Abstract
The tools to tamper with digital photographs have become easier to use by the lay person and techniques have evolved that make detection of tampering more difficult, there is a clear need to not only discover novel ways to distinguish the difference between real and fake, but also to make the detection quicker and easier. Using content-aware resizing, which is also known as image retargeting, seam carving, content-aware rescaling, liquid rescaling, or liquid resizing, allows for changing the resolution of an image while keeping the content unchanged in the image. In this paper, the retraining of Inception ResNet v2, one of the best object detection deep learning classifiers, is undertaken to look at classifications of untampered versus tampered photos via seam removal.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hsu, C.-M., Lee, J.-C., Chen, W.-K.: An efficient detection algorithm for copy-move forgery. Presented at the May (2015)
Chen, C., Shi, Y.Q., Su, W.: A machine learning based scheme for double JPEG compression detection. In: 2008 19th International Conference on Pattern Recognition. ICPR 2008, pp. 1–4. IEEE (2008)
Chen, Y.-L., Hsu, C.-T.: Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6, 396–406 (2011). https://doi.org/10.1109/TIFS.2011.2106121
Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. Presented at the November (2009)
Farid, H.: Image forgery detection. IEEE Signal Process. Mag. 26, 16–25 (2009). https://doi.org/10.1109/MSP.2008.931079
Liu, Q.: An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics. Pattern Recogn. 65, 35–46 (2017)
Liu, Q.: An improved approach to detecting JPEG seam carving under recompression. IEEE Trans. Circuits Syst. Video Technol. (in Press)
Avidan, S., Shamir, A.: Seam carving for content-aware image resizing. ACM Trans. Graph. 26, 10 (2007). https://doi.org/10.1145/1239451.1239461
Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.: Inception-v4, inception-ResNet and the impact of residual connections on learning. arXiv:160207261 Cs. (2016)
Szegedy, C., et al.: Going deeper with convolutions. Presented at the June (2015)
Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167 (2015)
Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. Presented at the June (2016)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. Presented at the June (2016)
Alemi, A.: Improving inception and image classification in TensorFlow, https://research.googleblog.com/2016/08/improving-inception-and-image.html
Bunk, J., et al.: Detection and localization of image forgeries using resampling features and deep learning. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1881–1889. IEEE (2017)
Chen, B.-C., Ghosh, P., Morariu, V.I., Davis, L.S.: Detection of metadata tampering through discrepancy between image content and metadata using multi-task deep learning. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1872–1880. IEEE (2017)
Shan, J., Li, L.: A deep learning method for microaneurysm detection in fundus images. Presented at the June (2016)
Kalpana, K., Amritha, P.P.: Image manipulation detection using deep learning in TensorFlow. Int. J. Control Theory Appl. 9(40), 221–225 (2016)
Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. arXiv 1409 (2014)
Acknowledgments
We highly appreciate the support for this study from the National Science Foundation under Award #1318688 and from the SHSU Office of Research and Sponsored Programs under an Enhanced Research Grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Singleton, M.B., Liu, Q. (2018). Detecting Digital Photo Tampering with Deep Learning. In: Meng, L., Zhang, Y. (eds) Machine Learning and Intelligent Communications. MLICOM 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 251. Springer, Cham. https://doi.org/10.1007/978-3-030-00557-3_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-00557-3_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00556-6
Online ISBN: 978-3-030-00557-3
eBook Packages: Computer ScienceComputer Science (R0)