Abstract
In recent years, image forensics has received full attention from researchers. A large number of algorithms for image smoothing, JPEG compression, copy-move, and shear tampering were published. However, there are still many image tampering algorithms that are not involved. In this paper, we publish a dataset of image warping, which contains more than 10000 images, and propose a novel convolutional neural network called DWF-CNN to identify warped images. In experiments, we compared the performance with 4 alternative networks. The proposed network with the preprocessing layer of the SRM layer and Bayar convolutional layer got the best result, which reached to the accuracy of 99.36%. The experiments also showed that the network with the regular convolutional layer performed even worse than a random guess. It illustrates the importance of the well-designed preprocessing layer in this research area again.
Supported by Program for Young Innovative Research Team in Shandong University of Political Science and Law(Network Information Security and Forensics, Intelligent Information Processing);Big data and Artificial Intelligence Legal Research Collaborative Innovation Center of Shandong University of Political Science and Law; Key Laboratory of Evidence-Identifying in Universities of Shandong (SDUPSL); Projects of Shandong Province Higher Educational Science and Technology Program under Grant No.J16LN19, J18KA357, J18KA383; Projects of Shandong University of Political Science and Law under Grant No. 2016Z03B, 2015Z03B,2019KQ13Z.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Barni, M., et al.: Aligned and non-aligned double JPEG detection using convolutional neural networks. CoRR abs/1708.00930 (2017) http://arxiv.org/abs/1708.00930
Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics. Secur. 13(11), 2691–2706 (2018)
Bin, L., Shi, Y.Q., Jiwu, H.: Detecting doubly compressed JPEG images by using mode based first digit features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing. pp. 730–735 (2008). https://doi.org/10.1109/MMSP.2008.4665171
Chan, K.C., Moon, Y.S., Cheng, P.S.: Fast fingerprint verification using subregions of fingerprint images. IEEE Trans. Circ. Syst. Video Technol. 14(1), 95–101 (2004). https://doi.org/10.1109/TCSVT.2003.818358
Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy–move forgery detection. IEEE Trans. Inf. Forensics Secur. 10(11), 2284–2297 (2015). https://doi.org/10.1109/TIFS.2015.2455334
Cozzolino, D., Poggi, G., Verdoliva, L.: Splicebuster: a new blind image splicing detector. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6, November 2015 https://doi.org/10.1109/WIFS.2015.7368565
Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database, pp. 422–426, July 2013 https://doi.org/10.1109/ChinaSIP.2013.6625374
Farid, H., Lyu, S.: Higher-order wavelet statistics and their application to digital forensics. In: 2003 Conference on Computer Vision and Pattern Recognition Workshop. vol. 8, pp. 94–94 (June 2003). https://doi.org/10.1109/CVPRW.2003.10093
Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans Inf. Forensics Secur. 7(3), 868–882 (2012). https://doi.org/10.1109/TIFS.2012.2190402
Gustafsson, A.: Interactive image warping. https://www.gson.org/thesis/warping- thesis.pdf (1993). Accessed 19 July 2008
Huh, M., Liu, A., Owens, A., Efros, A.A.: Fighting fake news: Image splice detection via learned self-consistency. CoRR abs/1805.04096 (2018). http://arxiv.org/abs/1805.04096
Korus, P., Huang, J.: Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans. Image Process. 25(3), 1312–1326 (2016)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classfication with deep convolutional neural networks. Commun. ACM 60(6), 84–90 (2017)
Pevny, T., Fridrich, J.: Detection of double-compression in jpeg images for applications in steganography. IEEE Trans. Inf. Forensics Secur. 3(2), 247–258 (2008). https://doi.org/10.1109/TIFS.2008.922456
Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (Dec 2016). https://doi.org/10.1109/WIFS.2016.7823911
Rhee, K.H.: Median filtering detection using variation of neighboring line pairs for image forensics. J. Electron. Imag. 25(5), 1–13 (2016)
Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv 1409.1556 pp. 1–7 (2014)
Taimori, A., Razzazi, F., Behrad, A., Ahmadi, A., Babaie-Zadeh, M.: Quantization-unaware double JPEG compression detection. J. Math. Imaging Vis. 54(3), 269–286 (2016). https://doi.org/10.1007/s10851-015-0602-z
Wen, B., Zhu, Y., Subramanian, R., Ng, T., Shen, X., Winkler, S.: Coverage—a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 161–165 Sep 2016
Wu, Y., Abd-Almageed, W., Natarajan, P.: Image copy-move forgery detection via an end-to-end deep neural network. In: 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1907–1915 March 2018
Wu, Y., Abd-Almageed, W., Natarajan, P.: Deep matching and validation network an end-to-end solution to constrained image splicing localization and detection. CoRR abs/1705.09765 (2017), http://arxiv.org/abs/1705.09765
Wu, Y., Abd-Almageed, W., Natarajan, P.: BusterNet: detecting copy-move image forgery with source/target localization: 15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part VI, pp. 170–186 (2018)
Yang, J., Ren, H., Zhu, G., Huang, J., Shi, Y.-Q.: Detecting median filtering via two-dimensional AR models of multiple filtered residuals. Multimed. Tools. Appl. 77(7), 7931–7953 (2017). https://doi.org/10.1007/s11042-017-4691-0
Yue Wu, W.A., Natarajan, P.: Mantra-net: Manipulation tracing network for detection and localization of image forgerieswith anomalous features (2019)
Zhou, P., Han, X., Morariu, V., Davis, L.: Learning rich features for image manipulation detection, pp. 1053–1061 (2018). https://doi.org/10.1109/CVPR.2018.00116
Zhang, J., Li, Y., Niu, S., Cao, Z., Wang, X.: Improved fully convolutional network for digital image region forgery detection. Comput. Mater. Con. 60(1), 287–303 (2019)
Cui, Q., McIntosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Con. 055(2), 229–241 (2018)
Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-Based learning applied to document recognition. Proc. IEEE 86, 2278–2324 (1998)
Fang, W., Zhang, F., Sheng, V.S., Ding, Y.: A method for improving CNN-based image recognition using DCGAN. Comput. Mater. Con. 57(1), 167–178 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, T., Wu, J., Feng, G., Chang, X., Liu, L. (2020). A Deep Learning Approach to Detection of Warping Forgery in Images. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-57881-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57880-0
Online ISBN: 978-3-030-57881-7
eBook Packages: Computer ScienceComputer Science (R0)