Robust Image Protection Countering Cropping Manipulation

—Image cropping is an inexpensive and effective op- eration of maliciously altering image contents. Existing cropping detection mechanisms analyze the fundamental traces of image cropping, for example, chromatic aberration and vignetting to uncover cropping attack, yet fragile to common post-processing attacks which deceive forensics by removing such cues. Besides, they ignore the fact that recovering the cropped-out contents can unveil the purpose of the behaved cropping attack. This paper presents a novel robust watermarking scheme for image Cropping Localization and Recovery (CLR-Net). We first protect the original image by introducing imperceptible perturbations. Then, typical image post-processing attacks are simulated to erode the protected image. On the recipient’s side, we predict the cropping mask and recover the original image. We propose two plug-and-play networks to improve the real-world robustness of CLR-Net, namely, the Fine-Grained generative JPEG simulator (FG-JPEG) and the Siamese image pre-processing network. To the best of our knowledge, we are the first to address the combined challenge of image cropping localization and entire image recovery from a fragment. Experiments demonstrate that CLR-Net can accurately localize the cropping as well as recover the details of the cropped-out regions with both high quality and fidelity, despite of the presence of image processing attacks of varied types.

[1]  Xinpeng Zhang,et al.  A DTCWT-SVD Based Video Watermarking Resistant to Frame Rate Conversion , 2022, 2022 International Conference on Culture-Oriented Science and Technology (CoST).

[2]  Chong Mou,et al.  Robust Invertible Image Steganography , 2022, 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[3]  Zhenxing Qian,et al.  Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain , 2022, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Zhenxing Qian,et al.  Hiding Images Into Images with Real-World Robustness , 2021, 2022 IEEE International Conference on Image Processing (ICIP).

[5]  Nenghai Yu,et al.  JPEG Robust Invertible Grayscale , 2021, IEEE Transactions on Visualization and Computer Graphics.

[6]  Sergey Tulyakov,et al.  InOut: Diverse Image Outpainting via GAN Inversion , 2021, 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[7]  Zhenxing Qian,et al.  From Image to Imuge: Immunized Image Generation , 2021, ACM Multimedia.

[8]  In So Kweon,et al.  Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking , 2021, ACM Multimedia.

[9]  Mai Xu,et al.  HiNet: Deep Image Hiding by Invertible Network , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).

[10]  Weiming Zhang,et al.  MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression , 2021, ACM Multimedia.

[11]  Xinpeng Zhang,et al.  Watermarking Neural Networks With Watermarked Images , 2021, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Kin-Man Lam,et al.  Invertible Image Decolorization , 2021, IEEE Transactions on Image Processing.

[13]  Yunchao Wei,et al.  ReGO: Reference-Guided Outpainting for Scenery Image , 2021, ArXiv.

[14]  Paul L. Rosin,et al.  Large-capacity Image Steganography Based on Invertible Neural Networks , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[15]  Nicolas Papernot,et al.  Markpainting: Adversarial Machine Learning meets Inpainting , 2021, ICML.

[16]  Juan Cao,et al.  Image Manipulation Detection by Multi-View Multi-Scale Supervision , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).

[17]  Qifeng Chen,et al.  Invertible Image Signal Processing , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[18]  Zhenxing Qian,et al.  Batch Steganography via Generative Network , 2021, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  Basile Van Hoorick,et al.  Dissecting Image Crops , 2020, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).

[20]  Xinlei Chen,et al.  Exploring Simple Siamese Representation Learning , 2020, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[21]  Cristian Canton-Ferrer,et al.  Adversarial Threats to DeepFake Detection: A Practical Perspective , 2020, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[22]  Xueming Qian,et al.  Sketch-Guided Scenery Image Outpainting , 2020, IEEE Transactions on Image Processing.

[23]  Zhenxing Qian,et al.  No way to crop: On robust image crop localization , 2021, ArXiv.

[24]  Yong Ho Moon,et al.  Image Tampering Localization Using Demosaicing Patterns and Singular Value Based Prediction Residue , 2021, IEEE Access.

[25]  Peng Lu,et al.  Learning the Relation Between Interested Objects and Aesthetic Region for Image Cropping , 2021, IEEE Transactions on Multimedia.

[26]  Jing Liu,et al.  A discrete wavelet transform and singular value decomposition-based digital video watermark method , 2020 .

[27]  Shumeet Baluja,et al.  Hiding Images within Images , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[28]  Ashraful Islam,et al.  DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-Move Forgery Detection and Localization , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[29]  Tie-Yan Liu,et al.  Invertible Image Rescaling , 2020, ECCV.

[30]  M. Bethge,et al.  Shortcut learning in deep neural networks , 2020, Nature Machine Intelligence.

[31]  Chong Yu,et al.  Attention Based Data Hiding with Generative Adversarial Networks , 2020, AAAI.

[32]  Alessandro Piva,et al.  A vision-based fully automated approach to robust image cropping detection , 2020, Signal Process. Image Commun..

[33]  Zhenxing Qian,et al.  Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[34]  Luisa Verdoliva,et al.  Media Forensics and DeepFakes: An Overview , 2020, IEEE Journal of Selected Topics in Signal Processing.

[35]  Peyman Milanfar,et al.  Distortion Agnostic Deep Watermarking , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[36]  Fang Wen,et al.  Face X-Ray for More General Face Forgery Detection , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[37]  Alexei A. Efros,et al.  CNN-Generated Images Are Surprisingly Easy to Spot… for Now , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[38]  Takashi Matsubara,et al.  Data Augmentation Using Random Image Cropping and Patching for Deep CNNs , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[39]  Ross B. Girshick,et al.  Mask R-CNN , 2017, 1703.06870.

[40]  Basile Van Hoorick Image Outpainting and Harmonization using Generative Adversarial Networks , 2019, ArXiv.

[41]  Faisal Z. Qureshi,et al.  EdgeConnect: Structure Guided Image Inpainting using Edge Prediction , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).

[42]  Florent Retraint,et al.  An Improved Algorithm for Digital Image Authentication and Forgery Localization Using Demosaicing Artifacts , 2019, IEEE Access.

[43]  Bo Du,et al.  MUSICAL: Multi-Scale Image Contextual Attention Learning for Inpainting , 2019, IJCAI.

[44]  Yang Wei,et al.  RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[45]  Kristin J. Dana,et al.  Light Field Messaging With Deep Photographic Steganography , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[46]  Premkumar Natarajan,et al.  ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[47]  Hang Zhou,et al.  Screen-Shooting Resilient Watermarking , 2019, IEEE Transactions on Information Forensics and Security.

[48]  Peter Lambert,et al.  A Scalable Architecture for Uncompressed-Domain Watermarked Videos , 2019, IEEE Transactions on Information Forensics and Security.

[49]  Seong Joon Oh,et al.  CutMix: Regularization Strategy to Train Strong Classifiers With Localizable Features , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[50]  Zhenxing Qian,et al.  Robust digital watermarking for color images in combined DFT and DT-CWT domains. , 2019, Mathematical biosciences and engineering : MBE.

[51]  Heung-Kyu Lee,et al.  Finding robust domain from attacks: A learning framework for blind watermarking , 2017, Neurocomputing.

[52]  Cho-Jui Hsieh,et al.  Evaluating Robustness of Deep Image Super-Resolution Against Adversarial Attacks , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[53]  Hang Zhou,et al.  Defining Cost Functions for Adaptive JPEG Steganography at the Microscale , 2019, IEEE Transactions on Information Forensics and Security.

[54]  Shuwu Zhang,et al.  Enhancing Image Watermarking With Adaptive Embedding Parameter and PSNR Guarantee , 2019, IEEE Transactions on Multimedia.

[55]  Wei An,et al.  Flickr1024: A Large-Scale Dataset for Stereo Image Super-Resolution , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).

[56]  Wei An,et al.  Learning Parallax Attention for Stereo Image Super-Resolution , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[57]  Zhenxing Qian,et al.  New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[58]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[59]  Kalyan Veeramachaneni,et al.  SteganoGAN: Pushing the Limits of Image Steganography , 2019 .

[60]  Chuan Qin,et al.  Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.

[61]  Timo Aila,et al.  A Style-Based Generator Architecture for Generative Adversarial Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[62]  David Duvenaud,et al.  Invertible Residual Networks , 2018, ICML.

[63]  David Duvenaud,et al.  FFJORD: Free-form Continuous Dynamics for Scalable Reversible Generative Models , 2018, ICLR.

[64]  Ullrich Köthe,et al.  Analyzing Inverse Problems with Invertible Neural Networks , 2018, ICLR.

[65]  Ashutosh Kumar Singh,et al.  Survey of robust and imperceptible watermarking , 2019, Multimedia Tools and Applications.

[66]  Shiqi Wang,et al.  When Deep Fool Meets Deep Prior: Adversarial Attack on Super-Resolution Network , 2018, ACM Multimedia.

[67]  Mark R. Pickering,et al.  An Overview of Digital Video Watermarking , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[68]  Yu Qiao,et al.  ESRGAN: Enhanced Super-Resolution Generative Adversarial Networks , 2018, ECCV Workshops.

[69]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[70]  Prafulla Dhariwal,et al.  Glow: Generative Flow with Invertible 1x1 Convolutions , 2018, NeurIPS.

[71]  Yang Yang,et al.  StegNet: Mega Image Steganography Capacity with Deep Convolutional Network , 2018, Future Internet.

[72]  Bolei Zhou,et al.  Places: A 10 Million Image Database for Scene Recognition , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[73]  Larry S. Davis,et al.  Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[74]  Belhassen Bayar,et al.  Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[75]  Yuichi Yoshida,et al.  Spectral Normalization for Generative Adversarial Networks , 2018, ICLR.

[76]  Thomas S. Huang,et al.  Generative Image Inpainting with Contextual Attention , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[77]  Andrea Vedaldi,et al.  Deep Image Prior , 2017, International Journal of Computer Vision.

[78]  Rafia Rahim,et al.  End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.

[79]  Jaakko Lehtinen,et al.  Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.

[80]  Hongyi Zhang,et al.  mixup: Beyond Empirical Risk Minimization , 2017, ICLR.

[81]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[82]  Bin Li,et al.  Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.

[83]  Eirikur Agustsson,et al.  NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[84]  Hiroshi Ishikawa,et al.  Globally and locally consistent image completion , 2017, ACM Trans. Graph..

[85]  Gorthi R. K. Sai Subrahmanyam,et al.  Exploring the learning capabilities of convolutional neural networks for robust image watermarking , 2017, Comput. Secur..

[86]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[87]  Alexei A. Efros,et al.  Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[88]  Raymond Y. K. Lau,et al.  Least Squares Generative Adversarial Networks , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).

[89]  David A. Wagner,et al.  Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[90]  Samy Bengio,et al.  Density estimation using Real NVP , 2016, ICLR.

[91]  Richard Shin JPEG-resistant Adversarial Images , 2017 .

[92]  Fan Chen,et al.  Self-embedding watermarking scheme against JPEG compression with superior imperceptibility , 2017, Multimedia Tools and Applications.

[93]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[94]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[95]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[96]  Sergey Ioffe,et al.  Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[97]  Vladlen Koltun,et al.  Multi-Scale Context Aggregation by Dilated Convolutions , 2015, ICLR.

[98]  Sepp Hochreiter,et al.  Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs) , 2015, ICLR.

[99]  D. N. Vizireanu,et al.  Watermarking-based image authentication robust to JPEG compression , 2015 .

[100]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[101]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[102]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[103]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[104]  Yoshua Bengio,et al.  NICE: Non-linear Independent Components Estimation , 2014, ICLR.

[105]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[106]  Yoshua Bengio,et al.  Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation , 2013, ArXiv.

[107]  Pawel Korus,et al.  Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.

[108]  Gerardo Pineda Betancourth,et al.  Fragile Watermarking Scheme for Image Authentication , 2012, 2012 5th International Conference on Human System Interactions.

[109]  Matthias Kirchner,et al.  Spectral methods to determine the exact scaling factor of resampled digital images , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.

[110]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[111]  Sebastiano Battiato,et al.  Crop Detection through Blocking Artefacts Analysis , 2011, ICIAP.

[112]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[113]  Zhenxing Qian,et al.  Self-embedding watermark with flexible restoration quality , 2011, Multimedia Tools and Applications.

[114]  Hagit Hel-Or,et al.  Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.

[115]  Chih-Chin Lai,et al.  Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition , 2010, IEEE Transactions on Instrumentation and Measurement.

[116]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[117]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[118]  Nenghai Yu,et al.  Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..

[119]  Fei-Fei Li,et al.  ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[120]  Xinpeng Zhang,et al.  Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..

[121]  Christopher Hunt,et al.  Notes on the OpenSURF Library , 2009 .

[122]  Xinpeng Zhang,et al.  Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.

[123]  Min-Jen Tsai,et al.  Authentication and recovery for wavelet-based semifragile watermarking , 2008 .

[124]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[125]  Ning Liu,et al.  Security and Robustness Enhancement for Image Data Hiding , 2007, IEEE Transactions on Multimedia.

[126]  Heng-Ming Tai,et al.  A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication , 2006, IWDW.

[127]  Yulin Wang,et al.  Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain , 2006, IEEE Transactions on Image Processing.

[128]  Joachim Weickert,et al.  Lucas/Kanade Meets Horn/Schunck: Combining Local and Global Optic Flow Methods , 2005, International Journal of Computer Vision.

[129]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[130]  H. D. Cheng,et al.  A simple and effective histogram equalization approach to image enhancement , 2004, Digit. Signal Process..

[131]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[132]  Thomas S. Huang,et al.  Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[133]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[134]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[135]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[136]  L. Rudin,et al.  Nonlinear total variation based noise removal algorithms , 1992 .

[137]  John D. Austin,et al.  Adaptive histogram equalization and its variations , 1987 .

[138]  N. Otsu A threshold selection method from gray level histograms , 1979 .