Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Cross-scale condition aggregation and iterative refinement for copy-move forgery detection

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Copy-move forgery detection poses a significant challenge because the brightness and contrast of forged and real regions are highly consistent, and the forensic clues are weakened by various affine transformations and post-processing operations. Existing deep learning models ignore the hierarchical dependencies of the features and pay less attention to information purification. To solve these problems, we propose a novel two-stage model to detect copy-move forgery, dubbed by CCAIR-Net. First, in the coarse localization stage, we propose a cross-scale condition aggregation module to integrate multi-level features from global to local. This aggregation structure can eliminate semantic disparities and capture multi-scale hierarchical dependencies of features. In particular, the condition aggregation block enables feature purification and filtering of interfering information. Second, in the refinement stage, the designed weighted fusion mechanism can guide the model to remove falsely detected regions and supplement the miss-detected regions by adaptively weighted fusion of coarse-grained and fine-grained features. Furthermore, the stage-wise training strategy takes advantage of different losses to train the network to detect tampered regions at various scales. Extensive experiments demonstrate that the proposed CCAIR-Net performs better than state-of-the-art methods. It can detect and segment forged and real areas more accurately, even for affine transformations and post-processing attack images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Datasets used are publicly available.

References

  1. Pun C, Yuan X, Bi X (2015) Image forgery detection using adaptive over-segmentation and feature point matching. IEEE Trans Inf Forensic Secur 10(8):1705–1716

    Article  Google Scholar 

  2. Wu Y, Abd-Almageed W, Natarajan P (2018) BusterNet: Detecting copy-move image forgery with source/target localization. In: European Conference on Computer Vision, pp 168–184

  3. Warif N, Idris M, Wahab A et al (2022) A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review. Multimed Tools Appl 81:15171–15203

    Article  Google Scholar 

  4. Elaskily M, Dessouky M, Faragallah O et al (2023) A survey on traditional and deep learning copy move forgery detection (CMFD) techniques. Multimed Tools Appl 82:34409–34435

    Article  Google Scholar 

  5. Wang Y, Kang X, Chen Y (2020) Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. J Inf Secur Appl 54:102536

    Google Scholar 

  6. Su L, Li C, Lai Y, Yang J (2018) A fast forgery detection algorithm based on exponential-Fourier moments for video region duplication. IEEE Trans Multimed 20(4):825–840

    Article  Google Scholar 

  7. Pun C, Chung J (2018) A two-stage localization for copy-move forgery detection. Inf Sci 463:33–55

    Article  MathSciNet  Google Scholar 

  8. Amerini I, Ballan L et al (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099–1110

    Article  Google Scholar 

  9. Wang X, Jiao L, Wang X et al (2018) A new keypoint-based copy-move forgery detection for color image. Appl Intell 48(10):3630–3652

    Article  Google Scholar 

  10. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10(3):507–518

    Article  Google Scholar 

  11. Cui Z, Lu N (2023) Feature-comparison network for visual tracking. Appl Intell 53:18263–18276

    Article  Google Scholar 

  12. Zhang X, Demiris Y (2023) Visible and Infrared Image Fusion Using Deep Learning. IEEE Trans Pattern Anal Mach Intell 45(8):10535–10554

    Article  Google Scholar 

  13. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE international workshop on information forensics and security (WIFS). IEEE, Abu Dhabi, pp 1–6

  14. Liu Y, Guan Q, Zhao X (2018) Copy-move forgery detection based on convolutional kernel network. Multimed Tools Appl 77:18269–18293

    Article  Google Scholar 

  15. Wu Y, Abd-Almageed W, Natarajan P (2018) Image copy-move forgery detection via an end-to-end deep neural network. In: IEEE Winter Conference on Applications of Computer Vision (WACV), pp 1907–1915

  16. Chen B, Tan W, Coatrieux G et al (2021) A serial image copy-move forgery localization scheme with source/target distinguishment. IEEE Trans Multimed 23:3506–3517

    Article  Google Scholar 

  17. Islam A, Long C, Basharat A, Hoogs A (2020) DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-Move Forgery Detection and Localization. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 4675–4684

  18. Zhong J, Pun C (2020) An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection. IEEE Trans Inf Forensic Secur 15:2134–2146

    Article  Google Scholar 

  19. Zhu Y, Chen C, Yan G et al (2020) AR-Net: Adaptive Attention and Residual Refinement Network for Copy-Move Forgery Detection. IEEE Trans Ind Inform 16(10):6714–6723

    Article  Google Scholar 

  20. Armas Vega E, González Fernández E, Sandoval Orozco A et al (2021) Copy-move forgery detection technique based on discrete cosine transform blocks features. Neural Comput Appl 33:4713–4727

    Article  Google Scholar 

  21. Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Invest 9(1):49–57

    Article  Google Scholar 

  22. Ryu S, Lee M, Lee H (2010) Detection of copy-rotate-move forgery using zernike moments. In: 2010 International workshop on information hiding (IH), vol 6387. Springer, Heidelberg, pp 51–65

  23. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy– move forgery detection. IEEE Trans Inf Forensic Secur 10(11):2284–2297

    Article  Google Scholar 

  24. Amiano L, Cozzolino D, Poggi G, Verdoliva L (2019) A PatchMatch-Based Dense-Field Algorithm for Video Copy-Move Detection and Localization. IEEE Trans Circuits Syst Video Technol 29(3):669–682

    Article  Google Scholar 

  25. Sunitha K, Krishna A, Prasad B (2022) Copy-move tampering detection using keypoint based hybrid feature extraction and improved transformation model. Appl Intell 52:15405–15416

    Article  Google Scholar 

  26. Ardizzone E, Bruno A, Mazzola G (2015) Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensic Secur 10(10):2084–2094

    Article  Google Scholar 

  27. Wei Y, Ma J, Wang Z et al (2022) Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces. Int J Intell Syst 37(11):8291–8308

    Article  Google Scholar 

  28. Ren R, Niu S, Jin J et al (2023) Multi-scale attention context-aware network for detection and localization of image splicing. Appl Intell 53:18219–18238

    Article  Google Scholar 

  29. Ding H, Chen L, Tao Q et al (2023) DCU-Net: a dual-channel U-shaped network for image splicing forgery detection. Neural Comput Appl 35(7):5015–5031

    Article  Google Scholar 

  30. Zhuo L, Tan S, Li B, Huang J (2022) Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. IEEE Trans Inf Forensic Secur 17:819–834

    Article  Google Scholar 

  31. Yin Q, Wang J, Lu W, Luo X (2022) Contrastive learning based multi-task network for image manipulation detection. Signal Process 201:108709

    Article  Google Scholar 

  32. Lin X, Wang S, Deng J et al (2023) Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recogn 133:109026

    Article  Google Scholar 

  33. Hu X, Zhang Z, Jiang Z et al (2020) SPAN: Spatial Pyramid Attention Network for Image Manipulation Localization. In: European Conference on Computer Vision (ECCV), pp 312–328

  34. Barni M, Phan Q, Tondi B (2021) Copy Move Source-Target Disambiguation Through Multi-Branch CNNs. IEEE Trans Inf Forensic Secur 16:1825–1840

    Article  Google Scholar 

  35. Aria M, Hashemzadeh M, Farajzadeh N (2022) QDL-CMFD: A Quality-independent and deep Learning-based Copy-Move image forgery detection method. Neurocomputing 511:213–236

    Article  Google Scholar 

  36. Chen L, Zhu Y, Papandreou G et al (2018) Encoder-decoder with atrous separable convolution for semantic image segmentation. In: European conference on computer vision (ECCV), pp 801–818

  37. Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), pp 422–426

  38. Wen B, Zhu Y, Subramanian R, Ng T, Shen X, Winkler S (2016) COVERAGE—A novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP), pp 161–165

  39. Tralic D, Zupancic I, Grgic S, Grgic M (2013) CoMoFoD-New database for copy-move forgery detection. In: ELMAR, 2013 55th international symposium. IEEE, pp 49–54

  40. Zandi M, Mahmoudi-Aznaveh A, Talebpour A (2016) Iterative copy-move forgery detection based on a new interest point detection. IEEE Trans Inf Forensic Secur 11(11):2499–2512

    Article  Google Scholar 

  41. Mahdian B, Saic S (2008) Detection of resampling supplemented with noise inconsistencies analysis for image forensics. In: 2008 International Conference on Computational Sciences and Its Applications (ICCSA), pp 546–556

  42. Ferrara P, Bianchi T, Rosa A, Piva A (2012) Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts. IEEE Trans Inf Forensic Secur 7(5):1566–1577

    Article  Google Scholar 

  43. Krawetz N (2007) A picture’s worth: digital image analysis and forensics. Hacker factor solutions, pp 1–31. Available: http://www.hackerfactor.com/papers/bh-usa-07-krawetz-wp.pdf

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant 61972321, and in part by the National Natural Science Foundation of China under Grant 61901388.

Funding

The National Natural Science Foundation of China with a grant no. of 61972321 funded by Jiangbin Zheng with a grant no. of 61901388.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiangbin Zheng.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interests regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, Y., Zheng, J., Fang, A. et al. Cross-scale condition aggregation and iterative refinement for copy-move forgery detection. Appl Intell 54, 851–870 (2024). https://doi.org/10.1007/s10489-023-05174-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-023-05174-3

Keywords