Affiliation:
1. School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan, China
2. Hubei Key Laboratory of Intelligent Robot, Wuhan Institute of Technology, Wuhan, China
Abstract
Recently, with the emergence of many image editing tools (photoshop, Topaz studio, etc.), the authenticity of images has been severely challenged. However, the performance of some existing traditional feature extraction methods and detection methods based on convolutional neural network (CNN) is poor, and the information provided by the features extracted from the network is limited and single. In this paper, an end-to-end ringed residual U-Net is proposed to detect image splicing forgery by blending features of non-natural regions. Some regions with significant differences from the image background are defined as non-natural regions(such as the irregular border at the splicing of images). In this paper, a feature enhancement module for non-natural regions is constructed, which the image through the pooling of four different scales, and these features are then combined with the original image and input to the backbone network for processing, aiming to highlight regions of the image that differ significantly from the background. Therefore, after adding the feature enhancement module for non-natural regions to the end-to-end ring residual U-Net, more attention will be paid to the tampering regions in the feature extraction stage, image manipulation detection and localization will also become more accurate. Compared with some mainstream methods, this method achieves better performance on the three standard datasets(CASIA2.0, NIST2016, COLUMBIA). In addition, it has excellent robustness under JPEG compression attack and noise corruption attack.
Reference16 articles.
1. Blind authentication using periodic properties of interpolation;Mahdian;IEEE Transactions on Information Forensics & Security,2008
2. Forensic detection of image manipulation using statistical intrinsic fingerprints;Stamm;IEEE Transactions on Information Forensics & Security,2010
3. Camera response functions for image forensics: An automatic algorithm for splicing detection;Hsu;IEEE Transactions on Information Forensics and Security,2010
4. Image forgery localization via fine-grained analysis of cfa artifacts;Ferrara;IEEE Transactions on Information Forensics & Security,2012
5. Image forgery localization via integrating tampering possibility maps;Li;IEEE Transactions on Information Forensics and Security,2017