Abstract
To detect the maliciously tampered region in digital images, this paper proposes an image forgery localization method based on a fully convolutional network (FCN). In the pre-processing phase of the network, noise features are used to adequately expose the subtle changes in the image caused by manipulation operations, thus enhancing the generalization ability of the network. The convolutional layer is used in a fully convolutional network instead of the fully connected layer to generate a pixel-wise prediction. In addition, the region proposal network used in object detection is added to improve the robustness. Experiments on standard datasets show that our method can accurately locate the tampered regions of images and improve generalization ability and robustness.
Similar content being viewed by others
References
Bayar B, Stamm M (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. Proceedings of the 4Th ACM workshop on information hiding and multimedia security. https://doi.org/10.1145/2909827.2930786
Bayar B, Stamm M (2017) Design principles of convolutional neural networks for multimedia forensics. Electr Imaging 2017(7):77–86. https://doi.org/10.2352/issn.2470-1173.2017.7.mwsf-328
Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf For Secur 7(3):1003–1017. https://doi.org/10.1109/tifs.2012.2187516
Bondi L, Lameri S, Guera D, Bestagini P, Delp E, Tubaro S (2017) Tampering detection and localization through clustering of camera-based CNN features. 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). https://doi.org/10.1109/cvprw.2017.232
Chen J, Liao X, Qin Z (2021) Identifying tampering operations in image operator chains based on decision fusion. Signal Process Image Commun 95:116287. https://doi.org/10.1016/j.image.2021.116287
Chen B, Qi X, Wang Y, Zheng Y, Shim H, Shi Y (2018) An improved splicing localization method by fully convolutional networks. IEEE Access 6:69472–69480. https://doi.org/10.1109/access.2018.2880433
Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf For Secur 7(5):1566–1577. https://doi.org/10.1109/tifs.2012.2202227
Fridrich J, Kodovsky J (2012) Rich models for Steganalysis of digital images. IEEE Trans Inf For Secur 7(3):868–882. https://doi.org/10.1109/tifs.2012.2190402
Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Proc 16(3):741–750. https://doi.org/10.1007/s11554-019-00860-3
He K, Gkioxari G, Dollar P, Girshick R (2017) Mask R-CNN. 2017 IEEE international conference on computer vision (ICCV). https://doi.org/10.1109/iccv.2017.322
He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on ImageNet classification. 2015 IEEE international conference on computer vision (ICCV). https://doi.org/10.1109/iccv.2015.123
Kohli R, Gupta S (2019) A nascent approach for noise reduction via EMD thresholding. In: Hu YC, Tiwari S, Mishra K, Trivedi M (eds) Ambient communications and computer systems. Advances in intelligent systems and computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_6
Krizhevsky A, Sutskever I, Hinton G (2017) ImageNet classification with deep convolutional neural networks. Commun ACM 60(6):84–90. https://doi.org/10.1145/3065386
LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444. https://doi.org/10.1038/nature14539
Li W, Yuan Y, Yu N (2009) Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process 89(9):1821–1829. https://doi.org/10.1016/j.sigpro.2009.03.025
Liao X, Li K, Zhu X, Liu K (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955–968. https://doi.org/10.1109/jstsp.2020.3002391
Lin Z, He J, Tang X, Tang C (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn 42(11):2492–2501. https://doi.org/10.1016/j.patcog.2009.03.019
Lin X, Li J, Wang S, Liew A, Cheng F, Huang X (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39. https://doi.org/10.1016/j.eng.2018.02.008
Liu Y, Guan Q, Zhao X, Cao Y (2018) Image forgery localization based on multi-scale convolutional neural networks. Proceedings of the 6Th ACM workshop on information hiding and multimedia security. https://doi.org/10.1145/3206004.3206010
Liu B, Pun C (2018) Locating splicing forgery by fully convolutional networks and conditional random field. Signal Process Image Commun 66:103–112. https://doi.org/10.1016/j.image.2018.04.011
Liu Y, Zhu X, Zhao X, Cao Y (2019) Adversarial learning for constrained image splicing detection and localization based on Atrous convolution. IEEE Trans Inf For Secur 14(10):2551–2566. https://doi.org/10.1109/tifs.2019.2902826
Long J, Shelhamer E, Darrell T (2015) Fully convolutional networks for semantic segmentation. 2015 IEEE conference on computer vision and pattern recognition (CVPR). https://doi.org/10.1109/cvpr.2015.7298965
Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503. https://doi.org/10.1016/j.imavis.2009.02.001
Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. 2016 IEEE international workshop on information forensics and security (WIFS). https://doi.org/10.1109/wifs.2016.7823911
Ren S, He K, Girshick R, Sun J (2017) Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans Pattern Anal Mach Intell 39(6):1137–1149. https://doi.org/10.1109/tpami.2016.2577031
Salloum R, Ren Y, Jay Kuo C (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J Vis Commun Image Represent 51:201–209. https://doi.org/10.1016/j.jvcir.2018.01.010
Srivastava D, Kohli R, Gupta S (2017) Implementation and statistical comparison of different edge detection techniques. In: Bhatia S, Mishra K, Tiwari S, Singh V (eds) Advances in computer and computational sciences. Advances in intelligent systems and computing, vol 553. Springer, Singapore. https://doi.org/10.1007/978-981-10-3770-2_20
Wu Y, AbdAlmageed W, Natarajan P (2019) ManTra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. 2019 IEEE/CVF conference on computer vision and pattern recognition (CVPR). https://doi.org/10.1109/cvpr.2019.00977
Wu Y, Abd-Almageed W, Natarajan P (2017) Deep matching and validation network. Proceedings of the 25Th ACM international conference on multimedia. https://doi.org/10.1145/3123266.3123411
Yang C, Li H, Lin F, Jiang B, Zhao H (2020) Constrained R-CNN: A general image manipulation detection model. https://arxiv.org/abs/1911.08217v3
Ye S, Sun Q, Chang E (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. Multimedia and expo, 2007 IEEE international conference on. https://doi.org/10.1109/icme.2007.4284574
Zhang Y, Goh J, Win L, Thing V (2016) Image region forgery detection: a deep learning approach. Proceedings of the Singapore cyber-security conference (SG-CRC), 14, 1–11
Zhou P, Han X, Morariu V, Davis L (2018) Learning rich features for image manipulation detection. 2018 IEEE/CVF conference on computer vision and pattern recognition. https://doi.org/10.1109/cvpr.2018.00116
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, Q., Li, H. & Liu, Z. Image forgery localization based on fully convolutional network with noise feature. Multimed Tools Appl 81, 17919–17935 (2022). https://doi.org/10.1007/s11042-022-12758-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12758-7