Advertisement

Block-Based Convolutional Neural Network for Image Forgery Detection

  • Jianghong Zhou
  • Jiangqun Ni
  • Yuan Rao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10431)

Abstract

With the development of a variety of image editing tools, performing digital image forgery and concealing the forgery edge is easier. On the other hand, these visually convincing tampering operations also make authentication of digital images difficult. Therefore, developing a precise and robust method to detect these splicing images is urgently required. In the past, some researchers proposed some methods, which achieves an accuracy of over 97%, but robustness of these methods remains unknown. In this paper, a novel image forgery detection method based on a special blocking strategy is proposed, in which the processing unit for each block is a rich model convolutional neural network (rCNN). The proposed method is not only able to detect the splicing image but also reserves its effectiveness under circumstances of JPG compression. Extensive experiments with CASIA v1.0, CASIO v2.0 and Columbia image forgery evaluation databases were carried out, which demonstrates the effectiveness and strong robustness of the proposed method.

Keywords

Splicing image detection Rich model Convolutional neural network Blocking strategy 

References

  1. 1.
    Jing, W., Hongbin, Z.: Exposing digital forgeries by detecting traces of image splicing. In: 2006 8th International Conference on Signal Processing, vol. 2. IEEE (2006)Google Scholar
  2. 2.
    He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45(12), 4292–4299 (2012)CrossRefGoogle Scholar
  3. 3.
    Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of the 9th Workshop on Multimedia & Security. ACM (2007)Google Scholar
  4. 4.
    Pan, X., Zhang, X., Lyu, S.: Exposing image splicing with inconsistent local noise variances. In: 2012 IEEE International Conference on Computational Photography (ICCP). IEEE (2012)Google Scholar
  5. 5.
    Muhammad, G., et al.: Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25(4), 985–995 (2015)CrossRefGoogle Scholar
  6. 6.
    Dong, J., Wang, W.: CASIA tampered image detection evaluation (TIDE) database, v1.0 and v2.0. (2011). http://forensics.idealtest.org/
  7. 7.
    Lee, H., Ekanadham, C., Ng, A.Y.: Sparse deep belief net model for visual area V2. In: Advances in Neural Information Processing Systems 20 (NIPS) (2008)Google Scholar
  8. 8.
    Larochelle, H., et al.: Exploring strategies for training deep neural networks. J. Mach. Learn. Res. 10(10), 1–40 (2009)zbMATHGoogle Scholar
  9. 9.
    LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)CrossRefGoogle Scholar
  10. 10.
    Giacinto, G., Roli, F.: Design of effective neural network ensembles for image classification purposes. Image Vis. Comput. 19(9), 699–707 (2001)CrossRefGoogle Scholar
  11. 11.
    Hinton, G., et al.: Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process. Mag. 29(6), 82–97 (2012)CrossRefGoogle Scholar
  12. 12.
    Ji, S., et al.: 3D convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221–231 (2013)CrossRefGoogle Scholar
  13. 13.
    Collobert, R., Weston, J.: A unified architecture for natural language processing: deep neural networks with multitask learning. In: Proceedings of the 25th International Conference on Machine Learning. ACM (2008)Google Scholar
  14. 14.
    Fukushima, K., Miyake, S., Ito, T.: Neocognitron: a neural network model for a mechanism of visual pattern recognition. IEEE Trans. Syst. Man Cybern. 5, 826–834 (1983)CrossRefGoogle Scholar
  15. 15.
    LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)CrossRefGoogle Scholar
  16. 16.
    Srivastava, N., et al.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)MathSciNetzbMATHGoogle Scholar
  17. 17.
    Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)
  18. 18.
    LeCun, Y.: LeNet-5, convolutional neural networks (2015). http://yann.lecun.com/exdb/lenet
  19. 19.
    Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE (2016)Google Scholar
  21. 21.
    Gonzalez, R.C., Woods, R.E.: Image Processing. Digital Image Processing, vol. 2 (2007)Google Scholar
  22. 22.
    Columbia, D.: Research Lab: Columbia Image Splicing Detection Evaluation Dataset (2012). http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/dlform.html
  23. 23.
    Jia, Y., et al.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM International Conference on Multimedia ACM (2014)Google Scholar
  24. 24.
    Kovesi, P.D.: MATLAB and Octave functions for computer vision and image processing (2000). http://www.csse.uwa.edu.au/~pk/Research/MatlabFns/#match
  25. 25.
    Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Sun Yat-sen UniversityGuangzhouChina

Personalised recommendations