857 research outputs found
Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks
In this paper, we propose to utilize Convolutional Neural Networks (CNNs) and
the segmentation-based multi-scale analysis to locate tampered areas in digital
images. First, to deal with color input sliding windows of different scales, a
unified CNN architecture is designed. Then, we elaborately design the training
procedures of CNNs on sampled training patches. With a set of robust
multi-scale tampering detectors based on CNNs, complementary tampering
possibility maps can be generated. Last but not least, a segmentation-based
method is proposed to fuse the maps and generate the final decision map. By
exploiting the benefits of both the small-scale and large-scale analyses, the
segmentation-based multi-scale analysis can lead to a performance leap in
forgery localization of CNNs. Numerous experiments are conducted to demonstrate
the effectiveness and efficiency of our method.Comment: 7 pages, 6 figure
Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks
Due to the wide diffusion of JPEG coding standard, the image forensic
community has devoted significant attention to the development of double JPEG
(DJPEG) compression detectors through the years. The ability of detecting
whether an image has been compressed twice provides paramount information
toward image authenticity assessment. Given the trend recently gained by
convolutional neural networks (CNN) in many computer vision tasks, in this
paper we propose to use CNNs for aligned and non-aligned double JPEG
compression detection. In particular, we explore the capability of CNNs to
capture DJPEG artifacts directly from images. Results show that the proposed
CNN-based detectors achieve good performance even with small size images (i.e.,
64x64), outperforming state-of-the-art solutions, especially in the non-aligned
case. Besides, good results are also achieved in the commonly-recognized
challenging case in which the first quality factor is larger than the second
one.Comment: Submitted to Journal of Visual Communication and Image Representation
(first submission: March 20, 2017; second submission: August 2, 2017
Improved Tampering Localization in Digital image Forensics: Comparative Study Based on Maximal Entropy Random Walk and Multi-Scale Fusion
Nowadays the increasing ease of editing digital photographs has spawned an urgent need for reliable authentication mechanism capable of precise localization of potential malicious forgeries. In this paper we compare two different Techniques to analyze which technique can be used more efficiently in localization of Tampered Region In Digital Image .First Technique is Maximal Entropy Random Walk in which Strong localization property of this random walk will highlight important regions and to diminish the background- even for noisy response maps. Our evaluation will show that the proposed method can significantly perform both the commonly used threshold-based decision, and the recently proposed optimization approach with a Markovian prior. The second Technique which is based on Multi-Scale Fusion will investigate a multi-scale analysis approach which merge multiple candidate tampering maps, obtained from the analysis with different windows, to obtain a single, more efficient tampering map with better localization resolution. We propose three different techniques for multi- scale fusion, and verify their feasibility .In this slant we consider popular tampering scenario to distinguish between singly and doubly compressed region
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries
With advanced image journaling tools, one can easily alter the semantic
meaning of an image by exploiting certain manipulation techniques such as
copy-clone, object splicing, and removal, which mislead the viewers. In
contrast, the identification of these manipulations becomes a very challenging
task as manipulated regions are not visually apparent. This paper proposes a
high-confidence manipulation localization architecture which utilizes
resampling features, Long-Short Term Memory (LSTM) cells, and encoder-decoder
network to segment out manipulated regions from non-manipulated ones.
Resampling features are used to capture artifacts like JPEG quality loss,
upsampling, downsampling, rotation, and shearing. The proposed network exploits
larger receptive fields (spatial maps) and frequency domain correlation to
analyze the discriminative characteristics between manipulated and
non-manipulated regions by incorporating encoder and LSTM network. Finally,
decoder network learns the mapping from low-resolution feature maps to
pixel-wise predictions for image tamper localization. With predicted mask
provided by final layer (softmax) of the proposed architecture, end-to-end
training is performed to learn the network parameters through back-propagation
using ground-truth masks. Furthermore, a large image splicing dataset is
introduced to guide the training process. The proposed method is capable of
localizing image manipulations at pixel level with high precision, which is
demonstrated through rigorous experimentation on three diverse datasets
Reliable and Fast Forgery Detection using FINE GRAINED approach
Forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. A digital forensic investigation commonly consists of 3 stages: acquisition or imaging of exhibits, analysis, and reporting. Previously, it is able to detect tampered images at high accuracy based on some carefully designed mechanisms,localization of the tampered regions in a fake image still presents many challenges, especially when the type of tampering operation is unknown. Later on, necessary to integrate different forensic approaches in order to obtain better localization performance. However, several important issues have not been comprehensively studied, to improve/readjust proper forensic approaches, and to fuse the detection results of different forensic approaches to obtain good localization results. In this paper, we propose a framework to improve the performance of forgery localization via implementing tampering possibility maps along with fusion based technique. In the proposed framework, we first select and improve existing forensic approaches, i.e., copy-move forgery detector and statistical feature based approach, and then improve their results to obtain tampering possibility maps
An In-Depth Study on Open-Set Camera Model Identification
Camera model identification refers to the problem of linking a picture to the
camera model used to shoot it. As this might be an enabling factor in different
forensic applications to single out possible suspects (e.g., detecting the
author of child abuse or terrorist propaganda material), many accurate camera
model attribution methods have been developed in the literature. One of their
main drawbacks, however, is the typical closed-set assumption of the problem.
This means that an investigated photograph is always assigned to one camera
model within a set of known ones present during investigation, i.e., training
time, and the fact that the picture can come from a completely unrelated camera
model during actual testing is usually ignored. Under realistic conditions, it
is not possible to assume that every picture under analysis belongs to one of
the available camera models. To deal with this issue, in this paper, we present
the first in-depth study on the possibility of solving the camera model
identification problem in open-set scenarios. Given a photograph, we aim at
detecting whether it comes from one of the known camera models of interest or
from an unknown one. We compare different feature extraction algorithms and
classifiers specially targeting open-set recognition. We also evaluate possible
open-set training protocols that can be applied along with any open-set
classifier, observing that a simple of those alternatives obtains best results.
Thorough testing on independent datasets shows that it is possible to leverage
a recently proposed convolutional neural network as feature extractor paired
with a properly trained open-set classifier aiming at solving the open-set
camera model attribution problem even to small-scale image patches, improving
over state-of-the-art available solutions.Comment: Published through IEEE Access journa
- …