Data-Dependent Scaling of CNN’s First Layer for Improved Image Manipulation Detection

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12617))

Included in the following conference series:

Abstract

Convolutional Neural Networks (CNNs) have become an effective tool to detect image manipulation operations, e.g., noise addition, median filtering and JPEG compression. In this paper, we propose a simple and practical method for adjusting the CNN’s first layer, based on a proper scaling of first-layer filters with a data-dependent approach. The key idea is to keep the stability of the variance of data flow in a CNN. We also present studies on the output variance for convolutional filter, which are the basis of our proposed scaling. The proposed method can cope well with different first-layer initialization algorithms and different CNN architectures. The experiments are performed with two challenging forensic problems, i.e., a multi-class classification problem of a group of manipulation operations and a binary detection problem of JPEG compression with high quality factor, both on relatively small image patches. Experimental results show the utility of our method with a noticeable and consistent performance improvement after scaling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now
Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 53.49
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The 30 SRM filters can be found in the class of SrmFiller, starting from line 347 of this webpage https://github.com/tansq/WISERNet/blob/master/filler.hpp.

References

  1. Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13(11), 2691–2706 (2018)

    Article  Google Scholar 

  2. Castillo Camacho, I., Wang, K.: A simple and effective initialization of CNN for forensics of image processing operations. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, France, pp. 107–112 (2019)

    Google Scholar 

  3. Chen, B., Li, H., Luo, W., Huang, J.: Image processing operations identification via convolutional neural network. Sci. China Inf. Sci. 63(3) (2020). https://doi.org/10.1007/s11432-018-9492-6

  4. Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Sig. Process. Lett. 22(11), 1849–1853 (2015)

    Article  Google Scholar 

  5. Fridrich, J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  6. Gloe, T., Böhme, R.: The Dresden image database for benchmarking digital image forensics. In: Proceedings of the ACM Symposium on Applied Computing, Sierre, Switzerland, pp. 1584–1590 (2010)

    Google Scholar 

  7. Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, pp. 249–256 (2010)

    Google Scholar 

  8. Li, F.F., Johnson, J., Yeung, S.: Neural networks part 2: setting up the data and the loss (2018). Course notes of Stanford University “CS231n: Convolutional Neural Networks for Visual Recognition". http://cs231n.github.io/neural-networks-2/. Accessed 16 Dec 2020

  9. Li, H., Huang, J.: Localization of deep inpainting using high-pass fully convolutional network. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 8301–8310 (2019)

    Google Scholar 

  10. Liu, Y., Guan, Q., Zhao, X., Cao, Y.: Image forgery localization based on multi-scale convolutional neural networks. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, pp. 85–90 (2018)

    Google Scholar 

  11. Simoncelli, E.P., Olshausen, B.A.: Natural image statistics and neural representation. Ann. Rev. Neurosci. 24(1), 1193–1216 (2001)

    Article  Google Scholar 

Download references

Acknowledgments

This work is partially funded by the French National Research Agency (DEFALS ANR-16-DEFA-0003, ANR-15-IDEX-02) and the Mexican National Council of Science and Technology (CONACYT).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Castillo Camacho, I., Wang, K. (2021). Data-Dependent Scaling of CNN’s First Layer for Improved Image Manipulation Detection. In: Zhao, X., Shi, YQ., Piva, A., Kim, H.J. (eds) Digital Forensics and Watermarking. IWDW 2020. Lecture Notes in Computer Science(), vol 12617. Springer, Cham. https://doi.org/10.1007/978-3-030-69449-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69449-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69448-7

  • Online ISBN: 978-3-030-69449-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation