DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization

被引:115
作者
Islam, Ashraful [1 ]
Long, Chengjiang [2 ]
Basharat, Arslan [2 ]
Hoogs, Anthony [2 ]
机构
[1] Rensselaer Polytech Inst, Troy, NY USA
[2] Kitware Inc, Clifton Pk, NY 12065 USA
来源
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) | 2020年
关键词
ACTIVE VISUAL RECOGNITION; SEGMENTATION; ENSEMBLE; REMOVAL;
D O I
10.1109/CVPR42600.2020.00473
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Images can be manipulated for nefarious purposes to hide content or to duplicate certain objects through copy-move operations. Discovering a well-crafted copy-move forgery in images can be very challenging for both humans and machines; for example, an object on a uniform background can be replaced by an image patch of the same background. In this paper, we propose a Generative Adversarial Network with a dual-order attention model to detect and localize copy-move forgeries. In the generator, the first-order attention is designed to capture copy-move location information, and the second-order attention exploits more discriminative features for the patch co-occurrence. Both attention maps are extracted from the affinity matrix and are used to fuse location-aware and co-occurrence features for the final detection and localization branches of the network. The discriminator network is designed to further ensure more accurate localization results. To the best of our knowledge, we are the first to propose such a network architecture with the 1st-order attention mechanism from the affinity matrix. We have performed extensive experimental validation and our state-of-the-art results strongly demonstrate the efficacy of the proposed approach.
引用
收藏
页码:4675 / 4684
页数:10
相关论文
共 51 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], IJCV
[3]  
[Anonymous], 2003, P DIGITAL FORENSIC R
[4]  
[Anonymous], 2010, P BRIT MACH VIS C
[5]  
[Anonymous], 2014, ACCV
[6]   Copy-Move Forgery Detection by Matching Triangles of Keypoints [J].
Ardizzone, Edoardo ;
Bruno, Alessandro ;
Mazzola, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2084-2094
[7]   AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY [J].
Bayram, Sevinc ;
Sencar, Husrev Taha ;
Memon, Nasir .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :1053-+
[8]   RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection [J].
Bi, Xiuli ;
Wei, Yang ;
Xiao, Bin ;
Li, Weisheng .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019), 2019, :30-39
[9]  
Chen LB, 2017, IEEE INT SYMP NANO, P1, DOI 10.1109/NANOARCH.2017.8053709
[10]   QATM: Quality-Aware Template Matching For Deep Learning [J].
Cheng, Jiaxin ;
Wu, Yue ;
Abd-Almageed, Wael ;
Natarajan, Premkumar .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :11545-11554