Abstract
Image tampering forensics is performed by analyzing images to locate the tampered regions. However, most image tampering detection methods lack locational accuracy and are effective only for specific types of tampering. To address these problems, this chapter proposes a method that employs an encoder-decoder network structure with combined multiple feature encoding to segment tampered regions of an image from untampered regions. Three features, obtained using constrained convolution, steganalysis rich model filtering and common convolution, are combined. During the encoding stage, ring residual units are used to extract features. The combination of multiple features and the ring residual units makes the proposed method most suitable for image tampering detection. Channel attention with a soft threshold function is used to reinforce semantic information in the decoding stage. Experiments with three image forensic datasets, NIST16, COVERAGE and CASIA, demonstrate that the proposed method exhibits strong performance in terms of the F1 score and localization of tampered regions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
V. Badrinarayanan, A. Kendall and R. Cipolla, SegNet: A deep convolutional encoder-decoder architecture for image segmentation, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39(12), pp. 2481–2495, 2017.
J. Bappy, A. Roy-Chowdhury, J. Bunk, L. Nataraj and B. Manjunath, Exploiting spatial structure for localizing manipulated image regions, Proceedings of the IEEE International Conference on Computer Vision, pp. 4980–4989, 2017.
J. Bappy, C. Simons, L. Nataraj, B. Manjunath and A. Roy-Chowdhury, Hybrid LSTM and encoder-decoder architecture for detection of image forgeries, IEEE Transactions on Image Processing, vol. 28(7), pp. 3286–3300, 2019.
B. Bayar and M. Stamm, Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection, IEEE Transactions on Information Forensics and Security, vol. 13(11), pp. 2691–2706, 2018.
X. Bi, Y. Wei, B. Xiao and W. Li, RRU-Net: The ringed residual U-Net for image splicing forgery detection, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 30–39, 2019.
J. Dong, W. Wang and T. Tan, CASIA image tampering detection evaluation database, Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, pp. 422–426, 2013.
P. Ferrara, T. Bianchi, A. De Rosa and A. Piva, Image forgery localization via fine-grained analysis of CFA artifacts, IEEE Transactions on Information Forensics and Security, vol. 7(5), pp. 1566–1577, 2012.
R. Girshick, Fast R-CNN, Proceedings of the IEEE International Conference on Computer Vision, pp. 1440–1448, 2015.
J. Hu, L. Shen, S. Albanie, G. Sun and E. Wu, Squeeze-and-excitation networks, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42(8), pp. 2011–2023, 2020.
J. Long, E. Shelhamer and T. Darrell, Fully convolutional networks for semantic segmentation, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3431–3440, 2015.
W. Luo, J. Huang and G. Qiu, JPEG error analysis and its applications to digital image forensics, IEEE Transactions on Information Forensics and Security, vol. 5(3), pp. 480–491, 2010.
B. Mahdian and S. Saic, Using noise inconsistencies for blind image forensics, Image and Vision Computing, vol. 27(10), pp. 1497–1503, 2009.
Multimodal Information Group, Information Technology Laboratory, Nimble Challenge 2017 Evaluation, National Institute of Standards and Technology, Gaithersburg, Maryland (www.nist.gov/itl/Iad/mig/nimble-challenge-2017-evaluation), 2019.
B. Wen, Y. Zhu, R. Subramanian, T. Ng, X. Shen and S. Winkler, COVERAGE – A novel database for copy-move forgery detection, Proceedings of the IEEE International Conference on Image Processing, pp. 161–165, 2016.
Y. Wu, W. Abd-Almageed and P. Natarajan, Image copy-move forgery detection via an end-to-end deep neural network, Proceedings of the IEEE Winter Conference on Applications of Computer Vision, pp. 1907–1915, 2018.
Y. Wu, W. Abd-Almageed and P. Natarajan, ManTra-Net: Manipulation tracing network for detection and localization of image forgeries with anomalous features, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 9535–9544, 2019.
M. Zhao, S. Zhong, X. Fu, B. Tang and M. Pecht, Deep residual shrinkage networks for fault diagnosis, IEEE Transactions on Industrial Informatics, vol. 16(7), pp. 4681–4690, 2020.
Q. Zhao, G. Cao, A. Zhou, X. Huang and L. Yang, Image tampering detection via semantic segmentation network, Proceedings of the Fifteenth IEEE International Conference on Signal Processing, pp. 165–169, 2020.
P. Zhou, X. Han, V. Morariu and L. Davis, Learning rich features for image manipulation detection, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1053–1061, 2018.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Luo, Y., Liang, C., Zhang, S., Qin, S. (2022). A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVIII. DigitalForensics 2022. IFIP Advances in Information and Communication Technology, vol 653. Springer, Cham. https://doi.org/10.1007/978-3-031-10078-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-10078-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-10077-2
Online ISBN: 978-3-031-10078-9
eBook Packages: Computer ScienceComputer Science (R0)