Skip to main content

Advertisement

Log in

DCU-Net: a dual-channel U-shaped network for image splicing forgery detection

  • S.I. : Machine Learning Applications for Security
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The detection and location of image splicing forgery are a challenging task in the field of image forensics. It is to study whether an image contains a suspicious tampered area pasted from another image. In this paper, we propose a new image tamper location method based on dual-channel U-Net, that is, DCU-Net. The detection framework based on DCU-Net is mainly divided into three parts: encoder, feature fusion, and decoder. Firstly, high-pass filters are used to extract the residual of the tampered image and generate the residual image, which contains the edge information of the tampered area. Secondly, a dual-channel encoding network model is constructed. The input of the model is the original tampered image and the tampered residual image. Then, the deep features extracted from the dual-channel encoding network are fused for the first time, and then the tampered features with different granularity are extracted by dilation convolution, and then, the secondary fusion is carried out. Finally, the fused feature map is input into the decoder, and the predicted image is decoded layer by layer. The experimental results on Casia2.0 and Columbia datasets show that DCU-Net performs better than the latest algorithm and can accurately locate tampered areas. In addition, the attack experiments show that DCU-Net model has good robustness and can resist noise and JPEG recompression attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Zampoglou M, Papadopoulos S, Kompatsiaris Y (2017) Large-scale evaluation of splicing localization algorithms for web images. Multimedia Tools Appl 76(4):4801–4834

    Article  Google Scholar 

  2. Joseph RM, Chithra AS (2015) Literature survey on image manipulation detection. Int Res J Eng Technol (IRJET) 2(04):2395–0056

    Google Scholar 

  3. Cozzolino D, Poggi G, Verdoliva L (2015) Efficient dense-field copy-move forgery detection. IEEE Trans Inf Forensics Secur 10(11):2284–2297

    Article  Google Scholar 

  4. Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: detecting copy-move image forgery with source/target localization. In: Proceedings of the European conference on computer vision (ECCV). pp 168–184

  5. Wu Y, Abd-Almageed W, Natarajan P (2017) Deep matching and validation network: an end-to-end solution to constrained image splicing localization and detection. In: Proceedings of the 25th ACM international conference on multimedia. pp 1480–1502

  6. Huh M, Liu A, Owens A, Efros AA (2018) Fighting fake news: Image splice detection via learned self-consistency. In: Proceedings of the European conference on computer vision (ECCV). pp 101–117

  7. Zhu X, Qian Y, Zhao X, Sun B, Sun Y (2018) A deep learning approach to patch-based image inpainting forensics. Signal Process Image Commun 67:90–99

    Article  Google Scholar 

  8. Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 1053–1061

  9. Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid lstm and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300

    Article  MathSciNet  MATH  Google Scholar 

  10. Zeng H, Zhan Y, Kang X, Lin X (2017) Image splicing localization using pca-based noise level estimation. Multimed Tools Appl 76(4):4783–4799

    Article  Google Scholar 

  11. Benrhouma O, Hermassi H, El-Latif Ahmed AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718

    Article  Google Scholar 

  12. Yao H, Wang S, Zhang X, Qin C, Wang J (2017) Detecting image splicing based on noise level inconsistency. Multimed Tools Appl 76(10):12457–12479

    Article  Google Scholar 

  13. Liu B, Pun CM (2017) Multi-object splicing forgery detection using noise level difference. In: 2017 IEEE conference on dependable and secure computing. IEEE, pp 533–534

  14. Zhu N, Li Z (2018) Blind image splicing detection via noise level function. Signal Process Image Commun 68:181–192

    Article  Google Scholar 

  15. Zhang Y, Zhao C, Pi Y, Li S (2012) Revealing image splicing forgery using local binary patterns of dct coefficients. In: Communications, signal processing, and systems. Springer, New York, pp 181–189

  16. Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using dct and local binary pattern. Signal Image Video Process 11(1):81–88

    Article  Google Scholar 

  17. Zhang Q, Wei L, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458

    Article  Google Scholar 

  18. Han Jong G, Park Tae H, Moon YH, Eom Il K (2018) Quantization-based markov feature extraction method for image splicing detection. Mach Vis Appl 29(3):543–552

    Article  Google Scholar 

  19. Zhao X, Li J, Li S, Wang S (2010) Detecting digital image splicing in chroma spaces. In: International workshop on digital watermarking. Springer, pp 12–22

  20. Chen B, Qi X, Sun X, Shi YQ (2017) Quaternion pseudo-zernike moments combining both of rgb information and depth information for color image splicing detection. J Vis Commun Image Represent 49:283–290

    Article  Google Scholar 

  21. Liu Q, Cooper Peter A, Chen L, Cho H, Chen Z, Qiao M, Yuting S, Wei M, Sung AH (2013) Detection of jpeg double compression and identification of smartphone image source and post-capture manipulation. Appl Intell 39(4):705–726

    Article  Google Scholar 

  22. Mire Archana V, Dhok Sanjay B, Mistry Narendra J, Porey Prakash D (2018) Automated approach for splicing detection using first digit probability distribution features. EURASIP J Image Video Process 2018(1):1–11

    Google Scholar 

  23. Amerini I, Becarelli R, Caldelli R, Mastio AD (2014) Splicing forgeries localization through the use of first digit features. In: 2014 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 143–148

  24. Iakovidou C, Zampoglou M, Papadopoulos S, Kompatsiaris Y (2018) Content-aware detection of jpeg grid inconsistencies for intuitive image forensics. J Vis Commun Image Represent 54:155–170

    Article  Google Scholar 

  25. Zhao Y, Wang S, Zhang X, Yao H (2012) Robust hashing for image authentication using zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63

    Article  Google Scholar 

  26. Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491–2504

    Article  MathSciNet  MATH  Google Scholar 

  27. Wang W, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. In: 2009 16th IEEE international conference on image processing (ICIP). IEEE, pp 1257–1260

  28. Ye S, Sun Q, Chang EC (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 12–15

  29. Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans Inf Forensics Secur 10(7):1336–1349

    Article  Google Scholar 

  30. Vasan D, Alazab M, Wassan S, Naeem H, Safaei B, Zheng Q (2020) Imcfn: image-based malware classification using fine-tuned convolutional neural network architecture. Comput Netw 171:107138

    Article  Google Scholar 

  31. Gadekallu TR, Rajput DS, Reddy MPK, Lakshmanna K, Bhattacharya S, Singh S, Jolfaei A, Alazab M (2020) A novel pca–whale optimization-based deep neural network model for classification of tomato plant diseases using gpu. J Real-Time Image Process. pp 1–14

  32. Li W, Ding W, Sadasivam Ra, Cui X, Chen P (2019) His-gan: a histogram-based gan model to improve data generation quality. Neural Netw 119:31–45

    Article  Google Scholar 

  33. Li W, Linchuan X, Liang Z, Wang S, Cao J, Lam TC, Cui X (2021) Jdgan: enhancing generator on extremely limited data via joint distribution. Neurocomputing 431:148–162

    Article  Google Scholar 

  34. Bhattacharya S, Maddikunta PKR, Pham QV, Gadekallu TR, Chowdhary CL, Alazab M, Piran MJ et al (2020) Deep learning and medical image processing for coronavirus (covid-19) pandemic: a survey. Sustain Cities Soc 65:102589

    Google Scholar 

  35. Sedik A, Hammad M, El-Samie FEA, Gupta BB, El-Latif AAA (2021) Efficient deep learning approach for augmented detection of coronavirus disease. Neural Comput Appl 1–18

  36. Alghamdi A, Hammad M, Ugail H, Abdel-Raheem A, Muhammad K, Khalifa HS, El-Latif AAA (2020) Detection of myocardial infarction based on novel deep transfer learning methods for urban healthcare in smart cities. Multimed Tools Applications. pp 1–22

  37. Hammad M, Iliyasu AM Subasi A, Ho Edmond SL, El-Latif Ahmed AA (2020) A multitier deep learning model for arrhythmia detection. IEEE Trans Instrum Meas 70:1–9

    Article  Google Scholar 

  38. Li W, Liu X, Liu J, Chen P, Wan S, Cui X (2019) On improving the accuracy with auto-encoder on conjunctivitis. Appl Soft Comput 81:105489

    Article  Google Scholar 

  39. Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 9543–9552

  40. Horváth J, Montserrat DM, Hao H, Delp EJ (2020) Manipulation detection in satellite images using deep belief networks. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops. pp 664–665

  41. Shan W, Yi Y, Qiu J, Yin A (2019) Robust median filtering forensics using image deblocking and filtered residual fusion. IEEE Access 7:17174–17183

    Article  Google Scholar 

  42. Bappy Jawadul H, Roy-Chowdhury AK, Bunk J, Nataraj L, Manjunath BS (2017) Exploiting spatial structure for localizing manipulated image regions. In: Proceedings of the IEEE international conference on computer vision. pp 4970–4979

  43. Yang C, Li H, Lin F, Jiang B, Zhao H (2020) Constrained r-cnn: a general image manipulation detection model. In: 2020 IEEE International conference on multimedia and expo (ICME). IEEE, pp 1–6

  44. Xiao B, Wei Y, Bi X, Li W, Ma J (2020) Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf Sci 511:172–191

    Article  MathSciNet  Google Scholar 

  45. Cun X, Pun CM (2018) Image splicing localization via semi-global network and fully connected conditional random fields. In: Proceedings of the European conference on computer vision (ECCV)

  46. Bi X, Wei Y, Xiao B, Li W (2019) Rru-net: the ringed residual u-net for image splicing forgery detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops

  47. Zhang R, Ni J (2020) A dense u-net with cross-layer intersection for detection and localization of image forgery. In: ICASSP 2020-2020 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2982–2986

  48. El Biach FZ, Iala I, Laanaya H, Minaoui K (2021) Encoder-decoder based convolutional neural networks for image forgery detection. Multimed Tools Appl 1–18

  49. Rao Y, Ni J, Xie H (2021) Multi-semantic crf-based attention model for image forgery detection and localization. Signal Process 108051

  50. Bi X, Liu Y, Xiao B, Li W, Pun CM, Wang G, Gao X (2020) D-unet: a dual-encoder u-net for image splicing forgery detection and localization. arXiv preprint arXiv:2012.01821

  51. Wu Y, AbdAlmageed W, Natarajan P (2019) ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR)

  52. Krähenbühl P, Koltun V (2011) Efficient inference in fully connected crfs with gaussian edge potentials. In: Advances in neural information processing systems. pp 109–117

  53. Cozzolino D, Verdoliva L (2017) Single-image splicing localization through autoencoder-based anomaly detection. In: 2016 IEEE International workshop on information forensics and security (WIFS)

  54. Verdoliva L, Cozzolino D, Poggi G (2015) A feature-based approach for image tampering detection and localization. In: IEEE workshop on information forensics and security

  55. Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted interventio. Springer, New York, pp 234–241

  56. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556

  57. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 770–778

  58. Chen LC, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2017) Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans. Pattern Anal Mach Intell 40(4), 834–848

    Google Scholar 

  59. Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, pp 422–426

  60. Hsu YF, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE international conference on multimedia and expo. IEEE, pp 549–552

  61. Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of jpeg artifacts. IEEE Trans Inf Forensics Secur 7(3):1003–1017

    Article  Google Scholar 

  62. Dirik AE, Memon N (2009) Image tamper detection based on demosaicing artifacts. In: 2009 16th IEEE international conference on image processing (ICIP). IEEE, pp 1497–1500

  63. Long J, Shelhamer E, Darrell T (2015) Fully convolutional networks for semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 3431–3440

Download references

Acknowledgements

This work has been supported by National Key Research and Development Program of China. The numerical calculations in this paper have been done on the supercomputing system in the Supercomputing Center of Wuhan University

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaohui Cui.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, H., Chen, L., Tao, Q. et al. DCU-Net: a dual-channel U-shaped network for image splicing forgery detection. Neural Comput & Applic 35, 5015–5031 (2023). https://doi.org/10.1007/s00521-021-06329-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-06329-4

Keywords