Skip to main content
Log in

Digital image manipulation detection with weak feature stream

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

With the rapid development of deep neural network, two-stream Faster R-CNN network has been applied to tampering detection field and achieved good detection results. However, the noise stream generation of the two-stream Faster R-CNN needs to be manually selected, and the feature extraction network is the same as RGB stream, so it doesn’t maximize the program to play the advantages of deep neural network. In this paper, the hand-crafted features of the Faster R-CNN noise stream generation layer are cancelled and the two-layer convolution network is used to directly fit the weak features generated by image tampering. At the same time, according to the characteristics of image tampering detection, a weak feature extraction network based on multi-scale residual network is established to extract weak feature signals of image tampering. The network can suppress the natural features of the image and preserve the weak feature signals. In the network, the multi-level residual layers are used to extract RoI features, which makes full use of the feature layer informations with higher resolution. The experimental results show that the performance of the Faster R-CNN network with weak feature stream has been improved significantly in F1 score and localization of the tampering region.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Zhang, L., Yan, Q., Zhu, Y., Zhang, X., Xiao, C.: Effective shadow removal via multi-scale image decomposition. Vis. Comput. Int. J. Comput. Graph. 35(6–8), 1091–1104 (2019)

    Google Scholar 

  2. Joseph, A., Geetha, P.: Facial emotion detection using modified eyemap-mouthmap algorithm on an enhanced image and classification with tensorflow. Vis. Comput. 36(3), 529–539 (2019)

    Article  Google Scholar 

  3. Guclu, O., Can, A.B.: Integrating global and local image features for enhanced loop closure detection in RGB-D SLAM systems. Vis. Comput. 36(5), 1271–1290 (2019)

    Google Scholar 

  4. Ran, M., Zelnik-Manor, L., Tal, A.: Saliency for image manipulation. Vis. Comput. 29(5), 381–392 (2013)

    Article  Google Scholar 

  5. S. Ren, K. He, R. Girshick, and J. Sun, Faster R-CNN: Towards Real-time Object Detection with Region Proposal Networks, In: NIPS, 2015

  6. Fridrich, J., Kodovsky, J.: Rich Models for Steganalysis of Digital Images. TIFS 7(3), 868–882 (2012)

    Google Scholar 

  7. Marr, D., Hildreth, E.: Theory of edge detection. Proc. RProc. R.Soc. Lond. Ser. B Biol. Sci. 207, 187–217 (1980)

    Google Scholar 

  8. Prewitt, J.M.: Object enhancement and extraction. Pict. Process. Psychopict. 10, 15–19 (1970)

    Google Scholar 

  9. He, K.; Zhang, X.; Ren, S.; Sun, J.,Deep Residual Learning for Image Recognition, In: Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778

  10. Fridrich, Mehdi Boroumand Mo Chen Jessica: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forens. Sec. 14(5), 1181–1193 (2019)

    Article  Google Scholar 

  11. Zhuoyao Zhong, Lianwen Jin, Shuye Zhang, Ziyong Feng,DeepText: A Unified Framework for Text Proposal Generation and Text Detection in Natural Images, arXiv:1605.07314. 2016

  12. Zhou, P.; Han, X.; Morariu, V.I.; Davis, L.S.,Learning Rich Features for Image Manipulation Detection, In: Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA, 18–23 June 2018; pp. 1053–1061

  13. Wei, X., Wu, Y., Dong, F., Zhang, J., Sun, S.: Developing an image manipulation detection algorithm based on edge detection and faster R-CNN. Symmetry 11, 1223 (2019)

    Article  Google Scholar 

  14. T. Bianchi, A. De Rosa, and A. Piva, Improved DCT coefficient analysis for forgery localization in jpeg images, In: ICASSP, 2011

  15. M. Goljan and J. Fridrich,CFA-aware features for steganalysis of color images. In: SPIE/IS&T Electronic Imaging, 2015

  16. D. Cozzolino, G. Poggi, and L. Verdoliva,Splicebuster: A new blind image splicing detector. In: WIFS, 2015

  17. Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. Signal Process. Lett. 22, 1849–1853 (2015)

    Article  Google Scholar 

  18. Rota, P., Sangineto, E., Conotter, V., Pramerdorfer, C.,Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? In: Proceedings of the 2016 23rd International Conference on Pattern Recognition (ICPR), Cancn, Mexico, 4–8 December 2016; pp. 2503–2508

  19. Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13, 2691–2706 (2018)

    Article  Google Scholar 

  20. Bappy, J.H.; Roy-Chowdhury, A.K.; Bunk, J.; Nataraj, L.; Manjunath, B.S.,Exploiting Spatial Structure for Localizing Manipulated Image Regions, In: Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 22–29 October 2017; pp. 4980–4989

  21. Salloum, R., Ren, Y., Kuo, C.C.J.: Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201–209 (2018)

    Article  Google Scholar 

  22. Liao, X., Li, K.D., Zhu, X.S., Liu, K.J.R.: Robust detection of image operator chain with two-stream convolutional neural network. IEEE J. Select. Opics Sig. Process. (JSTSP) 14(5), 955–968 (2020)

    Article  Google Scholar 

  23. Peng, L.: Liao X, pp. 1–8. Resampling parameter estimation via dual-filtering based convolutional neural network, Multimedia Systems, Chen M. (2020)

    Google Scholar 

  24. T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollar, and C. L. Zitnick, Microsoft COCO: Common objects in context. In ECCV, 2014

  25. Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)

    Article  MathSciNet  Google Scholar 

  26. J. Dong, W. Wang, and T. Tan, Casia image tampering detection evaluation database 2010

  27. J. Dong, W. Wang, and T. Tan, Casia image tampering detection evaluation database. In: ChinaSIP, 2013

  28. Columbia Uncompressed Image Splicing Detection Evaluation Dataset. http://www.ee.columbia.edu/ln/dvmm/downloads/authsplcuncmp/

  29. Nist nimble 2016 datasets. https://www.nist.gov/itl/iad/mig/nimble-challenge-2017-evaluation/

  30. CASIA 1.0 Groundtruth. https://github.com/namtpham/casia1groundtruth

  31. CASIA 2.0 Groundtruth. https://github.com/namtpham/casia2groundtruth

  32. Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27, 1497–1503 (2009)

    Article  Google Scholar 

  33. Li, W., Yuan, Y., Yu, N.: Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process. 89, 1821–1829 (2009)

    Article  Google Scholar 

  34. Ferrara, P., Bianchi, T., Rosa, A.D., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7, 1566–1577 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China [Grant Numbers 61771168]. The authors would like to thank the Institute of Information Countermeasures Technology providing deep learning servers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Han.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, H., Han, Q., Li, Q. et al. Digital image manipulation detection with weak feature stream. Vis Comput 38, 2675–2689 (2022). https://doi.org/10.1007/s00371-021-02146-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-021-02146-x

Keywords

Navigation