Image Forgery Localization based on Multi-Scale Convolutional Neural Networks

In this paper, we propose to utilize Convolutional Neural Networks (CNNs) and the segmentation-based multi-scale analysis to locate tampered areas in digital images. First, to deal with color input sliding windows of different scales, we adopt a unified CNN architecture. Then, we elaborately design the training procedures of CNNs on sampled training patches. With a set of tampering detectors based on CNNs for different scales, a series of complementary tampering possibility maps can be generated. Last but not least, a segmentation-based method is proposed to fuse these maps and generate the final decision map. By exploiting the benefits of both the small-scale and large-scale analyses, the segmentation-based multi-scale analysis can lead to a performance leap in forgery localization of CNNs. Numerous experiments are conducted to demonstrate the effectiveness and efficiency of our method.

[1]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[2]  Huang Jiwu,et al.  Evaluation of random field models in multi-modal unsupervised tampering localization , 2016 .

[3]  Xiaoyu Zhang,et al.  ListNet-based object proposals ranking , 2017, Neurocomputing.

[4]  Davide Cozzolino,et al.  Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[5]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[6]  Seunghoon Hong,et al.  Learning Deconvolution Network for Semantic Segmentation , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[7]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[8]  Alessandro Piva,et al.  Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[9]  Jessica J. Fridrich,et al.  Rich model for Steganalysis of color images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Jiwu Huang,et al.  Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk , 2016, IEEE Signal Processing Letters.

[11]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Davide Cozzolino,et al.  Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.

[13]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[14]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[15]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Vladimir Kolmogorov,et al.  An experimental comparison of min-cut/max- flow algorithms for energy minimization in vision , 2001, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Jiwu Huang,et al.  Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[19]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[20]  Jiwu Huang,et al.  Image Forgery Localization via Integrating Tampering Possibility Maps , 2017, IEEE Transactions on Information Forensics and Security.

[21]  Jian Sun,et al.  Identity Mappings in Deep Residual Networks , 2016, ECCV.

[22]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[23]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Pascal Fua,et al.  SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[26]  Paolo Bestagini,et al.  Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[27]  Wei Lu,et al.  Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..

[28]  Zhuowen Tu,et al.  Aggregated Residual Transformations for Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[29]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.