A deep learning approach to patch-based image inpainting forensics

被引:104
作者
Zhu, Xinshan [1 ,2 ]
Qian, Yongjun [1 ]
Zhao, Xianfeng [2 ]
Sun, Biao [1 ]
Sun, Ya [1 ]
机构
[1] Tianjin Univ, Sch Elect & Informat Engn, Tianjin 300072, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Inpainting; Forensics; Convolutional neural network; Loss function; Compression; FORGERY DETECTION ALGORITHM; NEURAL-NETWORKS; OBJECT REMOVAL;
D O I
10.1016/j.image.2018.05.015
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although image inpainting is now an effective image editing technique, limited work has been done for inpainting forensics. The main drawbacks of the conventional inpainting forensics methods lie in the difficulties on inpainting feature extraction and the very high computational cost. In this paper, we propose a novel approach based on a convolutional neural network (CNN) to detect patch-based inpainting operation. Specifically, the CNN is built following the encoder decoder network structure, which allows us to predict the inpainting probability for each pixel in an image. To guide the CNN to automatically learn the inpainting features, a label matrix is generated for the CNN training by assigning a class label for each pixel of an image, and the designed weighted cross-entropy serves as the loss function. They further help to strongly supervise the CNN to capture the manipulation information rather than the image content features. By the established CNN, inpainting forensics does not need to consider feature extraction and classifier design, and use any postprocessing as in conventional forensics methods. They are combined into the unique framework and optimized simultaneously. Experimental results show that the proposed method achieves superior performance in terms of true positive rate, false positive rate and the running time, as compared with state-of-the-art methods for inpainting forensics, and is very robust against JPEG compression and scaling manipulations.
引用
收藏
页码:90 / 99
页数:10
相关论文
共 44 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], 2017, P IEEE C COMP VIS PA
[3]  
[Anonymous], 2012, Technical Report
[4]  
[Anonymous], IEEE T PATTERN ANAL
[5]  
[Anonymous], 2016, INT WORKSHOP DIGITAL
[6]  
[Anonymous], EURASIP J INF SECUR
[7]  
[Anonymous], 2003, P DIG FOR RES WORKSH
[8]  
[Anonymous], 2015, Tech Rep
[9]  
[Anonymous], 2016, P 4 ACM WORKS INF HI
[10]  
[Anonymous], IEEE INT WORKSH INF