Affiliation:
1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
Abstract
Photo-response non-uniformity (PRNU), as a class of device fingerprint, plays a key role in the forgery detection/localization for visual media. The state-of-the-art PRNU-based forensics methods generally rely on the multi-scale trace analysis and result fusion, with Markov random field model. However, such hand-crafted strategies are difficult to provide satisfactory multi-scale decision, exhibiting a high false-positive rate. Motivated by this, we propose an end-to-end multi-scale decision fusion strategy, where a mapping from multi-scale forgery probabilities to binary decision is achieved by a supervised deep fully connected neural network. As the first time, the deep learning technology is employed in PRNU-based forensics for more flexible and reliable integration of multi-scale information. The benchmark experiments exhibit the state-of-the-art accuracy performance of our method in both pixel-level and image-level, especially for false positives. Additional robustness experiments also demonstrate the benefits of the proposed method in resisting noise and compression attacks.
Funder
Nanjing University of Aeronautics and Astronautics Graduate Research and Practice Innovation Program Project
National Natural Science Foundation of China
Guangxi Key Laboratory of Trusted Software
Basic Research Program of Jiangsu Province
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture
Reference45 articles.
1. Rainer Böhme, Matthias Kirchner, S. Katzenbeisser, and F. Petitcolas. 2016. Media forensics. In Information Hiding. Artech House, 231–259.
2. Splicing image forgery detection using textural features based on the grey level co‐occurrence matrices
3. Irene Amerini, Roberto Caldelli, Vito Cappellini, Francesco Picchioni, and Alessandro Piva. 2009. Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification. In Proceedings of the IEEE International Conference on Digital Signal Processing. 1–7.
4. A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
5. Behavior Knowledge Space-Based Fusion for Copy–Move Forgery Detection
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献