Automated Design of Neural Network Architectures With Reinforcement Learning for Detection of Global Manipulations

Deep Convolutional Neural Networks (DCNNs) have been widely used in detection of global manipulations. However, designing effective DCNNs for specific image forensics tasks generally requires domain knowledge and experience gained from abundant experiments, which is time-consuming and labor-expensive. Approaches of automated network designing have been proposed for image classification tasks which are image-content focused, however they may not be suitable to image forensics tasks which rely on identifying subtle traces left by certain image operations. In this paper, we make the first attempt to automate the neural network architecture design for detection of global manipulations. The process of constructing a network is modeled as sequentially selecting optimal architecture modules to generate high-performing CNNs for specific forensic tasks through reinforcement learning. The module-based search space is proposed to make the designing process efficient. Advanced connection patterns (e.g., dense connectivity), which were shown preferred for global manipulation detections, are included in the modules to improve the representational power of the network. Experimental results show that the proposed approach can adaptively construct effective CNN architectures for two common forensic tasks, including multi-purpose forensics and the processing history detection. The auto-designed networks can outperform the state-of-the-art manually designed networks.

[1]  Jiwu Huang,et al.  A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.

[2]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[3]  Andrew Y. Ng,et al.  Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping , 1999, ICML.

[4]  Ramesh Raskar,et al.  Designing Neural Network Architectures using Reinforcement Learning , 2016, ICLR.

[5]  Jessica J. Fridrich,et al.  Deep Learning for Detecting Processing History of Images , 2018, Media Watermarking, Security, and Forensics.

[6]  Yun Q. Shi,et al.  A multi-purpose image forensic method using densely connected convolutional neural networks , 2019, Journal of Real-Time Image Processing.

[7]  Kilian Q. Weinberger,et al.  Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[8]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[9]  K. J. Ray Liu,et al.  Detectability of the Order of Operations: An Information Theoretic Approach , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[11]  Premkumar Natarajan,et al.  ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[12]  Yao Zhao,et al.  Detection of operation chain: JPEG-Resampling-JPEG , 2017, Signal Process. Image Commun..

[13]  Kannan Ramchandran,et al.  Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.

[14]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[15]  Belhassen Bayar,et al.  Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[16]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[17]  Vijay Vasudevan,et al.  Learning Transferable Architectures for Scalable Image Recognition , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[18]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[19]  Jiwu Huang,et al.  Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Quoc V. Le,et al.  Neural Architecture Search with Reinforcement Learning , 2016, ICLR.

[21]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[22]  Long-Ji Lin,et al.  Reinforcement learning for robots using neural networks , 1992 .

[23]  Yao Zhao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.

[24]  Wael Abd-Almageed,et al.  BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.

[25]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[26]  K. J. Ray Liu,et al.  Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[27]  Kai Wang,et al.  General-purpose image forensics using patch likelihood under image statistical models , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[28]  Jessica J. Fridrich,et al.  Scalable Processing History Detector for JPEG Images , 2017, Media Watermarking, Security, and Forensics.

[29]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[30]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[31]  Alessandro Piva,et al.  Reverse engineering of double compressed images in the presence of contrast enhancement , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[32]  Wei Wu,et al.  Practical Block-Wise Neural Network Architecture Generation , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[33]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[34]  Sergey Ioffe,et al.  Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[35]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[36]  Hui Zeng,et al.  A Multi-purpose countermeasure against image anti-forensics using autoregressive model , 2016, Neurocomputing.

[37]  Hai-Dong Yuan,et al.  Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.

[38]  Alessandro Piva,et al.  Reverse engineering of double JPEG compression in the presence of image resizing , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).