Image Tampering Localization Based on Two-Stream Weighted Fusion Features

  • Conference paper
  • First Online:
Proceedings of 2022 10th China Conference on Command and Control (C2 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 949))

Included in the following conference series:

  • 1049 Accesses

Abstract

When people tried to use existing image manipulation detection methods in real senses, some extreme limitations like lack of robustness against image recompression and resampling were found. In contrast, with the advancement high-quality images become too large to be loaded by neural network. Accordingly, the capability of learning manipulations-sensitive generalizable or even residual semantic features of compressed images becomes a key precondition for the practical value of algorithm. In this paper, we propose a convolutional neural network which uses error level analysis (ELA) to address the interest area and mask semantic information under different image compressions scenarios. We use that network to collect residual semantic features and use a discrete cosine transform (DCT) network to collect compression artifacts. A network which is termed MSEA-Net is realized to explore manipulation detection of recompressed images. The excellent results on NIST16, Columbia, CASIAv2 datasets and post-processed datasets demonstrate the capability of MSEA-Net for recompression and resampling manipulation detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now
Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 373.43
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 474.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 474.74
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Verdoliva, L.: Media forensics and deepfakes: an overview. IEEE J. Sel. Top. Sig. Process. 14(5), 910–932 (2020)

    Article  Google Scholar 

  2. Mahfoudi, G., Ta**i, B., Retraint, F., Morain-Nicolier, F., Pic, M.: DEFACTO: image and face manipulation dataset. In: EUSIPCO (2019)

    Google Scholar 

  3. Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1053–1061 (2018)

    Google Scholar 

  4. Wu, Y., Abdalmageed, W., Natarajan, P.: ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9543–9552 (2019)

    Google Scholar 

  5. Kwon, M.J., Yu, I.J., Nam, S.H., Lee, H.K.: CAT-Net: compression artifact tracing network for detection and localization of image splicing. In: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pp. 375–384 (2021)

    Google Scholar 

  6. Yang, C., Li, H., Lin, F., Jiang, B., Zhao, H.: Constrained R-CNN: a general image manipulation detection model. In: ICME (2020)

    Google Scholar 

  7. Zhou, P., Chen, B., Han, X., Najibi, M., Davis, L.: Generate, segment, and refine: towards generic manipulation segmentation. In: AAAI (2020)

    Google Scholar 

  8. Krawetz, N. A picture’s worth... digital image analysis and forensics. Technical Report Black Hat Briefings, USA (2007)

    Google Scholar 

  9. Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: Span: spatial pyramid attention network for image manipulation localization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12366, pp. 312–328. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58589-1_19

    Chapter  Google Scholar 

  10. Chen, X., Dong, C., Ji, J., Cao, J., Li, X.: Image manipulation detection by multi-view multi-scale supervision. In: ICCV (2021)

    Google Scholar 

  11. Lam, E.Y., Goodman, J.W.: A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 9(10), 1661–1666 (2000)

    Article  Google Scholar 

  12. Lukás, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of the Digital Forensic Research Workshop, pp. 5–8 (2003)

    Google Scholar 

  13. Lin, Z., He, J., Tang, X., Tang, C.K.: Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn. 42(11), 2492–2501 (2009)

    Article  Google Scholar 

  14. Liu, Z., Mao, H., Chao-Yuan, W., Feichtenhofer, C., Darrell, T., **e, S.: A ConvNet for the 2020s [EB/OL], 2 March 2022. https://arxiv.org/abs/2201.03545. Accessed 6 Apr 2022

  15. Sun, K., **ao, B., Liu, D., et al.: Deep high-resolution representation learning for human pose estimation. ar**v e-prints (2019)

    Google Scholar 

  16. Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) Medical Image Computing and Computer-Assisted Intervention – MICCAI 2015: 18th International Conference, Munich, Germany, October 5–9, 2015, Proceedings, Part III, pp. 234–241. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24574-4_28

    Chapter  Google Scholar 

  17. **ao, T., Liu, Y., Zhou, B., Jiang, Y., Sun, J.: Unified perceptual parsing for scene understanding. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) Computer Vision – ECCV 2018: 15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part V, pp. 432–448. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01228-1_26

    Chapter  Google Scholar 

  18. He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. IEEE (2016)

    Google Scholar 

  19. Hsu, J.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: International Conference on Multimedia and Expo (ICME), Toronto, Canada, July (2006)

    Google Scholar 

  20. Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 39(4), 640–651 (2015)

    Google Scholar 

  21. Bianchi, T., De Rosa, A., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2444–2447. IEEE (2011)

    Google Scholar 

  22. Iakovidou, C., Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. Vis. Commun. Image Represent. 54, 155–170 (2018)

    Article  Google Scholar 

  23. Wang, P., Chen, P., Yuan, Y., et al.: Understanding convolution for semantic segmentation. IEEE (2018)

    Google Scholar 

  24. Deng, J., Dong, W., Socher, R., et al.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2009, Miami, Florida, USA. IEEE (2009)

    Google Scholar 

  25. Dong, J., Wang, W., Tan, T.: CASIA image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing, pp. 422–426. IEEE (2013)

    Google Scholar 

  26. Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144–159 (2018)

    Article  Google Scholar 

  27. Bi, X., Wei, Y., **ao, B., et al.: RRU-Net: the ringed residual U-Net for image splicing forgery detection. In: 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE (2019)

    Google Scholar 

  28. Uan, H., et al.: MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 63–72. IEEE (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongji Ye .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Chinese Institute of Command and Control

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, S., Ye, H. (2022). Image Tampering Localization Based on Two-Stream Weighted Fusion Features. In: Proceedings of 2022 10th China Conference on Command and Control. C2 2022. Lecture Notes in Electrical Engineering, vol 949. Springer, Singapore. https://doi.org/10.1007/978-981-19-6052-9_14

Download citation

Publish with us

Policies and ethics

Navigation