A Serial Image Copy-Move Forgery Localization Scheme With Source/Target Distinguishment

被引:87
作者
Chen, Beijing [1 ,2 ,3 ]
Tan, Weijin [1 ,2 ,3 ]
Coatrieux, Gouenou [4 ]
Zheng, Yuhui [1 ,2 ,3 ]
Shi, Yun-Qing [5 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Minist Educ, Engn Res Ctr Digital Forens, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Key Lab Big Data Anal Technol, Nanjing 210044, Jiangsu, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Jiangsu, Peoples R China
[4] IMT Atlantique Bretagne Pays Loire, INSERM, UMR1101, LaTIM, F-29000 Brest, France
[5] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
中国国家自然科学基金;
关键词
Convolution; Feature extraction; Forgery; Correlation; Standards; Task analysis; Decoding; Copy-move; image forgery; deep neural network; atrous convolution; attention mechanism;
D O I
10.1109/TMM.2020.3026868
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we improve the parallel deep neural network (DNN) scheme BusterNet for image copy-move forgery localization with source/target region distinguishment. BusterNet is based on two branches, i.e., Simi-Det and Mani-Det, and suffers from two main drawbacks: (a) it should ensure that both branches correctly locate regions; (b) the Simi-Det branch only extracts single-level and low-resolution features using VGG16 with four pooling layers. To ensure the identification of the source and target regions, we introduce two subnetworks that are constructed serially: the copy-move similarity detection network (CMSDNet) and the source/target region distinguishment network (STRDNet). Regarding the second drawback, the CMSDNet subnetwork improves Simi-Det by removing the last pooling layer in VGG16 and by introducing atrous convolution into VGG16 to preserve field-of-views of filters after the removal of the fourth pooling layer; double-level self-correlation is also considered for matching hierarchical features. Moreover, atrous spatial pyramid pooling and attention mechanism allow the capture of multiscale features and provide evidence for important information. Finally, STRDNet is designed to determine the similar regions obtained from CMSDNet directly as tampered regions and untampered regions. It determines regions at the image-level rather than at the pixel-level as made by Mani-Det of BusterNet. Experimental results on four publicly available datasets (new synthetic dataset, CASIA, CoMoFoD, and COVERAGE) demonstrate that the proposed algorithm is superior to the state-of-the-art algorithms in terms of similarity detection ability and source/target distinguishment ability.
引用
收藏
页码:3506 / 3517
页数:12
相关论文
共 37 条
[11]  
Dong Jing., 2011, CASIA TAMPERED IMAGE
[12]  
Fridrich A. J., 2003, Int. J. Comput. Sci. Issues, V3, P55
[13]   Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur [J].
Kakar, Pravin ;
Sudha, N. ;
Ser, Wee .
IEEE TRANSACTIONS ON MULTIMEDIA, 2011, 13 (03) :443-452
[14]  
Larochelle H., 2010, ADV NEURAL INF PROCE, P1243
[15]   Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching [J].
Li, Yuanman ;
Zhou, Jiantao .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1307-1322
[16]   Coarse-to-Fine Localization of Temporal Action Proposals [J].
Long, Fuchen ;
Yao, Ting ;
Qiu, Zhaofan ;
Tian, Xinmei ;
Mei, Tao ;
Luo, Jiebo .
IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 22 (06) :1577-1590
[17]   Distinctive image features from scale-invariant keypoints [J].
Lowe, DG .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2004, 60 (02) :91-110
[18]   Passive copy move image forgery detection using undecimated dyadic wavelet transform [J].
Muhammad, Ghulam ;
Hussain, Muhammad ;
Bebis, George .
DIGITAL INVESTIGATION, 2012, 9 (01) :49-57
[19]   CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network [J].
Peng, Fei ;
Yin, Li-Ping ;
Zhang, Le-Bing ;
Long, Min .
IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 22 (10) :2511-2525
[20]  
Popescu A.C., 2004, Technical report TR2004-515, P1