Abstract
With the rapid development of deep neural network, two-stream Faster R-CNN network has been applied to tampering detection field and achieved good detection results. However, the noise stream generation of the two-stream Faster R-CNN needs to be manually selected, and the feature extraction network is the same as RGB stream, so it doesn’t maximize the program to play the advantages of deep neural network. In this paper, the hand-crafted features of the Faster R-CNN noise stream generation layer are cancelled and the two-layer convolution network is used to directly fit the weak features generated by image tampering. At the same time, according to the characteristics of image tampering detection, a weak feature extraction network based on multi-scale residual network is established to extract weak feature signals of image tampering. The network can suppress the natural features of the image and preserve the weak feature signals. In the network, the multi-level residual layers are used to extract RoI features, which makes full use of the feature layer informations with higher resolution. The experimental results show that the performance of the Faster R-CNN network with weak feature stream has been improved significantly in F1 score and localization of the tampering region.








Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Zhang, L., Yan, Q., Zhu, Y., Zhang, X., Xiao, C.: Effective shadow removal via multi-scale image decomposition. Vis. Comput. Int. J. Comput. Graph. 35(6–8), 1091–1104 (2019)
Joseph, A., Geetha, P.: Facial emotion detection using modified eyemap-mouthmap algorithm on an enhanced image and classification with tensorflow. Vis. Comput. 36(3), 529–539 (2019)
Guclu, O., Can, A.B.: Integrating global and local image features for enhanced loop closure detection in RGB-D SLAM systems. Vis. Comput. 36(5), 1271–1290 (2019)
Ran, M., Zelnik-Manor, L., Tal, A.: Saliency for image manipulation. Vis. Comput. 29(5), 381–392 (2013)
S. Ren, K. He, R. Girshick, and J. Sun, Faster R-CNN: Towards Real-time Object Detection with Region Proposal Networks, In: NIPS, 2015
Fridrich, J., Kodovsky, J.: Rich Models for Steganalysis of Digital Images. TIFS 7(3), 868–882 (2012)
Marr, D., Hildreth, E.: Theory of edge detection. Proc. RProc. R.Soc. Lond. Ser. B Biol. Sci. 207, 187–217 (1980)
Prewitt, J.M.: Object enhancement and extraction. Pict. Process. Psychopict. 10, 15–19 (1970)
He, K.; Zhang, X.; Ren, S.; Sun, J.,Deep Residual Learning for Image Recognition, In: Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778
Fridrich, Mehdi Boroumand Mo Chen Jessica: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forens. Sec. 14(5), 1181–1193 (2019)
Zhuoyao Zhong, Lianwen Jin, Shuye Zhang, Ziyong Feng,DeepText: A Unified Framework for Text Proposal Generation and Text Detection in Natural Images, arXiv:1605.07314. 2016
Zhou, P.; Han, X.; Morariu, V.I.; Davis, L.S.,Learning Rich Features for Image Manipulation Detection, In: Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA, 18–23 June 2018; pp. 1053–1061
Wei, X., Wu, Y., Dong, F., Zhang, J., Sun, S.: Developing an image manipulation detection algorithm based on edge detection and faster R-CNN. Symmetry 11, 1223 (2019)
T. Bianchi, A. De Rosa, and A. Piva, Improved DCT coefficient analysis for forgery localization in jpeg images, In: ICASSP, 2011
M. Goljan and J. Fridrich,CFA-aware features for steganalysis of color images. In: SPIE/IS&T Electronic Imaging, 2015
D. Cozzolino, G. Poggi, and L. Verdoliva,Splicebuster: A new blind image splicing detector. In: WIFS, 2015
Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. Signal Process. Lett. 22, 1849–1853 (2015)
Rota, P., Sangineto, E., Conotter, V., Pramerdorfer, C.,Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? In: Proceedings of the 2016 23rd International Conference on Pattern Recognition (ICPR), Cancn, Mexico, 4–8 December 2016; pp. 2503–2508
Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 13, 2691–2706 (2018)
Bappy, J.H.; Roy-Chowdhury, A.K.; Bunk, J.; Nataraj, L.; Manjunath, B.S.,Exploiting Spatial Structure for Localizing Manipulated Image Regions, In: Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 22–29 October 2017; pp. 4980–4989
Salloum, R., Ren, Y., Kuo, C.C.J.: Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201–209 (2018)
Liao, X., Li, K.D., Zhu, X.S., Liu, K.J.R.: Robust detection of image operator chain with two-stream convolutional neural network. IEEE J. Select. Opics Sig. Process. (JSTSP) 14(5), 955–968 (2020)
Peng, L.: Liao X, pp. 1–8. Resampling parameter estimation via dual-filtering based convolutional neural network, Multimedia Systems, Chen M. (2020)
T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollar, and C. L. Zitnick, Microsoft COCO: Common objects in context. In ECCV, 2014
Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)
J. Dong, W. Wang, and T. Tan, Casia image tampering detection evaluation database 2010
J. Dong, W. Wang, and T. Tan, Casia image tampering detection evaluation database. In: ChinaSIP, 2013
Columbia Uncompressed Image Splicing Detection Evaluation Dataset. http://www.ee.columbia.edu/ln/dvmm/downloads/authsplcuncmp/
Nist nimble 2016 datasets. https://www.nist.gov/itl/iad/mig/nimble-challenge-2017-evaluation/
CASIA 1.0 Groundtruth. https://github.com/namtpham/casia1groundtruth
CASIA 2.0 Groundtruth. https://github.com/namtpham/casia2groundtruth
Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27, 1497–1503 (2009)
Li, W., Yuan, Y., Yu, N.: Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process. 89, 1821–1829 (2009)
Ferrara, P., Bianchi, T., Rosa, A.D., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7, 1566–1577 (2012)
Acknowledgements
This work was supported by the National Natural Science Foundation of China [Grant Numbers 61771168]. The authors would like to thank the Institute of Information Countermeasures Technology providing deep learning servers.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, H., Han, Q., Li, Q. et al. Digital image manipulation detection with weak feature stream. Vis Comput 38, 2675–2689 (2022). https://doi.org/10.1007/s00371-021-02146-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00371-021-02146-x