A Serial Image Copy-Move Forgery Localization Scheme With Source/Target Distinguishment

被引:87
作者
Chen, Beijing [1 ,2 ,3 ]
Tan, Weijin [1 ,2 ,3 ]
Coatrieux, Gouenou [4 ]
Zheng, Yuhui [1 ,2 ,3 ]
Shi, Yun-Qing [5 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Minist Educ, Engn Res Ctr Digital Forens, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Big Data Anal Technol, Nanjing 210044, Jiangsu, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Jiangsu, Peoples R China
[4] IMT Atlantique Bretagne Pays Loire, INSERM, UMR1101, LaTIM, F-29000 Brest, France
[5] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
中国国家自然科学基金;
关键词
Convolution; Feature extraction; Forgery; Correlation; Standards; Task analysis; Decoding; Copy-move; image forgery; deep neural network; atrous convolution; attention mechanism;
D O I
10.1109/TMM.2020.3026868
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we improve the parallel deep neural network (DNN) scheme BusterNet for image copy-move forgery localization with source/target region distinguishment. BusterNet is based on two branches, i.e., Simi-Det and Mani-Det, and suffers from two main drawbacks: (a) it should ensure that both branches correctly locate regions; (b) the Simi-Det branch only extracts single-level and low-resolution features using VGG16 with four pooling layers. To ensure the identification of the source and target regions, we introduce two subnetworks that are constructed serially: the copy-move similarity detection network (CMSDNet) and the source/target region distinguishment network (STRDNet). Regarding the second drawback, the CMSDNet subnetwork improves Simi-Det by removing the last pooling layer in VGG16 and by introducing atrous convolution into VGG16 to preserve field-of-views of filters after the removal of the fourth pooling layer; double-level self-correlation is also considered for matching hierarchical features. Moreover, atrous spatial pyramid pooling and attention mechanism allow the capture of multiscale features and provide evidence for important information. Finally, STRDNet is designed to determine the similar regions obtained from CMSDNet directly as tampered regions and untampered regions. It determines regions at the image-level rather than at the pixel-level as made by Mani-Det of BusterNet. Experimental results on four publicly available datasets (new synthetic dataset, CASIA, CoMoFoD, and COVERAGE) demonstrate that the proposed algorithm is superior to the state-of-the-art algorithms in terms of similarity detection ability and source/target distinguishment ability.
引用
收藏
页码:3506 / 3517
页数:12
相关论文
共 37 条
[1]  
[Anonymous], 2014, Comput. Sci.
[2]  
[Anonymous], 2011, Int. J. Comput. Sci. Issues.
[3]   Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection [J].
Bayar, Belhassen ;
Stamm, Matthew C. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) :2691-2706
[4]   JS']JSNet: A simulation network of JPEG lossy compression and restoration for robust image watermarking against JPEG attack [J].
Chen, Beijing ;
Wu, Yunqing ;
Coatrieux, Gouenou ;
Chen, Xiao ;
Zheng, Yuhui .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2020, 197
[5]   Fractional quaternion cosine transform and its application in color image copy-move forgery detection [J].
Chen, Beijing ;
Yu, Ming ;
Su, Qingtang ;
Li, Leida .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) :8057-8073
[6]   Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection [J].
Chen, Beijing ;
Yu, Ming ;
Su, Qingtang ;
Shim, Hiuk Jae ;
Shi, Yun-Qing .
IEEE ACCESS, 2018, 6 :56637-56646
[7]   DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs [J].
Chen, Liang-Chieh ;
Papandreou, George ;
Kokkinos, Iasonas ;
Murphy, Kevin ;
Yuille, Alan L. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2018, 40 (04) :834-848
[8]  
Chen LB, 2017, IEEE INT SYMP NANO, P1, DOI 10.1109/NANOARCH.2017.8053709
[9]  
Christlein V., 2012, IEEE T INF FOREN SEC, V7, P1841, DOI DOI 10.1109/TIFS.2012.2218597
[10]  
Cozzolino D., 2015, IEEE T INF FOREN SEC, V10, P2284, DOI DOI 10.1109/TIFS.2015.2455334