Copy Move Source-Target Disambiguation Through Multi-Branch CNNs

We propose a method to identify the source and target regions of a copy-move forgery so allow a correct localisation of the tampered area. First, we cast the problem into a hypothesis testing framework whose goal is to decide which region between the two nearly-duplicate regions detected by a generic copy-move detector is the original one. Then we design a multi-branch CNN architecture that solves the hypothesis testing problem by learning a set of features capable to reveal the presence of interpolation artefacts and boundary inconsistencies in the copy-moved area. The proposed architecture, trained on a synthetic dataset explicitly built for this purpose, achieves good results on copy-move forgeries from both synthetic and realistic datasets. Based on our tests, the proposed disambiguation method can reliably reveal the target region even in realistic cases where an approximate version of the copy-move localization mask is provided by a state-of-the-art copy-move detection algorithm.

[1]  Larry S. Davis,et al.  Generate, Segment, and Refine: Towards Generic Manipulation Segmentation , 2018, AAAI.

[2]  Yann LeCun,et al.  Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..

[3]  Xianfeng Zhao,et al.  Copy-move forgery detection based on convolutional kernel network , 2017, Multimedia Tools and Applications.

[4]  H. Hotelling Analysis of a complex of statistical variables into principal components. , 1933 .

[5]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[6]  Gurpreet Kaur,et al.  DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES , 2020 .

[7]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[8]  Patrick Pérez,et al.  Poisson image editing , 2003, ACM Trans. Graph..

[9]  Krista A. Ehinger,et al.  SUN database: Large-scale scene recognition from abbey to zoo , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[10]  H.M. Wechsler,et al.  Digital image processing, 2nd ed. , 1981, Proceedings of the IEEE.

[11]  Yann LeCun,et al.  Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[12]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[13]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[14]  Michio Sugeno,et al.  Fuzzy systems theory and its applications , 1991 .

[15]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[16]  Gregory R. Koch,et al.  Siamese Neural Networks for One-Shot Image Recognition , 2015 .

[17]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[18]  Davide Cozzolino,et al.  Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[19]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[20]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[21]  Weijin Tan,et al.  A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques , 2019 .

[22]  Sung-Bae Cho,et al.  Multiple network fusion using fuzzy logic , 1995, IEEE Trans. Neural Networks.

[23]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[24]  Marco Fontani,et al.  VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.

[25]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[26]  Wael Abd-Almageed,et al.  Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).

[27]  C.-C. Jay Kuo,et al.  Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN) , 2017, J. Vis. Commun. Image Represent..

[28]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[29]  Wael Abd-Almageed,et al.  BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.

[30]  Matthias Kirchner,et al.  Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.

[31]  Andrew Owens,et al.  Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.

[32]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[33]  Jiantao Zhou,et al.  Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching , 2019, IEEE Transactions on Information Forensics and Security.

[34]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[35]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[36]  Matthew C. Stamm,et al.  Learned Forensic Source Similarity for Unknown Camera Models , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[37]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[38]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[39]  David Vazquez-Padin,et al.  Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces , 2011, IWDW.

[40]  Jing Dong,et al.  CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[41]  Davide Cozzolino,et al.  Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.