Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3123266.3123411acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Deep Matching and Validation Network: An End-to-End Solution to Constrained Image Splicing Localization and Detection

Published: 19 October 2017 Publication History
  • Get Citation Alerts
  • Abstract

    Image splicing is a very common image manipulation technique that is sometimes used for malicious purposes. A splicing detection and localization algorithm usually takes an input image and produces a binary decision indicating whether the input image has been manipulated, and also a segmentation mask that corresponds to the spliced region. Most existing splicing detection and localization pipelines suffer from two main shortcomings: 1) they use handcrafted features that are not robust against subsequent processing (e.g., compression), and 2) each stage of the pipeline is usually optimized independently. In this paper we extend the formulation of the underlying splicing problem to consider two input images, a query image and a potential donor image. Here the task is to estimate the probability that the donor image has been used to splice the query image, and obtain the splicing masks for both the query and donor images. We introduce a novel deep convolutional neural network architecture, called Deep Matching and Validation Network (DMVN), which simultaneously localizes and detects image splicing. The proposed approach does not depend on handcrafted features and uses raw input images to create deep learned representations. Furthermore, the DMVN is end-to-end optimized to produce the probability estimates and the segmentation masks. Our extensive experiments demonstrate that this approach outperforms state-of-the-art splicing detection methods by a large margin in terms of both AUC score and speed.

    References

    [1]
    Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra. 2011. A sift-based forensic method for copy--move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, Vol. 6, 3 (2011), 1099--1110.
    [2]
    Irene Amerini, Rudy Becarelli, Roberto Caldelli, and Andrea Del Mastio. 2014. Splicing forgeries localization through the use of first digit features Information Forensics and Security (WIFS), 2014 IEEE International Workshop on. IEEE, 143--148.
    [3]
    Edoardo Ardizzone, Alessandro Bruno, and Giuseppe Mazzola. 2015. Copy--move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensics and Security, Vol. 10, 10 (2015), 2084--2094.
    [4]
    Khurshid Asghar, Zulfiqar Habib, and Muhammad Hussain. 2016. Copy-move and splicing image forgery detection and localization techniques: a review. Australian Journal of Forensic Sciences (2016), 1--27.
    [5]
    Mauro Barni, Marco Fontani, and Benedetta Tondi. 2012. A universal technique to hide traces of histogram-based image manipulations Proceedings of the on Multimedia and security. ACM, 97--104.
    [6]
    Tiziano Bianchi and Alessandro Piva. 2012. Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Transactions on Information Forensics and Security, Vol. 7, 3 (2012), 1003--1017.
    [7]
    Gajanan K Birajdar and Vijay H Mankar. 2013. Digital image forgery detection using passive techniques: A survey. Digital Investigation Vol. 10, 3 (2013), 226--245.
    [8]
    Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukás. 2008. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, Vol. 3, 1 (2008), 74--90.
    [9]
    Yi-Lei Chen and Chiou-Ting Hsu. 2011. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security, Vol. 6, 2 (2011), 396--406.
    [10]
    Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, and Elli Angelopoulou. 2012. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on information forensics and security, Vol. 7, 6 (2012), 1841--1854.
    [11]
    Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva. 2015 a. Efficient dense-field copy--move forgery detection. IEEE Transactions on Information Forensics and Security, Vol. 10, 11 (2015), 2284--2297.
    [12]
    Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva. 2015 b. Splicebuster: A new blind image splicing detector. Information Forensics and Security (WIFS), 2015 IEEE International Workshop on. IEEE, 1--6.
    [13]
    Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva. 2017. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection. arXiv preprint arXiv:1703.04615 (2017).
    [14]
    Davide Cozzolino and Luisa Verdoliva. 2016. Single-image splicing localization through autoencoder-based anomaly detection Information Forensics and Security (WIFS), 2016 IEEE International Workshop on. IEEE, 1--6.
    [15]
    Alberto A de Oliveira, Pasquale Ferrara, Alessia De Rosa, Alessandro Piva, Mauro Barni, Siome Goldenstein, Zanoni Dias, and Anderson Rocha. 2016. Multiple parenting phylogeny relationships in digital images. IEEE Transactions on Information Forensics and Security, Vol. 11, 2 (2016), 328--343.
    [16]
    Zanoni Dias, Siome Goldenstein, and Anderson Rocha. 2013. Large-scale image phylogeny: Tracing image ancestral relationships. Ieee Multimedia, Vol. 20, 3 (2013), 58--70.
    [17]
    Zanoni Dias, Anderson Rocha, and Siome Goldenstein. 2012. Image phylogeny by minimal spanning trees. IEEE Transactions on Information Forensics and Security, Vol. 7, 2 (2012), 774--788.
    [18]
    Zhen Fang, Shuozhong Wang, and Xinpeng Zhang. 2010. Image splicing detection using color edge inconsistency Multimedia Information Networking and Security (MINES), 2010 International Conference on. IEEE, 923--926.
    [19]
    Hany Farid. 2009. Image forgery detection. IEEE Signal processing magazine Vol. 26, 2 (2009), 16--25.
    [20]
    Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. arXiv preprint arXiv:1512.03385 (2015).
    [21]
    Yu-Feng Hsu and Shih-Fu Chang. 2006. Detecting image splicing using geometry invariants and camera characteristics consistency. IEEE, 549--552.
    [22]
    Ce Li, Qiang Ma, Limei Xiao, Ming Li, and Aihua Zhang. 2017 b. Image splicing detection based on Markov features in QDCT domain. Neurocomputing Vol. 228 (2017), 29--36.
    [23]
    Haodong Li, Weiqi Luo, Xiaoqing Qiu, and Jiwu Huang. 2017 a. Image Forgery Localization via Integrating Tampering Possibility Maps. IEEE Transactions on Information Forensics and Security, Vol. 12, 5 (2017), 1240--1252.
    [24]
    Jian Li, Xiaolong Li, Bin Yang, and Xingming Sun. 2015. Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, Vol. 10, 3 (2015), 507--518.
    [25]
    Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In European Conference on Computer Vision. Springer, 740--755.
    [26]
    Qingzhong Liu and Zhongxue Chen. 2014. Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images. ACM Trans. Intell. Syst. Technol. Vol. 5, 4, Article no63 (Dec. 2014), pages 30.

    Cited By

    View all
    • (2024)Urban Visual Localization of Block-Wise Monocular Images with Google Street ViewsRemote Sensing10.3390/rs1605080116:5(801)Online publication date: 25-Feb-2024
    • (2024)AISMSNet: Advanced Image Splicing Manipulation Identification Based on Siamese NetworksApplied Sciences10.3390/app1413554514:13(5545)Online publication date: 26-Jun-2024
    • (2024)CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery DetectionIEEE Transactions on Multimedia10.1109/TMM.2023.334516026(6090-6101)Online publication date: 2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM '17: Proceedings of the 25th ACM international conference on Multimedia
    October 2017
    2028 pages
    ISBN:9781450349062
    DOI:10.1145/3123266
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 October 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. deep learning
    2. image forensics
    3. splicing detection and localization

    Qualifiers

    • Research-article

    Funding Sources

    • the Defense Advanced Research Projects Agency

    Conference

    MM '17
    Sponsor:
    MM '17: ACM Multimedia Conference
    October 23 - 27, 2017
    California, Mountain View, USA

    Acceptance Rates

    MM '17 Paper Acceptance Rate 189 of 684 submissions, 28%;
    Overall Acceptance Rate 995 of 4,171 submissions, 24%

    Upcoming Conference

    MM '24
    The 32nd ACM International Conference on Multimedia
    October 28 - November 1, 2024
    Melbourne , VIC , Australia

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)28
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Urban Visual Localization of Block-Wise Monocular Images with Google Street ViewsRemote Sensing10.3390/rs1605080116:5(801)Online publication date: 25-Feb-2024
    • (2024)AISMSNet: Advanced Image Splicing Manipulation Identification Based on Siamese NetworksApplied Sciences10.3390/app1413554514:13(5545)Online publication date: 26-Jun-2024
    • (2024)CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery DetectionIEEE Transactions on Multimedia10.1109/TMM.2023.334516026(6090-6101)Online publication date: 2024
    • (2024)UCM-Net: A U-Net-Like Tampered-Region-Related Framework for Copy-Move Forgery DetectionIEEE Transactions on Multimedia10.1109/TMM.2023.327062926(750-763)Online publication date: 2024
    • (2024)Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery LocalizationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338147019(4820-4834)Online publication date: 2024
    • (2024)MFI-Net: Multi-Feature Fusion Identification Networks for Artificial Intelligence ManipulationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2023.328917134:2(1266-1280)Online publication date: Feb-2024
    • (2024)Supervised Anti-Forensic DNN to Detect Multiple-time Compressed JPEG Tampered Images2024 3rd International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)10.1109/ICAEEE62219.2024.10561671(1-6)Online publication date: 25-Apr-2024
    • (2024)Copy Move Forgery detection and localisation robust to rotation using block based Discrete Cosine Transform and eigenvaluesJournal of Visual Communication and Image Representation10.1016/j.jvcir.2024.10407599(104075)Online publication date: Mar-2024
    • (2024)DMFF-Net: Double-stream multilevel feature fusion network for image forgery localizationEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.107200127(107200)Online publication date: Jan-2024
    • (2024)Image forgery detection: comprehensive review of digital forensics approachesJournal of Computational Social Science10.1007/s42001-024-00265-87:1(877-915)Online publication date: 3-Apr-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media