Local Pixel Manipulation Detection with Deep Neural Networks

In times of digital images and easy to achieve manipulations, tampered photos are ubiquitous. Well carried out manipulations are almost impossible to identify, even for humans. To earn back trust it is necessary to develop techniques that can detect such manipulations. Two of the most commonly used manipulations are splicing and copy-move, e.g., copy a part from one image and paste in into another or the same image. In this thesis, we present an approach based on deep learning that significantly improves the possibilities to detect such manipulations. The approach uses a combination of a VGG-Net for feature extraction and Global Average Pooling for classification as its architecture. Our approach not only classifies the images, for being manipulated or not, but also localizes where the manipulations occur. To achieve this localization, it uses patches combined with image classification. We evaluate our approach and conduct several experiments, in which we compare the rate of classification against other well-known techniques, such as SIFT (copy-move), Expectation Maximization with segmentation (splicing) and a retrained Faster-RCNN (both). Our approach achieves the highest F1 score across all evaluated techniques, reaching about 77% macro average for our generated COCO segmentation data set for splicing and 79% for the Columbia data set, respectively.

[1]  Marvin Minsky,et al.  Perceptrons: An Introduction to Computational Geometry , 1969 .

[2]  Geoffrey E. Hinton,et al.  Learning representations by back-propagating errors , 1986, Nature.

[3]  Geoffrey E. Hinton,et al.  Learning internal representations by error propagation , 1986 .

[4]  Andreas Zell,et al.  Simulation neuronaler Netze , 1994 .

[5]  John J. Hopfield,et al.  Neural networks and physical systems with emergent collective computational abilities , 1999 .

[6]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[7]  Arnold W. M. Smeulders,et al.  Color Invariance , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[8]  Nitesh V. Chawla,et al.  SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..

[9]  Gustavo E. A. P. A. Batista,et al.  A study of the behavior of several methods for balancing machine learning training data , 2004, SKDD.

[10]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[11]  Hui Han,et al.  Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.

[12]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[13]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[14]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[15]  Yoshua. Bengio,et al.  Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..

[16]  Y. Yao,et al.  On Early Stopping in Gradient Descent Learning , 2007 .

[17]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[18]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[19]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[20]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[21]  Xinpeng Zhang,et al.  Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery , 2010, IEEE Transactions on Information Forensics and Security.

[22]  Sven Behnke,et al.  Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.

[23]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[24]  Hagit Hel-Or,et al.  Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.

[25]  Nenghai Yu,et al.  Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.

[26]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[27]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[28]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[29]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[30]  Kevin P. Murphy,et al.  Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.

[31]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent reflections , 2012, TOGS.

[32]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[33]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[34]  Qiang Chen,et al.  Network In Network , 2013, ICLR.

[35]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[36]  Luisa Verdoliva,et al.  A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.

[37]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[38]  Thomas Brox,et al.  Striving for Simplicity: The All Convolutional Net , 2014, ICLR.

[39]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[40]  Subhransu Maji,et al.  Bilinear CNN Models for Fine-Grained Visual Recognition , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[41]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[42]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[43]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[44]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[45]  Xiangyang Wang,et al.  Quaternion polar complex exponential transform for invariant color image description , 2015, Appl. Math. Comput..

[46]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[47]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[48]  Davide Cozzolino,et al.  Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[49]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[50]  T. Qiao Statistical detection for digital image forensics , 2016 .

[51]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[52]  Stefan Winkler,et al.  COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[53]  Jiantao Zhou,et al.  Image copy-move forgery detection using hierarchical feature point matching , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).

[54]  Jiwu Huang,et al.  Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.

[55]  B. S. Manjunath,et al.  Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[56]  Jessica J. Fridrich,et al.  Image Manipulation Detection Using Sensor Linear Pattern , 2018, Media Watermarking, Security, and Forensics.

[57]  Andrew Owens,et al.  Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.

[58]  Larry S. Davis,et al.  Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[59]  Jingsha He,et al.  A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[60]  Panpan Niu,et al.  A new keypoint-based copy-move forgery detection for color image , 2018, Applied Intelligence.