, there is usually a lack of annotated forged images for training due to annotation difficulties. In this paper, we propose a self-adversarial training strategy and a reliable coarse-to-fine network that utilizes a self-attention mechanism to localize forged regions in forgery images. The self-attention module is based on a Channel-Wise High Pass Filter block (CW-HPF). CW-HPF leverages inter-channel relationships of features and extracts noise features by high pass filters. Based on the CW-HPF, a self-attention mechanism, called forgery attention, is proposed to capture rich contextual dependencies of intrinsic inconsistency extracted from tampered regions. Specifically, we append two types of attention modules on top of CW-HPF respectively to model internal interdependencies in spatial dimension and external dependencies among channels. We exploit a coarse-to-fine network to enhance the noise inconsistency between original and tampered regions. More importantly, to address the issue of insufficient training data, we design a self-adversarial training strategy that expands training data dynamically to achieve more robust performance. Specifically, in each training iteration, we perform adversarial attacks against our network to generate adversarial examples and train our model on them. The proposed method is based on the assumption of content-changed manipulations. Extensive experimental results demonstrate that our proposed algorithm steadily outperforms state-of-the-art methods by a clear margin in different benchmark datasets.
引用
收藏
页码:819 / 834
页数:16
相关论文
共 37 条
[1]   Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries [J].
Bappy, Jawadul H. ;
Simons, Cody ;
Nataraj, Lakshmanan ;
Manjunath, B. S. ;
Roy-Chowdhury, Amit K. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2019, 28 (07) :3286-3300
[2]   Exploiting Spatial Structure for Localizing Manipulated Image Regions [J].
Bappy, Jawadul H. ;
Roy-Chowdhury, Amit K. ;
Bunk, Jason ;
Nataraj, Lakshmanan ;
Manjunath, B. S. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :4980-4989
[3]  
Bianchi T, 2011, INT CONF ACOUST SPEE, P2444
[4]   The Prevalence of Inappropriate Image Duplication in Biomedical Research Publications [J].
Bik, Elisabeth M. ;
Casadevall, Arturo ;
Fang, Ferric C. .
MBIO, 2016, 7 (03)
[5]  
Bochkovskiy A., 2020, PREPRINT
[6]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[7]   Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts [J].
Ferrara, Pasquale ;
Bianchi, Tiziano ;
De Rosa, Alessia ;
Piva, Alessandro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) :1566-1577
[8]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[9]   Dual Attention Network for Scene Segmentation [J].
Fu, Jun ;
Liu, Jing ;
Tian, Haijie ;
Li, Yong ;
Bao, Yongjun ;
Fang, Zhiwei ;
Lu, Hanqing .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :3141-3149
[10]  
Ghanim TM, 2018, PROCEEDINGS OF 2018 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), P293, DOI 10.1109/ICCES.2018.8639420