Skip to main content

A Deep Learning Approach to Detection of Warping Forgery in Images

  • Conference paper
  • First Online:
Book cover Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Included in the following conference series:

  • 1161 Accesses

Abstract

In recent years, image forensics has received full attention from researchers. A large number of algorithms for image smoothing, JPEG compression, copy-move, and shear tampering were published. However, there are still many image tampering algorithms that are not involved. In this paper, we publish a dataset of image warping, which contains more than 10000 images, and propose a novel convolutional neural network called DWF-CNN to identify warped images. In experiments, we compared the performance with 4 alternative networks. The proposed network with the preprocessing layer of the SRM layer and Bayar convolutional layer got the best result, which reached to the accuracy of 99.36%. The experiments also showed that the network with the regular convolutional layer performed even worse than a random guess. It illustrates the importance of the well-designed preprocessing layer in this research area again.

Supported by Program for Young Innovative Research Team in Shandong University of Political Science and Law(Network Information Security and Forensics, Intelligent Information Processing);Big data and Artificial Intelligence Legal Research Collaborative Innovation Center of Shandong University of Political Science and Law; Key Laboratory of Evidence-Identifying in Universities of Shandong (SDUPSL); Projects of Shandong Province Higher Educational Science and Technology Program under Grant No.J16LN19, J18KA357, J18KA383; Projects of Shandong University of Political Science and Law under Grant No. 2016Z03B, 2015Z03B,2019KQ13Z.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/taiji1985/ImageWarpingDataset.

  2. 2.

    https://colab.research.google.com.

References

  1. Barni, M., et al.: Aligned and non-aligned double JPEG detection using convolutional neural networks. CoRR abs/1708.00930 (2017) http://arxiv.org/abs/1708.00930

  2. Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics. Secur. 13(11), 2691–2706 (2018)

    Article  Google Scholar 

  3. Bin, L., Shi, Y.Q., Jiwu, H.: Detecting doubly compressed JPEG images by using mode based first digit features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing. pp. 730–735 (2008). https://doi.org/10.1109/MMSP.2008.4665171

  4. Chan, K.C., Moon, Y.S., Cheng, P.S.: Fast fingerprint verification using subregions of fingerprint images. IEEE  Trans. Circ. Syst. Video Technol. 14(1), 95–101 (2004). https://doi.org/10.1109/TCSVT.2003.818358

    Article  Google Scholar 

  5. Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy–move forgery detection. IEEE Trans.  Inf. Forensics Secur. 10(11), 2284–2297 (2015). https://doi.org/10.1109/TIFS.2015.2455334

    Article  Google Scholar 

  6. Cozzolino, D., Poggi, G., Verdoliva, L.: Splicebuster: a new blind image splicing detector. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6, November 2015 https://doi.org/10.1109/WIFS.2015.7368565

  7. Dong, J., Wang, W., Tan, T.: Casia image tampering detection evaluation database, pp. 422–426, July 2013 https://doi.org/10.1109/ChinaSIP.2013.6625374

  8. Farid, H., Lyu, S.: Higher-order wavelet statistics and their application to digital forensics. In: 2003 Conference on Computer Vision and Pattern Recognition Workshop. vol. 8, pp. 94–94 (June 2003). https://doi.org/10.1109/CVPRW.2003.10093

  9. Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans  Inf. Forensics Secur. 7(3), 868–882 (2012). https://doi.org/10.1109/TIFS.2012.2190402

    Article  Google Scholar 

  10. Gustafsson, A.: Interactive image warping. https://www.gson.org/thesis/warping- thesis.pdf (1993). Accessed 19 July 2008

  11. Huh, M., Liu, A., Owens, A., Efros, A.A.: Fighting fake news: Image splice detection via learned self-consistency. CoRR abs/1805.04096 (2018). http://arxiv.org/abs/1805.04096

  12. Korus, P., Huang, J.: Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE  Trans.  Image  Process. 25(3), 1312–1326 (2016)

    Article  MathSciNet  Google Scholar 

  13. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classfication with deep convolutional neural networks. Commun. ACM 60(6), 84–90 (2017)

    Article  Google Scholar 

  14. Pevny, T., Fridrich, J.: Detection of double-compression in jpeg images for applications in steganography. IEEE Trans. Inf.  Forensics Secur. 3(2), 247–258 (2008). https://doi.org/10.1109/TIFS.2008.922456

    Article  Google Scholar 

  15. Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (Dec 2016). https://doi.org/10.1109/WIFS.2016.7823911

  16. Rhee, K.H.: Median filtering detection using variation of neighboring line pairs for image forensics. J. Electron. Imag. 25(5), 1–13 (2016)

    Article  Google Scholar 

  17. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv 1409.1556 pp. 1–7 (2014)

    Google Scholar 

  18. Taimori, A., Razzazi, F., Behrad, A., Ahmadi, A., Babaie-Zadeh, M.: Quantization-unaware double JPEG compression detection. J. Math. Imaging Vis. 54(3), 269–286 (2016). https://doi.org/10.1007/s10851-015-0602-z

    Article  MathSciNet  MATH  Google Scholar 

  19. Wen, B., Zhu, Y., Subramanian, R., Ng, T., Shen, X., Winkler, S.: Coverage—a novel database for copy-move forgery detection. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 161–165 Sep 2016

    Google Scholar 

  20. Wu, Y., Abd-Almageed, W., Natarajan, P.: Image copy-move forgery detection via an end-to-end deep neural network. In: 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1907–1915 March 2018

    Google Scholar 

  21. Wu, Y., Abd-Almageed, W., Natarajan, P.: Deep matching and validation network an end-to-end solution to constrained image splicing localization and detection. CoRR abs/1705.09765 (2017), http://arxiv.org/abs/1705.09765

  22. Wu, Y., Abd-Almageed, W., Natarajan, P.: BusterNet: detecting copy-move image forgery with source/target localization: 15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part VI, pp. 170–186 (2018)

    Google Scholar 

  23. Yang, J., Ren, H., Zhu, G., Huang, J., Shi, Y.-Q.: Detecting median filtering via two-dimensional AR models of multiple filtered residuals. Multimed. Tools. Appl. 77(7), 7931–7953 (2017). https://doi.org/10.1007/s11042-017-4691-0

    Article  Google Scholar 

  24. Yue Wu, W.A., Natarajan, P.: Mantra-net: Manipulation tracing network for detection and localization of image forgerieswith anomalous features (2019)

    Google Scholar 

  25. Zhou, P., Han, X., Morariu, V., Davis, L.: Learning rich features for image manipulation detection, pp. 1053–1061 (2018). https://doi.org/10.1109/CVPR.2018.00116

  26. Zhang, J., Li, Y., Niu, S., Cao, Z., Wang, X.: Improved fully convolutional network for digital image region forgery detection. Comput. Mater. Con. 60(1), 287–303 (2019)

    Google Scholar 

  27. Cui, Q., McIntosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Con. 055(2), 229–241 (2018)

    Google Scholar 

  28. Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-Based learning applied to document recognition. Proc. IEEE 86, 2278–2324 (1998)

    Article  Google Scholar 

  29. Fang, W., Zhang, F., Sheng, V.S., Ding, Y.: A method for improving CNN-based image recognition using DCGAN. Comput. Mater. Con. 57(1), 167–178 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tongfeng Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, T., Wu, J., Feng, G., Chang, X., Liu, L. (2020). A Deep Learning Approach to Detection of Warping Forgery in Images. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics