skip to main content
10.1145/3604078.3604109acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdipConference Proceedingsconference-collections
research-article

Image Tampering Detection Method Based on Swin Transformer and Dense Upsampling Convolution

Published:26 October 2023Publication History

ABSTRACT

In this paper, we propose a deep neural structure for detecting image copy and paste tampering, including basic copy-move types and copy-move types that overlay post-processing operations. Based on multi-scale Swin Transformer and dense upsampling convolution, we can effectively detect tampered images in small areas. By introducing multi-scale Swin Transformer feature extraction network and integrating global features and local features, the network can adapt to various shapes and sizes of tampered areas, especially in small areas. The effect of tampering is significantly improved. At the same time, the dense up-sampling convolution is used, and the multi-channel filter is used to amplify the down-sampling feature map to restore the input size. The experimental results show that on the public image tamper detection benchmark, this method has significantly improved compared with the comparison method. Compared with BusterNet2019, the accuracy rate, recall rate and value have increased by 16.74 percentage points, 16.48 percentage points and 16.68 percentage points respectively, and the effect has been improved more significantly in small area tampering.

References

  1. PAN X Y, LYU S W. Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Security,5(4):857-867(2010).Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. LI J,LI X L,YANG B,et al Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics and Security,10(3):507-518(2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. AMERINI I,BALLAN L,CALDELLI R,et al A SIFTbased forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security,6(3):1099-1110(2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. SHIVAKUMAR B L,SANTHOSH B S. Detection of region duplication forgery in digital images using SURF[J].International Journal of Computer Science Issues,8(4):199-205(2011).Google ScholarGoogle Scholar
  5. SILVA E, CARVALHO T, FERREIRA A,et al Going deeper into copy-move forgery detection:exploring image telltales via multi-scale analysis and voting processes[J].Journal of Visual Communication and Image Representation,29(5):16-32(2015).Google ScholarGoogle Scholar
  6. WANG C Y, ZHANG Z, LI Q W, An image copymove forgery detection method based on SURF and PCET[J]. IEEE Access,7:170032-170047(2019).Google ScholarGoogle ScholarCross RefCross Ref
  7. Shivakumar B L, Santhosh Baboo S . Detection of Region Duplication Forgery in Digital Images Using SURF[J]. International Journal of Computer ence Issues (IJCSI), 8(4):199-205(2011).Google ScholarGoogle Scholar
  8. Mahdian B, Saic S . [2007 Babak FSI]100+Detection of copy–move forgery using a method based on blur moment invariants, 171(2):180-189(2007).Google ScholarGoogle Scholar
  9. Popescu A C , Farid H . Exposing Digital Forgeries by Detecting Duplicated Image Regions[J]. Comput. dartmouth College Private Ivy League Res.univ, 646(2004).Google ScholarGoogle Scholar
  10. Li G , Wu Q , Dan T , A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD[C]// IEEE International Conference on Multimedia & Expo. IEEE(2007).Google ScholarGoogle Scholar
  11. Cozzolino D, Poggi G, Verdoliva L . Efficient Dense-Field Copy–Move Forgery Detection[J]. IEEE Transactions on Information Forensics and Security, 10(11)(2015).Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yuan R, Ni J. A deep learning approach to detection of splicing and copy-move forgeries in images[C]// 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE(2017).Google ScholarGoogle Scholar
  13. ROSIER D J, KLUG A. Reconstruction of three dimensional structures from electron micrographs[J].Nature,217(5124):130-134(1968).Google ScholarGoogle ScholarCross RefCross Ref
  14. Zhao R, Liu G, Srinath S, Improving high-level synthesis with decoupled data structure optimization[C]// ACM. ACM, 1-6(2016).Google ScholarGoogle Scholar
  15. Bi X, Wei Y, Xiao B, RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection[C]// 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 30-39(2019).Google ScholarGoogle Scholar
  16. Bunk J, Bappy J H, Mohammed T M, Detection and Localization of Image Forgeries using Resampling Features and Deep Learning[J]. IEEE, 1881-1889(2017).Google ScholarGoogle Scholar
  17. Islam A, Long C, Basharat A, DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-Move Forgery Detection and Localization[C]// 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 4676-4685(2020).Google ScholarGoogle Scholar
  18. Yue W, Abd-Almageed W, Natarajan P . Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network[C]// 2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE(2018).Google ScholarGoogle Scholar
  19. WU Y, ABDALMAGEED W, NATARAJAN P. BusterNet: detecting copy-move image forgery with source/target localization[C]//Proceedings of the 15th European Conference on Computer Vision. Berlin, Germany: Springer,8-14(2018).Google ScholarGoogle Scholar
  20. Liu Z, Lin Y, Cao Y, Swin Transformer: Hierarchical Vision Transformer using Shifted Windows[J].(2021).Google ScholarGoogle Scholar
  21. Wang P, Chen P, Yuan Y, Understanding Convolution for Semantic Segmentation[J]. IEEE(2018).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Image Tampering Detection Method Based on Swin Transformer and Dense Upsampling Convolution

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICDIP '23: Proceedings of the 15th International Conference on Digital Image Processing
      May 2023
      711 pages
      ISBN:9798400708237
      DOI:10.1145/3604078

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)20
      • Downloads (Last 6 weeks)6

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format