skip to main content
10.1145/3603781.3604221acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article

Noise and Edge Based Dual Branch Image Manipulation Detection

Published: 27 July 2023 Publication History

Abstract

Unlike ordinary computer vision tasks that focus more on the semantic content of images, the image manipulation detection task pays more attention to the subtle information of image manipulation. In this paper, the noise image extracted by the improved constrained convolution is used as the input of the model instead of the original image to obtain more subtle traces of manipulation. Meanwhile, the dual branch network, consisting of a high-resolution branch and a context branch, is used to capture the traces of artifacts. In general, most manipulation leaves artifacts on the manipulation region boundary. A specially designed manipulation edge detection module is constructed based on the dual branch network to identify these artifacts. We add a distance factor to the self-attention module to better describe the correlation between pixels. Experimental results on publicly available image manipulation datasets demonstrate the effectiveness of our model.

References

[1]
B. Bayar and M. C. Stamm, “Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2691–2706, 2018.
[2]
R. Salloum, Y. Ren, and C.-C. J. Kuo, “Image splicing localization using a multi-task fully convolutional network (mfcn),” Journal of Visual Communication and Image Representation, vol. 51, pp. 201–209, 2018.
[3]
P. Zhou, B.-C. Chen, X. Han, M. Najibi, A. Shrivastava, S.-N. Lim, and L. Davis, “Generate, segment, and refine: Towards generic manipulation segmentation,” in Proceedings of the AAAI conference on artificial intelligence, 2020, pp. 13 058–13 065.
[4]
X. Chen, C. Dong, J. Ji, J. Cao, and X. Li, “Image manipulation detection by multi-view multi-scale supervision,” in Proceedings of the IEEE International Conference on Computer Vision (ICCV), 2021, pp. 14 185–14 193.
[5]
X. Wang, R. Girshick, A. Gupta, and K. He, “Non-local neural networks,” in Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), 2018, pp. 7794–7803.
[6]
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 770–778.
[7]
X. Li, W. Wang, X. Hu, and J. Yang, “Selective kernel networks,” in Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), 2019, pp. 510–519.
[8]
J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, “Imagenet: A large-scale hierarchical image database,” in Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), 2009, pp. 248–255.
[9]
J. Dong, W. Wang, and T. Tan, “Casia image tampering detection evaluation database,” 2010, http://forensics.idealtest.org
[10]
J. Dong, W. Wang, and T. Tan, “Casia image tampering detection evaluation database,” in IEEE China Summit and International Conference on Signal and Information Processing, 2013, pp. 422–426.
[11]
B. Wen, Y. Zhu, R. Subramanian, T.-T. Ng, X. Shen, and S. Winkler, “Coverage—a novel database for copy-move forgery detection,” in IEEE international conference on image processing (ICIP), 2016, pp. 161–165.
[12]
J. Hsu and S. Chang, “Columbia uncompressed image splicing detection evaluation dataset,” 2006, https://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm
[13]
H. Guan, M. Kozak, E. Robertson, Y. Lee, A. N. Yates, A. Delgado, D. Zhou, T. Kheyrkhah, J. Smith, and J. Fiscus, “Mfc datasets: Large-scale benchmark datasets for media forensic challenge evaluation,” in IEEE Winter Applications of Computer Vision Workshops (WACVW), 2019, pp. 63–72.
[14]
J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 3431–3440.
[15]
H. Li and J. Huang, “Localization of deep inpainting using high-pass fully convolutional network,” in Proceedings of the IEEE International Conference on Computer Vision (ICCV), 2019, pp. 8301–8310.
[16]
P. Zhuang, H. Li, S. Tan, B. Li, and J. Huang, “Image tampering localization using a dense fully convolutional network,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2986–2.
[17]
Y. Wu, W. AbdAlmageed, and P. Natarajan, “Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019, pp. 9543–9552.
[18]
C. Yang, H. Li, F. Lin, B. Jiang, and H. Zhao, “Constrained r-cnn: A general image manipulation detection model,” in 2020 IEEE International Conference on Multimedia and Expo (ICME), 2020, pp.1–6.

Cited By

View all

Index Terms

  1. Noise and Edge Based Dual Branch Image Manipulation Detection
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CNIOT '23: Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things
      May 2023
      1025 pages
      ISBN:9798400700705
      DOI:10.1145/3603781
      Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 July 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Edge detection
      2. Image forensics
      3. Image manipulation detection
      4. Image noise extraction

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      • MoE-CMCC Artificial Intelligence Project

      Conference

      CNIOT'23

      Acceptance Rates

      Overall Acceptance Rate 39 of 82 submissions, 48%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)42
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 23 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media