ABSTRACT
In this paper, we propose a deep neural structure for detecting image copy and paste tampering, including basic copy-move types and copy-move types that overlay post-processing operations. Based on multi-scale Swin Transformer and dense upsampling convolution, we can effectively detect tampered images in small areas. By introducing multi-scale Swin Transformer feature extraction network and integrating global features and local features, the network can adapt to various shapes and sizes of tampered areas, especially in small areas. The effect of tampering is significantly improved. At the same time, the dense up-sampling convolution is used, and the multi-channel filter is used to amplify the down-sampling feature map to restore the input size. The experimental results show that on the public image tamper detection benchmark, this method has significantly improved compared with the comparison method. Compared with BusterNet2019, the accuracy rate, recall rate and value have increased by 16.74 percentage points, 16.48 percentage points and 16.68 percentage points respectively, and the effect has been improved more significantly in small area tampering.
- PAN X Y, LYU S W. Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Security,5(4):857-867(2010).Google ScholarDigital Library
- LI J,LI X L,YANG B,et al Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics and Security,10(3):507-518(2015). Google ScholarDigital Library
- AMERINI I,BALLAN L,CALDELLI R,et al A SIFTbased forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security,6(3):1099-1110(2011).Google ScholarDigital Library
- SHIVAKUMAR B L,SANTHOSH B S. Detection of region duplication forgery in digital images using SURF[J].International Journal of Computer Science Issues,8(4):199-205(2011).Google Scholar
- SILVA E, CARVALHO T, FERREIRA A,et al Going deeper into copy-move forgery detection:exploring image telltales via multi-scale analysis and voting processes[J].Journal of Visual Communication and Image Representation,29(5):16-32(2015).Google Scholar
- WANG C Y, ZHANG Z, LI Q W, An image copymove forgery detection method based on SURF and PCET[J]. IEEE Access,7:170032-170047(2019).Google ScholarCross Ref
- Shivakumar B L, Santhosh Baboo S . Detection of Region Duplication Forgery in Digital Images Using SURF[J]. International Journal of Computer ence Issues (IJCSI), 8(4):199-205(2011).Google Scholar
- Mahdian B, Saic S . [2007 Babak FSI]100+Detection of copy–move forgery using a method based on blur moment invariants, 171(2):180-189(2007).Google Scholar
- Popescu A C , Farid H . Exposing Digital Forgeries by Detecting Duplicated Image Regions[J]. Comput. dartmouth College Private Ivy League Res.univ, 646(2004).Google Scholar
- Li G , Wu Q , Dan T , A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD[C]// IEEE International Conference on Multimedia & Expo. IEEE(2007).Google Scholar
- Cozzolino D, Poggi G, Verdoliva L . Efficient Dense-Field Copy–Move Forgery Detection[J]. IEEE Transactions on Information Forensics and Security, 10(11)(2015).Google ScholarDigital Library
- Yuan R, Ni J. A deep learning approach to detection of splicing and copy-move forgeries in images[C]// 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE(2017).Google Scholar
- ROSIER D J, KLUG A. Reconstruction of three dimensional structures from electron micrographs[J].Nature,217(5124):130-134(1968).Google ScholarCross Ref
- Zhao R, Liu G, Srinath S, Improving high-level synthesis with decoupled data structure optimization[C]// ACM. ACM, 1-6(2016).Google Scholar
- Bi X, Wei Y, Xiao B, RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection[C]// 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 30-39(2019).Google Scholar
- Bunk J, Bappy J H, Mohammed T M, Detection and Localization of Image Forgeries using Resampling Features and Deep Learning[J]. IEEE, 1881-1889(2017).Google Scholar
- Islam A, Long C, Basharat A, DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-Move Forgery Detection and Localization[C]// 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 4676-4685(2020).Google Scholar
- Yue W, Abd-Almageed W, Natarajan P . Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network[C]// 2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE(2018).Google Scholar
- WU Y, ABDALMAGEED W, NATARAJAN P. BusterNet: detecting copy-move image forgery with source/target localization[C]//Proceedings of the 15th European Conference on Computer Vision. Berlin, Germany: Springer,8-14(2018).Google Scholar
- Liu Z, Lin Y, Cao Y, Swin Transformer: Hierarchical Vision Transformer using Shifted Windows[J].(2021).Google Scholar
- Wang P, Chen P, Yuan Y, Understanding Convolution for Semantic Segmentation[J]. IEEE(2018).Google ScholarCross Ref
Index Terms
- Image Tampering Detection Method Based on Swin Transformer and Dense Upsampling Convolution
Recommendations
An effective fragile watermarking scheme for color image tampering detection and self-recovery
AbstractIn this paper, a fragile watermarking scheme for color-image authentication and self-recovery is proposed. Original image is divided into non-overlapping blocks, and for each i-th block, the watermarks used for recovery and ...
Highlights- High quality of the watermarked image in comparison with other schemes was confirmed.
A watermarking-based image ownership and tampering authentication scheme
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is ...
Digital image forgery detection using passive techniques: A survey
Today manipulation of digital images has become easy due to powerful computers, advanced photo-editing software packages and high resolution capturing devices. Verifying the integrity of images and detecting traces of tampering without requiring extra ...
Comments