skip to main content
10.1145/3503161.3547749acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

JPEG Compression-aware Image Forgery Localization

Authors Info & Claims
Published:10 October 2022Publication History

ABSTRACT

Image forgery localization, which aims to find suspicious regions tampered with splicing, copy-move or removal manipulations, has attracted increasing attention. Existing image forgery localization methods have made great progress on public datasets. However, these methods suffer a severe performance drop when the forged images are JPEG compressed, which is widely applied in social media transmission. To tackle this issue, we propose a wavelet-based compression representation learning scheme for the specific JPEG-resistant image forgery localization. Specifically, to improve the performance against JPEG compression, we first learn the abstract representations to distinguish various compression levels through wavelet integrated contrastive learning strategy. Then, based on the learned representations, we introduce a JPEG compression-aware image forgery localization network to flexibly handle forged images compressed with various JPEG quality factors. Moreover, a boundary correction branch is designed to alleviate the edge artifacts caused by JPEG compression. Extensive experiments demonstrate the superiority of our method to existing state-of-the-art approaches, not only on standard datasets, but also on the JPEG forged images with multiple compression quality factors.

Skip Supplemental Material Section

Supplemental Material

MM22-fp0023.mp4

mp4

93.2 MB

References

  1. Edoardo Ardizzone, Alessandro Bruno, and Giuseppe Mazzola. 2010. Copy-move forgery detection via texture description. In Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence. 59--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Belhassen Bayar and Matthew C Stamm. 2018. Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection. IEEE Transactions on Information Forensics and Security, Vol. 13, 11 (2018), 2691--2706.Google ScholarGoogle ScholarCross RefCross Ref
  3. Shenhao Cao, Qin Zou, Xiuqing Mao, Dengpan Ye, and Zhongyuan Wang. 2021. Metric Learning for Anti-Compression Facial Forgery Detection. In Proceedings of the 29th ACM International Conference on Multimedia. 1929--1937.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597--1607.Google ScholarGoogle Scholar
  5. Xinru Chen, Chengbo Dong, Jiaqi Ji, Juan Cao, and Xirong Li. 2021. Image Manipulation Detection by Multi-View Multi-Scale Supervision. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 14185--14193.Google ScholarGoogle ScholarCross RefCross Ref
  6. Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, and Elli Angelopoulou. 2012. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on information forensics and security, Vol. 7, 6 (2012), 1841--1854.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Davide Cozzolino, Diego Gragnaniello, and Luisa Verdoliva. 2014a. Image forgery detection through residual-based local descriptors and block-matching. In 2014 IEEE international conference on image processing (ICIP). IEEE, 5297--5301.Google ScholarGoogle ScholarCross RefCross Ref
  8. Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva. 2014b. Copy-move forgery detection based on patchmatch. In 2014 IEEE international conference on image processing (ICIP). IEEE, 5312--5316.Google ScholarGoogle ScholarCross RefCross Ref
  9. Davide Cozzolino and Luisa Verdoliva. 2019. Noiseprint: a CNN-based camera model fingerprint. IEEE Transactions on Information Forensics and Security, Vol. 15 (2019), 144--159.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jing Dong, Wei Wang, and Tieniu Tan. 2013. Casia image tampering detection evaluation database. In 2013 IEEE China Summit and International Conference on Signal and Information Processing. IEEE, 422--426.Google ScholarGoogle ScholarCross RefCross Ref
  11. Max Ehrlich, Larry Davis, Ser-Nam Lim, and Abhinav Shrivastava. 2021. Analyzing and Mitigating JPEG Compression Defects in Deep Learning. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 2357--2367.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jessica Fridrich and Jan Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, Vol. 7, 3 (2012), 868--882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jun Fu, Jing Liu, Haijie Tian, Yong Li, Yongjun Bao, Zhiwei Fang, and Hanqing Lu. 2019. Dual attention network for scene segmentation. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 3146--3154.Google ScholarGoogle ScholarCross RefCross Ref
  14. Xueyang Fu, Menglu Wang, Xiangyong Cao, Xinghao Ding, and Zheng-Jun Zha. 2021a. A model-driven deep unfolding method for jpeg artifacts removal. IEEE Transactions on Neural Networks and Learning Systems (2021).Google ScholarGoogle ScholarCross RefCross Ref
  15. Xueyang Fu, Xi Wang, Aiping Liu, Junwei Han, and Zheng-Jun Zha. 2021b. Learning dual priors for jpeg compression artifacts removal. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 4086--4095.Google ScholarGoogle ScholarCross RefCross Ref
  16. Haiying Guan, Mark Kozak, Eric Robertson, Yooyoung Lee, Amy N Yates, Andrew Delgado, Daniel Zhou, Timothee Kheyrkhah, Jeff Smith, and Jonathan Fiscus. 2019. MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation. In 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW). IEEE, 63--72.Google ScholarGoogle ScholarCross RefCross Ref
  17. Jing Hao, Zhixin Zhang, Shicai Yang, Di Xie, and Shiliang Pu. 2021. TransForensics: Image Forgery Localization with Dense Self-Attention. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 15055--15064.Google ScholarGoogle ScholarCross RefCross Ref
  18. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.Google ScholarGoogle ScholarCross RefCross Ref
  19. J Hsu and SF Chang. 2006. Columbia uncompressed image splicing detection evaluation dataset. Columbia DVMM Research Lab (2006).Google ScholarGoogle Scholar
  20. Jie Huang, Xueyang Fu, Zeyu Xiao, Feng Zhao, and Zhiwei Xiong. 2022a. Low-Light Stereo Image Enhancement. IEEE Transactions on Multimedia (2022).Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jie Huang, Yajing Liu, Xueyang Fu, Man Zhou, Yang Wang, Feng Zhao, and Zhiwei Xiong. 2022b. Exposure Normalization and Compensation for Multiple-Exposure Correction. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 6043--6052.Google ScholarGoogle ScholarCross RefCross Ref
  22. Jie Huang, Zhiwei Xiong, Xueyang Fu, Dong Liu, and Zheng-Jun Zha. 2019. Hybrid image enhancement with progressive Laplacian enhancing unit. In Proceedings of the 27th ACM International Conference on Multimedia. 1614--1622.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. Computer science (2014).Google ScholarGoogle Scholar
  24. Haodong Li and Jiwu Huang. 2019. Localization of deep inpainting using high-pass fully convolutional network. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 8301--8310.Google ScholarGoogle ScholarCross RefCross Ref
  25. Haodong Li, Weiqi Luo, Xiaoqing Qiu, and Jiwu Huang. 2017. Image forgery localization via integrating tampering possibility maps. IEEE Transactions on Information Forensics and Security, Vol. 12, 5 (2017), 1240--1252.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Siwei Lyu, Xunyu Pan, and Xing Zhang. 2014. Exposing region splicing forgeries with blind local noise estimation. IJCV, Vol. 110, 2 (2014), 202--221.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Xunyu Pan and Siwei Lyu. 2010. Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, Vol. 5, 4 (2010), 857--867.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Xunyu Pan, Xing Zhang, and Siwei Lyu. 2012. Exposing image splicing with inconsistent local noise variances. In 2012 IEEE International Conference on Computational Photography (ICCP). IEEE, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  29. Zhihong Pan, Baopu Li, Dongliang He, Mingde Yao, Wenhao Wu, Tianwei Lin, Xin Li, and Errui Ding. 2022. Towards Bidirectional Arbitrary Image Rescaling: Joint Optimization and Cycle Idempotence. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 17389--17398.Google ScholarGoogle ScholarCross RefCross Ref
  30. Yuan Rao and Jiangqun Ni. 2021. Self-Supervised Domain Adaptation for Forgery Localization of JPEG Compressed Images. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 15034--15043.Google ScholarGoogle ScholarCross RefCross Ref
  31. Yuan Rao, Jiangqun Ni, and Huimin Zhao. 2020. Deep learning local descriptor for image splicing detection and localization. IEEE Access, Vol. 8 (2020), 25611--25625.Google ScholarGoogle ScholarCross RefCross Ref
  32. Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems, Vol. 28 (2015), 91--99.Google ScholarGoogle Scholar
  33. Seung-Jin Ryu, Matthias Kirchner, Min-Jeong Lee, and Heung-Kyu Lee. 2013. Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Transactions on Information Forensics and Security, Vol. 8, 8 (2013), 1355--1370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Ronald Salloum, Yuzhuo Ren, and C-C Jay Kuo. 2018. Image splicing localization using a multi-task fully convolutional network (MFCN). Journal of Visual Communication and Image Representation, Vol. 51 (2018), 201--209.Google ScholarGoogle ScholarCross RefCross Ref
  35. Luisa Verdoliva, Davide Cozzolino, and Giovanni Poggi. 2014. A feature-based approach for image tampering detection and localization. In 2014 IEEE international workshop on information forensics and security (WIFS). IEEE, 149--154.Google ScholarGoogle ScholarCross RefCross Ref
  36. Longguang Wang, Yingqian Wang, Xiaoyu Dong, Qingyu Xu, Jungang Yang, Wei An, and Yulan Guo. 2021b. Unsupervised Degradation Representation Learning for Blind Super-Resolution. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 10581--10590.Google ScholarGoogle ScholarCross RefCross Ref
  37. Menglu Wang, Xueyang Fu, Zepei Sun, and Zheng-Jun Zha. 2021a. JPEG artifacts removal via compression quality ranker-guided networks. In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 566--572.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Zhendong Wang, Xiaodong Cun, Jianmin Bao, Wengang Zhou, Jianzhuang Liu, and Houqiang Li. 2022. Uformer: A general u-shaped transformer for image restoration. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 17683--17693.Google ScholarGoogle ScholarCross RefCross Ref
  39. Bihan Wen, Ye Zhu, Ramanathan Subramanian, Tian-Tsong Ng, Xuanjing Shen, and Stefan Winkler. 2016. COVERAGE-A novel database for copy-move forgery detection. In 2016 IEEE international conference on image processing (ICIP). IEEE, 161--165.Google ScholarGoogle ScholarCross RefCross Ref
  40. Yue Wu, Wael Abd-Almageed, and Prem Natarajan. 2017. Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. In Proceedings of the 25th ACM international conference on Multimedia. 1480--1502.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Yue Wu, Wael AbdAlmageed, and Premkumar Natarajan. 2019. Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 9543--9552.Google ScholarGoogle ScholarCross RefCross Ref
  42. Ruikang Xu, Mingde Yao, Chang Chen, Lizhi Wang, and Zhiwei Xiong. 2021. Continuous Spectral Reconstruction from RGB Images via Implicit Neural Representation. arXiv preprint arXiv:2112.13003 (2021).Google ScholarGoogle Scholar
  43. Yanwu Xu, Shaoan Xie, Wenhao Wu, Kun Zhang, Mingming Gong, and Kayhan Batmanghelich. 2022. Maximum Spatial Perturbation Consistency for Unpaired Image-to-Image Translation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 18311--18320.Google ScholarGoogle ScholarCross RefCross Ref
  44. Mingde Yao, Zhiwei Xiong, Lizhi Wang, Dong Liu, and Xuejin Chen. 2019. Spectral-depth imaging with deep learning based reconstruction. Optics express, Vol. 27, 26 (2019), 38312--38325.Google ScholarGoogle Scholar
  45. Changqian Yu, Jingbo Wang, Chao Peng, Changxin Gao, Gang Yu, and Nong Sang. 2018. Learning a discriminative feature network for semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition. 1857--1866.Google ScholarGoogle ScholarCross RefCross Ref
  46. Yingchen Yu, Fangneng Zhan, Shijian Lu, Jianxiong Pan, Feiying Ma, Xuansong Xie, and Chunyan Miao. 2021. WaveFill: A Wavelet-based Generation Network for Image Inpainting. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 14114--14123.Google ScholarGoogle ScholarCross RefCross Ref
  47. Hai-Dong Yuan. 2011. Blind forensics of median filtering in digital images. IEEE Transactions on Information Forensics and Security, Vol. 6, 4 (2011), 1335--1345.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Xudong Zhao, Shilin Wang, Shenghong Li, and Jianhua Li. 2014. Passive image-splicing detection by a 2-D noncausal Markov model. IEEE Transactions on Circuits and Systems for Video Technology, Vol. 25, 2 (2014), 185--199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, and Quanqiao Yuan. 2013. Image splicing detection based on noncausal Markov model. In 2013 IEEE International Conference on Image Processing. IEEE, 4462--4466.Google ScholarGoogle ScholarCross RefCross Ref
  50. Peng Zhou, Bor-Chun Chen, Xintong Han, Mahyar Najibi, Abhinav Shrivastava, Ser-Nam Lim, and Larry Davis. 2020. Generate, segment, and refine: Towards generic manipulation segmentation. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34. 13058--13065.Google ScholarGoogle ScholarCross RefCross Ref
  51. Peng Zhou, Xintong Han, Vlad I Morariu, and Larry S Davis. 2018. Learning rich features for image manipulation detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1053--1061.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. JPEG Compression-aware Image Forgery Localization

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM '22: Proceedings of the 30th ACM International Conference on Multimedia
        October 2022
        7537 pages
        ISBN:9781450392037
        DOI:10.1145/3503161

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 10 October 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate995of4,171submissions,24%

        Upcoming Conference

        MM '24
        MM '24: The 32nd ACM International Conference on Multimedia
        October 28 - November 1, 2024
        Melbourne , VIC , Australia
      • Article Metrics

        • Downloads (Last 12 months)137
        • Downloads (Last 6 weeks)13

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader