Abstract
With the development of a variety of image editing tools, performing digital image forgery and concealing the forgery edge is easier. On the other hand, these visually convincing tampering operations also make authentication of digital images difficult. Therefore, developing a precise and robust method to detect these splicing images is urgently required. In the past, some researchers proposed some methods, which achieves an accuracy of over 97%, but robustness of these methods remains unknown. In this paper, a novel image forgery detection method based on a special blocking strategy is proposed, in which the processing unit for each block is a rich model convolutional neural network (rCNN). The proposed method is not only able to detect the splicing image but also reserves its effectiveness under circumstances of JPG compression. Extensive experiments with CASIA v1.0, CASIO v2.0 and Columbia image forgery evaluation databases were carried out, which demonstrates the effectiveness and strong robustness of the proposed method.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Jing, W., Hongbin, Z.: Exposing digital forgeries by detecting traces of image splicing. In: 2006 8th International Conference on Signal Processing, vol. 2. IEEE (2006)
He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45(12), 4292–4299 (2012)
Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of the 9th Workshop on Multimedia & Security. ACM (2007)
Pan, X., Zhang, X., Lyu, S.: Exposing image splicing with inconsistent local noise variances. In: 2012 IEEE International Conference on Computational Photography (ICCP). IEEE (2012)
Muhammad, G., et al.: Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25(4), 985–995 (2015)
Dong, J., Wang, W.: CASIA tampered image detection evaluation (TIDE) database, v1.0 and v2.0. (2011). http://forensics.idealtest.org/
Lee, H., Ekanadham, C., Ng, A.Y.: Sparse deep belief net model for visual area V2. In: Advances in Neural Information Processing Systems 20 (NIPS) (2008)
Larochelle, H., et al.: Exploring strategies for training deep neural networks. J. Mach. Learn. Res. 10(10), 1–40 (2009)
LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)
Giacinto, G., Roli, F.: Design of effective neural network ensembles for image classification purposes. Image Vis. Comput. 19(9), 699–707 (2001)
Hinton, G., et al.: Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process. Mag. 29(6), 82–97 (2012)
Ji, S., et al.: 3D convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221–231 (2013)
Collobert, R., Weston, J.: A unified architecture for natural language processing: deep neural networks with multitask learning. In: Proceedings of the 25th International Conference on Machine Learning. ACM (2008)
Fukushima, K., Miyake, S., Ito, T.: Neocognitron: a neural network model for a mechanism of visual pattern recognition. IEEE Trans. Syst. Man Cybern. 5, 826–834 (1983)
LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)
Srivastava, N., et al.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)
Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)
LeCun, Y.: LeNet-5, convolutional neural networks (2015). http://yann.lecun.com/exdb/lenet
Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)
Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE (2016)
Gonzalez, R.C., Woods, R.E.: Image Processing. Digital Image Processing, vol. 2 (2007)
Columbia, D.: Research Lab: Columbia Image Splicing Detection Evaluation Dataset (2012). http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/dlform.html
Jia, Y., et al.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM International Conference on Multimedia ACM (2014)
Kovesi, P.D.: MATLAB and Octave functions for computer vision and image processing (2000). http://www.csse.uwa.edu.au/~pk/Research/MatlabFns/#match
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhou, J., Ni, J., Rao, Y. (2017). Block-Based Convolutional Neural Network for Image Forgery Detection. In: Kraetzer, C., Shi, YQ., Dittmann, J., Kim, H. (eds) Digital Forensics and Watermarking. IWDW 2017. Lecture Notes in Computer Science(), vol 10431. Springer, Cham. https://doi.org/10.1007/978-3-319-64185-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-64185-0_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64184-3
Online ISBN: 978-3-319-64185-0
eBook Packages: Computer ScienceComputer Science (R0)