Tampering Detection and Localization in Images from Social Networks: A CBIR Approach

Step 1 : Content-based image retrieval system • Goal : Find the best image in our database for a comparaison with the query • Method : 1. Find the 10 most similar images with a dot product using the de-scriptors explain below. Research is accelerated with a KD-Tree approach 2. Reorder these 10 candidates in order to find the best candidate. Define an homography between the image query and each candidate in order to found the best homography Descriptors used based on VGG19 [1] • Two sizes used : training images size or based on a kernelization step like [2] • Three vectors are analyzed based on the output of three layers: last convolutional layer C 5 with a output lenght of 512 and the fully-connected layers C 6 and C 7 with a output lenght of 4096 for both • A mean or max pooling have to be apply in the case of C 5 when we used the standard training images size and the three outputs in case of kernelized approach.

[1]  Cordelia Schmid,et al.  Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.

[2]  Vincent Claveau,et al.  MediaEval 2016: A Multimodal System for the Verifying Multimedia Use Task , 2016, MediaEval.

[3]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Francesco G. B. De Natale,et al.  A Hybrid Approach for Multimedia Use Verification , 2016, MediaEval.

[5]  Rahul Dixit,et al.  Detection of Copy-Move Forgery Exploiting LBP Features with Discrete Wavelet Transform , 2016 .

[6]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[7]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[8]  Ronan Sicre,et al.  Discriminative part model for visual recognition , 2015, Comput. Vis. Image Underst..

[9]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[10]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[11]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[12]  Stefan Carlsson,et al.  CNN Features Off-the-Shelf: An Astounding Baseline for Recognition , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[13]  Jiantao Zhou,et al.  Image copy-move forgery detection using hierarchical feature point matching , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).

[14]  Victor S. Lempitsky,et al.  Aggregating Local Deep Features for Image Retrieval , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[15]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[16]  Vilas M. Thakare,et al.  A Survey on Keypoint Based Copy-paste Forgery Detection Techniques , 2016 .

[17]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[18]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[19]  Victor S. Lempitsky,et al.  Neural Codes for Image Retrieval , 2014, ECCV.

[20]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Theo Gevers,et al.  DENSE sampling of features for image retrieval , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[22]  Ronan Sicre,et al.  Particular object retrieval with integral max-pooling of CNN activations , 2015, ICLR.

[23]  Ronan Sicre,et al.  Memory Vectors for Particular Object Retrieval with Multiple Queries , 2015, ICMR.