Image Forgery Detection Algorithm Based on Cascaded Convolutional Neural Network

被引:3
|
作者
Bi Xiuli [1 ]
Wei Yang [1 ]
Xiao Bin [1 ]
Li Weisheng [1 ]
Ma Jianfeng [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Computat Intelligence, Chongqing 400065, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Image forgery detection; Cascaded convolutional neural network; Shallow layers and thin neurons; Cascaded network structure; Adaptive filtering post-processing;
D O I
10.11999/JEIT190043
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The image forgery detection algorithm based on convolutional neural network can implement the image forgery detection that does not depend on a single image attribute by using the learning ability of convolutional neural network, and make up for the defect that the previous image forgery detection algorithm relies on a single image attribute and has low applicability. Although the image forgery detection algorithm using a single network structure of deep layers and multiple neurons can learn more advanced semantic information, the result of detecting and locating forgery regions is not ideal. In this paper, an image forgery detection algorithm based on cascaded convolutional neural network is proposed. Based on the general characteristics exhibited by convolutional neural network, and then the deeper characteristics are further explored. The cascaded network structure of shallow layers and thin neurons figures out the defect of the single network structure of deep layers and multiple neurons in image forgery detection. The proposed detection algorithm in this paper consists of two parts: the cascade convolutional neural network and the adaptive filtering post-processing . The cascaded convolutional neural network realizes hierarchical forgery regions localization, and then the adaptive filtering post-processing further optimizes the detection result of the cascaded convolutional neural network. Through experimental comparison, the proposed detection algorithm shows better detection results and has higher robustness.
引用
收藏
页码:2987 / 2994
页数:8
相关论文
共 17 条
  • [1] [Anonymous], 2016 IEEE International Workshop on Information Forensics and Security (WIFS), DOI DOI 10.1109/WIFS.2016.7823911
  • [2] Exploiting Spatial Structure for Localizing Manipulated Image Regions
    Bappy, Jawadul H.
    Roy-Chowdhury, Amit K.
    Bunk, Jason
    Nataraj, Lakshmanan
    Manjunath, B. S.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, : 4980 - 4989
  • [3] The Quickhull algorithm for convex hulls
    Barber, CB
    Dobkin, DP
    Huhdanpaa, H
    [J]. ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 1996, 22 (04): : 469 - 483
  • [4] Beeferman D., 2000, Proceedings. KDD-2000. Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P407, DOI 10.1145/347090.347176
  • [5] Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
    Bianchi, Tiziano
    Piva, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1003 - 1017
  • [7] Exposing Digital Forgeries From JPEG Ghosts
    Farid, Hany
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) : 154 - 160
  • [8] He K., 2016, IEEE C COMPUT VIS PA, DOI [10.1007/978-3-319-46493-0_38, DOI 10.1007/978-3-319-46493-0_38, DOI 10.1109/CVPR.2016.90]
  • [9] HUH M, 2018, 15 EUR C COMP VIS MU, P106, DOI [10.1007/978-3-030-01252-6_7, DOI 10.1007/978-3-030-01252-6_7]
  • [10] Ioffe S, 2015, 32 INT C MACH LEARN