Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3082031.3083247acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection

Published: 20 June 2017 Publication History

Abstract

Local descriptors based on the image noise residual have proven extremely effective for a number of forensic applications, like forgery detection and localization. Nonetheless, motivated by promising results in computer vision, the focus of the research community is now shifting on deep learning. In this paper we show that a class of residual-based descriptors can be actually regarded as a simple constrained convolutional neural network (CNN). Then, by relaxing the constraints, and fine-tuning the net on a relatively small training set, we obtain a significant performance improvement with respect to the conventional detector.

References

[1]
R. Arandjelovic, P. Gronat, A. Torii, T. Pajdla, and J. Sivic. 2016. NetVLAD: CNN architecture for weakly supervised place recognition. In IEEE International Conference on Computer Vision. 5297--5307.
[2]
B. Bayar and M.C. Stamm. 2016. A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer. In ACM Workshop on Information Hiding and Multimedia Security. 5--10.
[3]
Y. Bengio, A. Courville, and P. Vincent. 2013. Representation Learning: A Review and New Perspectives. IEEE Transactions on Pattern Analysis and Machine Intelligence 35, 8 (2013), 1798--1828.
[4]
M. Boroumand and J. Fridrich. 2017. Scalable Processing History Detector for JPEG Images. In IS&T Electronic Imaging - Media Watermarking, Security, and Forensics.
[5]
H. Cao and A.C. Kot. 2012. Manipulation Detection on Image Patches Using FusionBoost. IEEE Transactions on Information Forensics and Security 7, 3 (june 2012), 992--1002.
[6]
D. Cozzolino, D. Gragnaniello, and L. Verdoliva. 2014. Image forgery detection through residual-based local descriptors and block-matching. In IEEE International Conference on Image Processing. 5297--5301.
[7]
D. Cozzolino, D. Gragnaniello, and L. Verdoliva. 2014. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques. In IEEE International Conference on Image Processing. 5302--5306.
[8]
D. Cozzolino, G. Poggi, and L. Verdoliva. 2015. Splicebuster: a new blind image splicing detector. In IEEE International Workshop on Information Forensics and Security. 1--6.
[9]
D. Cozzolino and L. Verdoliva. 2016. Single-image splicing localization through autoencoder-based anomaly detection. In IEEEWorkshop on Information Forensics and Security. 1--6.
[10]
W. Fan, K. Wang, and F. Cayre. 2015. General-purpose image forensics using patch likelihood under image statistical models. In IEEE International Workshop on Information Forensics and Security. 1--6.
[11]
J. Fridrich and J. Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7, 3 (june 2012), 868--882.
[12]
R. M. Gray and D. L. Neuhoff. 1998. Qantization. IEEE Transactions on Information Theory 44, 6 (1998), 2325--2383.
[13]
F. Huang, J. Huang, and Y.Q. Shi. 2010. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security 5, 4 (dec 2010), 848--856.
[14]
D.P. Kingma and J. Ba. 2015. Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR).
[15]
M. Kirchner. 2008. Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue. In Proceedings of the Multimedia and Security Workshop. 11--20.
[16]
M. Kirchner and J. Fridrich. 2010. On Detection of Median Filtering in Digital Images. In SPIE, Electronic Imaging, Media Forensics and Security XII. 101--112.
[17]
A. Krizhevsky, I. Sutskever, and G. E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Conference on Neural Information Processing Systems. 1097--1105.
[18]
Z. Lan, S. Yu, M. Lin, B. Raj, and A.G. Hauptmann. 2015. Local handcrafted features are convolutional neural networks. arXiv preprint arXiv:1511.05045 (2015).
[19]
Y. LeCun, Y. Bengio, and G. Hinton. 2015. Deep Learning. Nature 521 (2015), 436--444.
[20]
H. Li, W. Luo, X. Qiu, and J. Huang. 2016. Identification of Various Image Operations Using Residual-based Features. IEEE Transactions on Circuits and Systems for Video Technology, in press (2016).
[21]
T. Pevny, P. Bas, and J. Fridrich. 2010. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5, 2 (2010), 215--224.
[22]
A.C. Popescu and H. Farid. 2005. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53, 2 (2005), 758--757.
[23]
Y. Qian, J. Dong, W. Wang, and T. Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In IS&T/SPIE Electronic Imaging. 94090J--94090J.
[24]
A. Richard and J. Gall. 2017. A bag-of-words equivalent recurrent neural network for action recognition. Computer Vision and Image Understanding (2017), 79--91.
[25]
M.C. Stamm and K.J. Ray Liu. 2010. Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints. IEEE Transactions on Information Forensics and Security 5, 3 (september 2010), 492--506.
[26]
L. Verdoliva, D. Cozzolino, and G. Poggi. 2014. A feature-based approach for image tampering detection and localization. In IEEE Workshop on Information Forensics and Security. 149--154.
[27]
M.D. Zeiler and R. Fergus. 2014. Visualizing and Understanding Convolutional Networks. In European Conference on Computer Vision, Vol. 8689. 818--833.

Cited By

View all
  • (2024)Survey of Intelligent Face Forgery and DetectionJournal of Engineering Studies10.3724/SP.J.1224.2020.0053812:06(538-555)Online publication date: 3-Jan-2024
  • (2024)Large-scale datasets for facial tampering detection with inpainting techniquesJournal of Image and Graphics10.11834/jig.23042229:7(1834-1848)Online publication date: 2024
  • (2024)Face forgery detection with image patch comparison and residual map estimationJournal of Image and Graphics10.11834/jig.23014929:2(457-467)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IH&MMSec '17: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security
      June 2017
      180 pages
      ISBN:9781450350617
      DOI:10.1145/3082031
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 June 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. bag-of-words
      2. cnn
      3. image forgery detection.
      4. local descriptors

      Qualifiers

      • Short-paper

      Funding Sources

      • Defense Advanced Re search Projects Agency

      Conference

      IH&MMSec '17
      Sponsor:
      IH&MMSec '17: ACM Information Hiding and Multimedia Security Workshop
      June 20 - 22, 2017
      Pennsylvania, Philadelphia, USA

      Acceptance Rates

      IH&MMSec '17 Paper Acceptance Rate 18 of 34 submissions, 53%;
      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)44
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 16 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Survey of Intelligent Face Forgery and DetectionJournal of Engineering Studies10.3724/SP.J.1224.2020.0053812:06(538-555)Online publication date: 3-Jan-2024
      • (2024)Large-scale datasets for facial tampering detection with inpainting techniquesJournal of Image and Graphics10.11834/jig.23042229:7(1834-1848)Online publication date: 2024
      • (2024)Face forgery detection with image patch comparison and residual map estimationJournal of Image and Graphics10.11834/jig.23014929:2(457-467)Online publication date: 2024
      • (2024)Face Reconstruction-Based Generalized Deepfake Detection Model with Residual Outlook AttentionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3686162Online publication date: 2-Aug-2024
      • (2024)Domain-invariant and Patch-discriminative Feature Learning for General Deepfake DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3657297Online publication date: 27-Apr-2024
      • (2024)SmartHash: Perceptual Hashing for Image Tampering Detection and AuthenticationProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679827(1983-1993)Online publication date: 21-Oct-2024
      • (2024)Local frequency analysis for diffusion-generated image detectionInternational Conference on Image Processing and Artificial Intelligence (ICIPAl 2024)10.1117/12.3035198(55)Online publication date: 19-Jul-2024
      • (2024)Deepfake Detection Models Based on Machine Learning Technologies2024 IEEE Open Conference of Electrical, Electronic and Information Sciences (eStream)10.1109/eStream61684.2024.10542582(1-6)Online publication date: 25-Apr-2024
      • (2024)Detection of Deepfake Videos Using Long-Distance AttentionIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.323306335:7(9366-9379)Online publication date: Jul-2024
      • (2024)GLFF: Global and Local Feature Fusion for AI-Synthesized Image DetectionIEEE Transactions on Multimedia10.1109/TMM.2023.331350326(4073-4085)Online publication date: 1-Jan-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media