Skip to main content

A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics

  • Conference paper
  • First Online:
Advances in Digital Forensics XVIII (DigitalForensics 2022)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 653))

Included in the following conference series:

Abstract

Image tampering forensics is performed by analyzing images to locate the tampered regions. However, most image tampering detection methods lack locational accuracy and are effective only for specific types of tampering. To address these problems, this chapter proposes a method that employs an encoder-decoder network structure with combined multiple feature encoding to segment tampered regions of an image from untampered regions. Three features, obtained using constrained convolution, steganalysis rich model filtering and common convolution, are combined. During the encoding stage, ring residual units are used to extract features. The combination of multiple features and the ring residual units makes the proposed method most suitable for image tampering detection. Channel attention with a soft threshold function is used to reinforce semantic information in the decoding stage. Experiments with three image forensic datasets, NIST16, COVERAGE and CASIA, demonstrate that the proposed method exhibits strong performance in terms of the F1 score and localization of tampered regions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. V. Badrinarayanan, A. Kendall and R. Cipolla, SegNet: A deep convolutional encoder-decoder architecture for image segmentation, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39(12), pp. 2481–2495, 2017.

    Google Scholar 

  2. J. Bappy, A. Roy-Chowdhury, J. Bunk, L. Nataraj and B. Manjunath, Exploiting spatial structure for localizing manipulated image regions, Proceedings of the IEEE International Conference on Computer Vision, pp. 4980–4989, 2017.

    Google Scholar 

  3. J. Bappy, C. Simons, L. Nataraj, B. Manjunath and A. Roy-Chowdhury, Hybrid LSTM and encoder-decoder architecture for detection of image forgeries, IEEE Transactions on Image Processing, vol. 28(7), pp. 3286–3300, 2019.

    Google Scholar 

  4. B. Bayar and M. Stamm, Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection, IEEE Transactions on Information Forensics and Security, vol. 13(11), pp. 2691–2706, 2018.

    Google Scholar 

  5. X. Bi, Y. Wei, B. Xiao and W. Li, RRU-Net: The ringed residual U-Net for image splicing forgery detection, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 30–39, 2019.

    Google Scholar 

  6. J. Dong, W. Wang and T. Tan, CASIA image tampering detection evaluation database, Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, pp. 422–426, 2013.

    Google Scholar 

  7. P. Ferrara, T. Bianchi, A. De Rosa and A. Piva, Image forgery localization via fine-grained analysis of CFA artifacts, IEEE Transactions on Information Forensics and Security, vol. 7(5), pp. 1566–1577, 2012.

    Google Scholar 

  8. R. Girshick, Fast R-CNN, Proceedings of the IEEE International Conference on Computer Vision, pp. 1440–1448, 2015.

    Google Scholar 

  9. J. Hu, L. Shen, S. Albanie, G. Sun and E. Wu, Squeeze-and-excitation networks, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42(8), pp. 2011–2023, 2020.

    Google Scholar 

  10. J. Long, E. Shelhamer and T. Darrell, Fully convolutional networks for semantic segmentation, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3431–3440, 2015.

    Google Scholar 

  11. W. Luo, J. Huang and G. Qiu, JPEG error analysis and its applications to digital image forensics, IEEE Transactions on Information Forensics and Security, vol. 5(3), pp. 480–491, 2010.

    Google Scholar 

  12. B. Mahdian and S. Saic, Using noise inconsistencies for blind image forensics, Image and Vision Computing, vol. 27(10), pp. 1497–1503, 2009.

    Google Scholar 

  13. Multimodal Information Group, Information Technology Laboratory, Nimble Challenge 2017 Evaluation, National Institute of Standards and Technology, Gaithersburg, Maryland (www.nist.gov/itl/Iad/mig/nimble-challenge-2017-evaluation), 2019.

  14. B. Wen, Y. Zhu, R. Subramanian, T. Ng, X. Shen and S. Winkler, COVERAGE – A novel database for copy-move forgery detection, Proceedings of the IEEE International Conference on Image Processing, pp. 161–165, 2016.

    Google Scholar 

  15. Y. Wu, W. Abd-Almageed and P. Natarajan, Image copy-move forgery detection via an end-to-end deep neural network, Proceedings of the IEEE Winter Conference on Applications of Computer Vision, pp. 1907–1915, 2018.

    Google Scholar 

  16. Y. Wu, W. Abd-Almageed and P. Natarajan, ManTra-Net: Manipulation tracing network for detection and localization of image forgeries with anomalous features, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 9535–9544, 2019.

    Google Scholar 

  17. M. Zhao, S. Zhong, X. Fu, B. Tang and M. Pecht, Deep residual shrinkage networks for fault diagnosis, IEEE Transactions on Industrial Informatics, vol. 16(7), pp. 4681–4690, 2020.

    Google Scholar 

  18. Q. Zhao, G. Cao, A. Zhou, X. Huang and L. Yang, Image tampering detection via semantic segmentation network, Proceedings of the Fifteenth IEEE International Conference on Signal Processing, pp. 165–169, 2020.

    Google Scholar 

  19. P. Zhou, X. Han, V. Morariu and L. Davis, Learning rich features for image manipulation detection, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1053–1061, 2018.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuling Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Luo, Y., Liang, C., Zhang, S., Qin, S. (2022). A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVIII. DigitalForensics 2022. IFIP Advances in Information and Communication Technology, vol 653. Springer, Cham. https://doi.org/10.1007/978-3-031-10078-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-10078-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-10077-2

  • Online ISBN: 978-3-031-10078-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics