ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features

To fight against real-life image forgery, which commonly involves different types and combined manipulations, we propose a unified deep neural architecture called ManTra-Net. Unlike many existing solutions, ManTra-Net is an end-to-end network that performs both detection and localization without extra preprocessing and postprocessing. \manifold{} is a fully convolutional network and handles images of arbitrary sizes and many known forgery types such splicing, copy-move, removal, enhancement, and even unknown types. This paper has three salient contributions. We design a simple yet effective self-supervised learning task to learn robust image manipulation traces from classifying 385 image manipulation types. Further, we formulate the forgery localization problem as a local anomaly detection problem, design a Z-score feature to capture local anomaly, and propose a novel long short-term memory solution to assess local anomalies. Finally, we carefully conduct ablation experiments to systematically optimize the proposed network design. Our extensive experimental results demonstrate the generalizability, robustness and superiority of ManTra-Net, not only in single types of manipulations/forgeries, but also in their complicated combinations.

[1]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[2]  Tal Hassner,et al.  On Face Segmentation, Face Swapping, and Face Perception , 2017, 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018).

[3]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[4]  Alexei A. Efros,et al.  Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[5]  Jiebo Luo,et al.  Boundary-based Image Forgery Detection by Fast Shallow CNN , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).

[6]  Xianfeng Zhao,et al.  A deep learning approach to patch-based image inpainting forensics , 2018, Signal Process. Image Commun..

[7]  拓海 杉山,et al.  “Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks”の学習報告 , 2017 .

[8]  Paolo Bestagini,et al.  Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[9]  Heiko Schuldt,et al.  The PS-Battles Dataset - an Image Collection for Image Manipulation Detection , 2018, ArXiv.

[10]  Larry S. Davis,et al.  Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[11]  Xianfeng Zhao,et al.  Image Forgery Localization based on Multi-Scale Convolutional Neural Networks , 2018, IH&MMSec.

[12]  C.-C. Jay Kuo,et al.  Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN) , 2017, J. Vis. Commun. Image Represent..

[13]  Paolo Bestagini,et al.  First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.

[14]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[15]  Can Chen,et al.  Image Splicing Detection via Camera Response Function Analysis , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[16]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Christine Fernandez-Maloigne,et al.  Image splicing detection with local illumination estimation , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[18]  Yong Ho Moon,et al.  Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion , 2016, J. Electronic Imaging.

[19]  Lei Zhang,et al.  Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising , 2016, IEEE Transactions on Image Processing.

[20]  Fei Peng,et al.  Image tamper detection based on noise estimation and lacunarity texture , 2015, Multimedia Tools and Applications.

[21]  Larry S. Davis,et al.  Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[22]  Wael Abd-Almageed,et al.  Deep Matching and Validation Network: An End-to-End Solution to Constrained Image Splicing Localization and Detection , 2017, ACM Multimedia.

[23]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[24]  Xing Zhang,et al.  Exposing Region Splicing Forgeries with Blind Local Noise Estimation , 2013, International Journal of Computer Vision.

[25]  Yiannis Kompatsiaris,et al.  Large-scale evaluation of splicing localization algorithms for web images , 2017, Multimedia Tools and Applications.

[26]  Alessandro Piva,et al.  Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[27]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[28]  Nikos Komodakis,et al.  Wide Residual Networks , 2016, BMVC.

[29]  Mauro Barni,et al.  Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[30]  Ting-Chun Wang,et al.  Image Inpainting for Irregular Holes Using Partial Convolutions , 2018, ECCV.

[31]  Zulfiqar Habib,et al.  Copy-move and splicing image forgery detection and localization techniques: a review , 2017 .

[32]  Yue Wu,et al.  Self-Organized Text Detection with Minimal Post-processing via Border Learning , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[33]  Wael Abd-Almageed,et al.  BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.

[34]  Stefan Winkler,et al.  COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[35]  Andrew Owens,et al.  Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.

[36]  Jee-Young Sun,et al.  A novel contrast enhancement forensics based on convolutional neural networks , 2018, Signal Process. Image Commun..

[37]  Ming Li,et al.  Image splicing detection based on Markov features in QDCT domain , 2017, Neurocomputing.

[38]  Arturo Casadevall,et al.  Financial costs and personal consequences of research misconduct resulting in retracted publications , 2014, eLife.

[39]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[40]  Ming Li,et al.  Image splicing detection based on Markov features in QDCT domain , 2015, Neurocomputing.

[41]  Paolo Rota,et al.  Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[42]  Matthew C. Stamm,et al.  Learned Forensic Source Similarity for Unknown Camera Models , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[43]  Tiberio Uricchio,et al.  Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[44]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[45]  Belhassen Bayar,et al.  Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[46]  Elisabeth M. Bik,et al.  The Prevalence of Inappropriate Image Duplication in Biomedical Research Publications , 2016, mBio.

[47]  Leon A. Gatys,et al.  Image Style Transfer Using Convolutional Neural Networks , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[48]  Gunjan Bhartiya,et al.  Forgery detection using feature-clustering in recompressed JPEG images , 2016, Multimedia Tools and Applications.

[49]  Dit-Yan Yeung,et al.  Convolutional LSTM Network: A Machine Learning Approach for Precipitation Nowcasting , 2015, NIPS.

[50]  B. S. Manjunath,et al.  Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[51]  Babak Mahdian,et al.  Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..

[52]  Heung-Kyu Lee,et al.  Detecting composite image manipulation based on deep neural networks , 2017, 2017 International Conference on Systems, Signals and Image Processing (IWSSIP).

[53]  Davide Cozzolino,et al.  Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.