Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks

Previous digital image forensics focused on the low-level features that include traces of the image modifying history. In this paper, we present a framework to detect the manipulation of images through a contextual violation. First, we proposed a context learning convolutional neural networks (CL-CNN) that detects the contextual violation in the image. In combination with a well-known object detector such as R-CNN, the proposed method can evaluate the contextual scores according to the combination of objects in the image. Through experiments, we showed that our method effectively detects the contextual violation in the target image.

[1]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[2]  Hae-Yeoun Lee,et al.  Estimation of color modification in digital images by CFA pattern change. , 2013, Forensic science international.

[3]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[4]  Trevor Darrell,et al.  Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation , 2013, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[5]  Ross B. Girshick,et al.  Fast R-CNN , 2015, 1504.08083.

[6]  Bo Du,et al.  Saliency-Guided Unsupervised Feature Learning for Scene Classification , 2015, IEEE Transactions on Geoscience and Remote Sensing.

[7]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[8]  Jong-Uk Hou,et al.  Hue modification estimation using sensor pattern noise , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[9]  Trevor Darrell,et al.  Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.

[10]  Cewu Lu,et al.  Learning Important Spatial Pooling Regions for Scene Classification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[11]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[12]  James F. O'Brien,et al.  Exposing Photo Manipulation from Shading and Shadows , 2014, ACM Trans. Graph..

[13]  Jong-Uk Hou,et al.  Detection of Hue Modification Using Photo Response Nonuniformity , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[15]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[17]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.