Skip to main content
Log in

Image forgery localization based on fully convolutional network with noise feature

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To detect the maliciously tampered region in digital images, this paper proposes an image forgery localization method based on a fully convolutional network (FCN). In the pre-processing phase of the network, noise features are used to adequately expose the subtle changes in the image caused by manipulation operations, thus enhancing the generalization ability of the network. The convolutional layer is used in a fully convolutional network instead of the fully connected layer to generate a pixel-wise prediction. In addition, the region proposal network used in object detection is added to improve the robustness. Experiments on standard datasets show that our method can accurately locate the tampered regions of images and improve generalization ability and robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Bayar B, Stamm M (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. Proceedings of the 4Th ACM workshop on information hiding and multimedia security. https://doi.org/10.1145/2909827.2930786

  2. Bayar B, Stamm M (2017) Design principles of convolutional neural networks for multimedia forensics. Electr Imaging 2017(7):77–86. https://doi.org/10.2352/issn.2470-1173.2017.7.mwsf-328

    Article  Google Scholar 

  3. Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf For Secur 7(3):1003–1017. https://doi.org/10.1109/tifs.2012.2187516

    Article  Google Scholar 

  4. Bondi L, Lameri S, Guera D, Bestagini P, Delp E, Tubaro S (2017) Tampering detection and localization through clustering of camera-based CNN features. 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). https://doi.org/10.1109/cvprw.2017.232

  5. Chen J, Liao X, Qin Z (2021) Identifying tampering operations in image operator chains based on decision fusion. Signal Process Image Commun 95:116287. https://doi.org/10.1016/j.image.2021.116287

    Article  Google Scholar 

  6. Chen B, Qi X, Wang Y, Zheng Y, Shim H, Shi Y (2018) An improved splicing localization method by fully convolutional networks. IEEE Access 6:69472–69480. https://doi.org/10.1109/access.2018.2880433

    Article  Google Scholar 

  7. Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf For Secur 7(5):1566–1577. https://doi.org/10.1109/tifs.2012.2202227

    Article  Google Scholar 

  8. Fridrich J, Kodovsky J (2012) Rich models for Steganalysis of digital images. IEEE Trans Inf For Secur 7(3):868–882. https://doi.org/10.1109/tifs.2012.2190402

    Article  Google Scholar 

  9. Gao S, Liao X, Liu X (2019) Real-time detecting one specific tampering operation in multiple operator chains. J Real-Time Image Proc 16(3):741–750. https://doi.org/10.1007/s11554-019-00860-3

    Article  Google Scholar 

  10. He K, Gkioxari G, Dollar P, Girshick R (2017) Mask R-CNN. 2017 IEEE international conference on computer vision (ICCV). https://doi.org/10.1109/iccv.2017.322

  11. He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on ImageNet classification. 2015 IEEE international conference on computer vision (ICCV). https://doi.org/10.1109/iccv.2015.123

  12. Kohli R, Gupta S (2019) A nascent approach for noise reduction via EMD thresholding. In: Hu YC, Tiwari S, Mishra K, Trivedi M (eds) Ambient communications and computer systems. Advances in intelligent systems and computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_6

  13. Krizhevsky A, Sutskever I, Hinton G (2017) ImageNet classification with deep convolutional neural networks. Commun ACM 60(6):84–90. https://doi.org/10.1145/3065386

    Article  Google Scholar 

  14. LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444. https://doi.org/10.1038/nature14539

    Article  Google Scholar 

  15. Li W, Yuan Y, Yu N (2009) Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process 89(9):1821–1829. https://doi.org/10.1016/j.sigpro.2009.03.025

    Article  MATH  Google Scholar 

  16. Liao X, Li K, Zhu X, Liu K (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955–968. https://doi.org/10.1109/jstsp.2020.3002391

    Article  Google Scholar 

  17. Lin Z, He J, Tang X, Tang C (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn 42(11):2492–2501. https://doi.org/10.1016/j.patcog.2009.03.019

    Article  MATH  Google Scholar 

  18. Lin X, Li J, Wang S, Liew A, Cheng F, Huang X (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39. https://doi.org/10.1016/j.eng.2018.02.008

    Article  Google Scholar 

  19. Liu Y, Guan Q, Zhao X, Cao Y (2018) Image forgery localization based on multi-scale convolutional neural networks. Proceedings of the 6Th ACM workshop on information hiding and multimedia security. https://doi.org/10.1145/3206004.3206010

  20. Liu B, Pun C (2018) Locating splicing forgery by fully convolutional networks and conditional random field. Signal Process Image Commun 66:103–112. https://doi.org/10.1016/j.image.2018.04.011

    Article  Google Scholar 

  21. Liu Y, Zhu X, Zhao X, Cao Y (2019) Adversarial learning for constrained image splicing detection and localization based on Atrous convolution. IEEE Trans Inf For Secur 14(10):2551–2566. https://doi.org/10.1109/tifs.2019.2902826

    Article  Google Scholar 

  22. Long J, Shelhamer E, Darrell T (2015) Fully convolutional networks for semantic segmentation. 2015 IEEE conference on computer vision and pattern recognition (CVPR). https://doi.org/10.1109/cvpr.2015.7298965

  23. Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497–1503. https://doi.org/10.1016/j.imavis.2009.02.001

    Article  Google Scholar 

  24. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. 2016 IEEE international workshop on information forensics and security (WIFS). https://doi.org/10.1109/wifs.2016.7823911

  25. Ren S, He K, Girshick R, Sun J (2017) Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans Pattern Anal Mach Intell 39(6):1137–1149. https://doi.org/10.1109/tpami.2016.2577031

    Article  Google Scholar 

  26. Salloum R, Ren Y, Jay Kuo C (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J Vis Commun Image Represent 51:201–209. https://doi.org/10.1016/j.jvcir.2018.01.010

    Article  Google Scholar 

  27. Srivastava D, Kohli R, Gupta S (2017) Implementation and statistical comparison of different edge detection techniques. In: Bhatia S, Mishra K, Tiwari S, Singh V (eds) Advances in computer and computational sciences. Advances in intelligent systems and computing, vol 553. Springer, Singapore. https://doi.org/10.1007/978-981-10-3770-2_20

  28. Wu Y, AbdAlmageed W, Natarajan P (2019) ManTra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. 2019 IEEE/CVF conference on computer vision and pattern recognition (CVPR). https://doi.org/10.1109/cvpr.2019.00977

  29. Wu Y, Abd-Almageed W, Natarajan P (2017) Deep matching and validation network. Proceedings of the 25Th ACM international conference on multimedia. https://doi.org/10.1145/3123266.3123411

  30. Yang C, Li H, Lin F, Jiang B, Zhao H (2020) Constrained R-CNN: A general image manipulation detection model. https://arxiv.org/abs/1911.08217v3

  31. Ye S, Sun Q, Chang E (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. Multimedia and expo, 2007 IEEE international conference on. https://doi.org/10.1109/icme.2007.4284574

  32. Zhang Y, Goh J, Win L, Thing V (2016) Image region forgery detection: a deep learning approach. Proceedings of the Singapore cyber-security conference (SG-CRC), 14, 1–11

  33. Zhou P, Han X, Morariu V, Davis L (2018) Learning rich features for image manipulation detection. 2018 IEEE/CVF conference on computer vision and pattern recognition. https://doi.org/10.1109/cvpr.2018.00116

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongjiao Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Q., Li, H. & Liu, Z. Image forgery localization based on fully convolutional network with noise feature. Multimed Tools Appl 81, 17919–17935 (2022). https://doi.org/10.1007/s11042-022-12758-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12758-7

Keywords

Navigation