Convolutional neural network initialization approaches for image manipulation detection

被引:11
作者
Camacho, Ivan Castillo [1 ]
Wang, Kai [1 ]
机构
[1] Univ Grenoble Alpes, GIPSA Lab, Grenoble INP, CNRS, F-38000 Grenoble, France
关键词
Image forensics; Neural network; Image manipulation detection; Convolutional filter; Variance stability; IDENTIFICATION;
D O I
10.1016/j.dsp.2021.103376
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays it is common to see image forgeries on almost every media in both professional and personal contexts. From visual retouches to deliberate fake scenes, the technology used to create image forgeries gets easier to use for all users. At the same time, different techniques to assess the authenticity of the content of an image have appeared by taking advantage of the deep learning paradigm. In this paper we propose two initialization approaches for Convolutional Neural Networks (CNNs) used for the detection of image manipulation operations. We focus on the variance stability for the output of a convolutional filter in CNN. Our first proposal is a scaling approach for first-layer convolutional kernels which can cope well with filters generated by different algorithms. Our second proposal is a random high-pass filter initialization approach for CNNs first convolutional layer. The first proposal explicitly computes simple statistical properties of the input signal, while the second approach incorporates the consideration of input statistics in the filter derivation without the need of carrying out explicit computation on the input. Experimental results show the utility of both approaches with improved performance in different image manipulation detection problems and on different CNN architectures. (C) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:17
相关论文
共 42 条
[1]  
[Anonymous], 2009, NATURAL IMAGE STAT P
[2]  
[Anonymous], INT C LEARNING REPRE
[3]   Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection [J].
Bayar, Belhassen ;
Stamm, Matthew C. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) :2691-2706
[4]   FlyMap: Interacting with Maps Projected from a Drone [J].
Brock, Anke M. ;
Chatain, Julia ;
Park, Michelle ;
Fang, Tommy ;
Hachet, Martin ;
Landay, James A. ;
Cauchard, Jessica R. .
PROCEEDINGS PERVASIVE DISPLAYS 2018: THE 7TH ACM INTERNATIONAL SYMPOSIUM ON PERVASIVE DISPLAYS, 2018,
[5]   A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics [J].
Camacho, Ivan Castillo ;
Wang, Kai .
JOURNAL OF IMAGING, 2021, 7 (04)
[6]   A Simple and Effective Initialization of CNN for Forensics of Image Processing Operations [J].
Camacho, Ivan Castillo ;
Wang, Kai .
IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2019, :107-112
[7]  
Chen B., 2017, ARXIV170902908 CORR, P1
[8]   Learning to See in the Dark [J].
Chen, Chen ;
Chen, Qifeng ;
Xu, Jia ;
Koltun, Vladlen .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :3291-3300
[9]   Median Filtering Forensics Based on Convolutional Neural Networks [J].
Chen, Jiansheng ;
Kang, Xiangui ;
Liu, Ye ;
Wang, Z. Jane .
IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (11) :1849-1853
[10]   Photographic Image Synthesis with Cascaded Refinement Networks [J].
Chen, Qifeng ;
Koltun, Vladlen .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :1520-1529