Two-Stream Neural Networks for Tampered Face Detection

We propose a two-stream network for face tampering detection. We train GoogLeNet to detect tampering artifacts in a face classification stream, and train a patch based triplet network to leverage features capturing local noise residuals and camera characteristics as a second stream. In addition, we use two different online face swaping applications to create a new dataset that consists of 2010 tampered images, each of which contains a tampered face. We evaluate the proposed two-stream network on our newly collected dataset. Experimental results demonstrate the effectness of our method.

[1]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  Alessandro Piva,et al.  Improved DCT coefficient analysis for forgery localization in JPEG images , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Bolei Zhou,et al.  Learning Deep Features for Discriminative Localization , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[4]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[5]  Yiannis Kompatsiaris,et al.  Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[6]  Xing Zhang,et al.  Exposing Region Splicing Forgeries with Blind Local Noise Estimation , 2013, International Journal of Computer Vision.

[7]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[8]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[9]  Davide Cozzolino,et al.  Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Shaziya .P.S. Khan,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .

[11]  Hany Farid,et al.  Exposing photo manipulation from user-guided 3D lighting analysis , 2015, Electronic Imaging.

[12]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[13]  Alessandro Piva,et al.  Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Jing Dong,et al.  CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[15]  Davis E. King,et al.  Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..

[16]  Sergey Ioffe,et al.  Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[17]  Rama Chellappa,et al.  Template regularized sparse coding for face verification , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[18]  Xing Zhang,et al.  Exposing image splicing with inconsistent local noise variances , 2012, 2012 IEEE International Conference on Computational Photography (ICCP).

[19]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[20]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[21]  Jessica J. Fridrich,et al.  CFA-aware features for steganalysis of color images , 2015, Electronic Imaging.

[22]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.