Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A semi-supervised deep learning approach for cropped image detection

Published: 25 June 2024 Publication History

Abstract

Deep learning algorithms have shown great performance in multimedia forensics applications using supervised learning on large-scale labeled datasets. However, constructing such extensive labeled datasets can be challenging and costly in several multimedia forensics scenarios. Additionally, heavyweight deep learning models with complex architectures and a large number of parameters require significant hardware resources for training. To address these challenges in the context of image cropping detection, a common multimedia forensics application, we propose a semi-supervised deep learning framework capable of training on a large amount of unlabeled image samples. In this framework, we leverage a teacher model, trained on a small set of labeled image samples, to rank the confidence scores of image samples in a large-scale unlabeled dataset. By utilizing the ranked image samples, we train a student network successfully. To validate the effectiveness of our collaborative training framework across various image cropping detection scenarios, we conduct extensive experiments on a large-scale dataset. The experimental results clearly demonstrate that our semi-supervised learning approach achieved a state-of-the-art performance compared to existing supervised detection frameworks, achieving an accuracy of 91.79% on the BOSSbase dataset and 89.23% on the Alaska dataset. Furthermore, we conducted in-depth research on various factors that influence detection performance in the context of semi-supervised learning. These factors include pairings of teacher–student models, the top-K selection approach, the number of unlabeled samples, the number of iterations in self-training, and the proportion of high-confidence samples using in semi-supervised learning.

References

[1]
Almansoori A., Alshamsi M., Analysis of cybercrime on social media platforms and its challenges, in: Proceedings of the international conference on artificial intelligence and computer vision, Springer, 2021, pp. 615–625.
[2]
Arin E., Kutlu M., Deep learning based social bot detection on twitter, IEEE Transactions on Information Forensics and Security 18 (2023) 1763–1772.
[3]
Bas P., Filler T., Pevnỳ T., Break our steganographic system, in: Information hiding: 13th International conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised selected papers 13, Springer, 2011, pp. 59–70.
[4]
Boroumand M., Chen M., Fridrich J., Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security 14 (5) (2018) 1181–1193.
[5]
Bruna A.R., Messina G., Battiato S., Crop detection through blocking artefacts analysis, in: Image analysis and processing–ICIAP: 16th International conference, Springer, 2011, pp. 650–659.
[6]
Castillo Camacho I., Wang K., A comprehensive review of deep-learning-based methods for image forensics, Journal of Imaging 7 (4) (2021) 69.
[7]
Chapelle O., Scholkopf B., Zien A., Semi-supervised learning, IEEE Transactions on Neural Networks 20 (3) (2009) 542.
[8]
Chen J., Bai G., Liang S., Li Z., Automatic image cropping: A computational complexity study, in: 2016 IEEE conference on computer vision and pattern recognition, 2016, pp. 507–515.
[9]
Chen Y.-L., Huang T.-W., Chang K.-H., Tsai Y.-C., Chen H.-T., Chen B.-Y., Quantitative analysis of automatic image cropping algorithms: A dataset and comparative study, in: 2017 IEEE winter conference on applications of computer vision, IEEE, 2017, pp. 226–234.
[10]
Cogranne, R., Giboulot, Q., & Bas, P. (2019). The ALASKA steganalysis challenge: A first step towards steganalysis. In Proceedings of the ACM workshop on information hiding and multimedia security (pp. 125–137).
[11]
Cozzolino D., Verdoliva L., Multimedia forensics before the deep learning era, in: Handbook of digital face manipulation and detection: From DeepFakes to morphing attacks, Springer International Publishing Cham, 2022, pp. 45–67.
[12]
Erman J., Mahanti A., Arlitt M., Cohen I., Williamson C., Offline/realtime traffic classification using semi-supervised learning, Performance Evaluation 64 (9–12) (2007) 1194–1213.
[13]
Fanfani M., Iuliani M., Bellavia F., Colombo C., Piva A., A vision-based fully automated approach to robust image cropping detection, Signal Processing: Image Communication 80 (2020).
[14]
Fang, C., Lin, Z., Mech, R., & Shen, X. (2014). Automatic image cropping using visual composition, boundary simplicity and content preservation models. In Proceedings of the 22nd ACM international conference on multimedia (pp. 1105–1108).
[15]
Feng Y., Chen J., Zhang T., He S., Xu E., Zhou Z., Semi-supervised meta-learning networks with squeeze-and-excitation attention for few-shot fault diagnosis, ISA Transactions 120 (2022) 383–401.
[16]
France 24 News channel Y., Why the way an image is cropped can change everything, 2018, [Online]. https://observers.france24.com/en/20180824-verification-guide-cropped-photo-video/. (Accessed 24 July 2018).
[17]
Gaikwad M., Doke A., Survey on meta learning algorithms for few shot learning, in: 6th International conference on intelligent computing and control systems, IEEE, 2022, pp. 1876–1879.
[18]
Guo G., Wang H., Shen C., Yan Y., Liao H.-Y.M., Automatic image cropping for visual aesthetic enhancement using deep neural networks and cascaded regression, IEEE Transactions on Multimedia 20 (8) (2018) 2073–2085.
[19]
Huang G., Laradji I., Vázquez D., Lacoste-Julien S., Rodríguez P., A Survey of self-supervised and few-shot object detection, IEEE Transactions on Pattern Analysis and Machine Intelligence 45 (4) (2023) 4071–4089.
[20]
Hussain I., Hussain D., Kohli R., Ismail M., Hussain S., Sajid Ullah S., Alroobaea R., Ali W., Umar F., Evaluation of Deep Learning and conventional approaches for image recaptured detection in multimedia forensics, Mobile Information Systems 2022 (2022).
[21]
Hussain I., Tan S., Huang J., A knowledge distillation based deep learning framework for cropped images detection in spatial domain, 2020, Available at SSRN. 4221632.
[22]
Hussain I., Tan S., Li B., Qin X., Hussain D., Huang J., A novel deep learning framework for double JPEG compression detection of small size blocks, Journal of Visual Communication and Image Representation 80 (2021).
[23]
Li W., Yuan Y., Yu N., Passive detection of doctored JPEG image via block artifact grid extraction, Signal Processing 89 (9) (2009) 1821–1829.
[24]
Li B., Zhang H., Luo H., Tan S., Detecting double JPEG compression and its related anti-forensic operations with CNN, Multimedia Tools and Applications 78 (7) (2019) 8577–8601.
[25]
Luo W., Qu Z., Huang J., Qiu G., A novel method for detecting cropped and recompressed image block, in: 2007 IEEE international conference on acoustics, speech and signal processing-ICASSP’07. Vol. 2, IEEE, 2007, pp. II–217.
[26]
Meng X., Niu S., Yan R., Li Y., Detecting photographic cropping based on vanishing points, Chinese Journal of Electronics 22 (2) (2013) 369–372.
[27]
Oliver A., Odena A., Raffel C.A., Cubuk E.D., Goodfellow I., Realistic evaluation of deep semi-supervised learning algorithms, in: Bengio S., Wallach H., Larochelle H., Grauman K., Cesa-Bianchi N., Garnett R. (Eds.), Advances in neural information processing systems. Vol. 31, Curran Associates, Inc, 2018.
[28]
Parnami A., Lee M., Learning from few examples: A summary of approaches to few-shot learning, 2022,. arXiv preprint arXiv:2203.04291.
[29]
Patel P., Kannoorpatti K., A theoretical review of social media usage by cyber-criminals, in: 2017 International conference on computer communication and informatics, 2017, pp. 1–6.
[30]
Pourpanah F., Abdar M., Luo Y., Zhou X., Wang R., Lim C.P., Wang X.-Z., Wu Q.M.J., A review of generalized zero-shot learning methods, IEEE Transactions on Pattern Analysis and Machine Intelligence 45 (4) (2023) 4051–4070.
[31]
Qi G.-J., Luo J., Small data challenges in big data era: A survey of recent progress on unsupervised and semi-supervised methods, IEEE Transactions on Pattern Analysis and Machine Intelligence 44 (4) (2022) 2168–2187.
[32]
Ratle F., Camps-Valls G., Weston J., Semisupervised neural networks for efficient hyperspectral image classification, IEEE Transactions on Geoscience and Remote Sensing 48 (5) (2010) 2271–2282.
[33]
Sermanet P., Eigen D., Zhang X., Mathieu M., Fergus R., LeCun Y., Overfeat: Integrated recognition, localization and detection using convolutional networks, 2013, arXiv preprint arXiv:1312.6229.
[34]
Singh B., Sharma D.K., Predicting image credibility in fake news over social media using multi-modal approach, Neural Computing and Applications 34 (17) (2022) 21503–21517.
[35]
Tan M., Le Q., Efficientnet: Rethinking model scaling for convolutional neural networks, in: International conference on machine learning, PMLR, 2019, pp. 6105–6114.
[36]
Triguero I., García S., Herrera F., Self-labeled techniques for semi-supervised learning: taxonomy, software and empirical study, Knowledge and Information Systems 42 (2015) 245–284.
[37]
Van Engelen J.E., Hoos H.H., A survey on semi-supervised learning, Machine Learning 109 (2) (2020) 373–440.
[38]
Van Hoorick, B., & Vondrick, C. (2021). Dissecting image crops. In Proceedings of the IEEE/CVF international conference on computer vision (pp. 9741–9750).
[39]
Verdoliva L., Media forensics and deepFakes: An overview, IEEE Journal of Selected Topics in Signal Processing 14 (5) (2020) 910–932.
[40]
Wang Y., Yao Q., Kwok J.T., Ni L.M., Generalizing from a few examples: A survey on few-shot learning, ACM Computing Surveys (CSUR) 53 (3) (2020) 1–34.
[41]
Wang Z.-F., Zhu L., Min Q.-S., Zeng C.-Y., Double compression detection based on feature fusion, in: 2017 International conference on machine learning and cybernetics. Vol. 2, IEEE, 2017, pp. 379–384.
[42]
Xie, Q., Luong, M.-T., Hovy, E., & Le, Q. V. (2020). Self-training with noisy student improves imagenet classification. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 10687–10698).
[43]
Yang X., Song Z., King I., Xu Z., A survey on deep semi-supervised learning, IEEE Transactions on Knowledge and Data Engineering (2022) 1–20.
[44]
Yerushalmy I., Hel-Or H., Digital image forgery detection based on lens and sensor aberration, International Journal of Computer Vision 92 (2011) 71–91.
[45]
Ying Q., Hu X., Zhou H., Zhang X., You Z., Qian Z., No way to crop: On robust image crop localization, 2021, arXiv. arXiv:2110.05687.
[46]
Ying Q., Zhou H., Qian Z., Li S., Zhang X., Robust image protection countering cropping manipulation, 2022, arXiv preprint arXiv:2206.02405.
[47]
Yousfi, Y., Butora, J., Fridrich, J., & Fuji Tsang, C. (2021). Improving efficientnet for JPEG steganalysis. In Proceedings of the 2021 ACM workshop on information hiding and multimedia security (pp. 149–157).
[48]
Zhenzhen G., Shaozhang N., Hongli H., Tamper detection method for clipped double jpeg compression image, 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), IEEE, 2015, pp. 185–188.
[49]
Zhu X., Goldberg A.B., Graph-based semi-supervised learning, in: Introduction to semi-supervised learning, Springer International Publishing, Cham, 2009, pp. 43–55.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal  Volume 243, Issue C
Jun 2024
1588 pages

Publisher

Pergamon Press, Inc.

United States

Publication History

Published: 25 June 2024

Author Tags

  1. Image cropping
  2. Semi-supervised learning
  3. Multimedia forensics
  4. Deep learning algorithms
  5. Unlabeled data

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media