ABSTRACT
When creating a forgery, a forger can modify an image using many different image editing operations. Since a forensic examiner must test for each of these, significant interest has arisen in the development of universal forensic algorithms capable of detecting many different image editing operations and manipulations. In this paper, we propose a universal forensic approach to performing manipulation detection using deep learning. Specifically, we propose a new convolutional network architecture capable of automatically learning manipulation detection features directly from training data. In their current form, convolutional neural networks will learn features that capture an image's content as opposed to manipulation detection features. To overcome this issue, we develop a new form of convolutional layer that is specifically designed to suppress an image's content and adaptively learn manipulation detection features. Through a series of experiments, we demonstrate that our proposed approach can automatically learn how to detect multiple image manipulations without relying on pre-selected features or any preprocessing. The results of these experiments show that our proposed approach can automatically detect several different manipulations with an average accuracy of 99.10%.
- C. Chen and M. C. Stamm. Camera model identification framework using an ensemble of demosaicing features. In Information Forensics and Security (WIFS), 2015 IEEE International Workshop on, pages 1--6. IEEE, 2015.Google ScholarCross Ref
- J. Chen, X. Kang, Y. Liu, and Z. J. Wang. Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters, 22(11):1849--1853, Nov. 2015.Google ScholarCross Ref
- W. Fan, K. Wang, and F. Cayre. General-purpose image forensics using patch likelihood under image statistical models. In IEEE International Workshop on Information Forensics and Security (WIFS), pages 1--6, Nov. 2015.Google ScholarCross Ref
- J. Fridrich and J. Kodovskỳ. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3):868--882, 2012. Google ScholarDigital Library
- G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and R. R. Salakhutdinov. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580, 2012.Google Scholar
- Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093, 2014.Google Scholar
- X. Kang, M. C. Stamm, A. Peng, and K. J. R. Liu. Robust median filtering forensics using an autoregressive model. IEEE Transactions on Information Forensics and Security, 8(9):1456--1468, Sept. 2013. Google ScholarDigital Library
- M. Kirchner. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In Proceedings of the 10th ACM Workshop on Multimedia and Security, MM&Sec '08, pages 11--20, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- M. Kirchner and J. Fridrich. On detection of median filtering in digital images. In IS&T/SPIE Electronic Imaging, pages 754110--754110. International Society for Optics and Photonics, 2010.Google Scholar
- A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097--1105, 2012.Google ScholarDigital Library
- B. B. Le Cun, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, and L. D. Jackel. Handwritten digit recognition with a back-propagation network. In Advances in neural information processing systems. Citeseer, 1990. Google ScholarDigital Library
- Y. LeCun and Y. Bengio. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, 3361(10):1995, 1995. Google ScholarDigital Library
- Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, and L. D. Jackel. Backpropagation applied to handwritten zip code recognition. Neural computation, 1(4):541--551, 1989. Google ScholarDigital Library
- Y. A. LeCun, L. Bottou, G. B. Orr, and K.-R. Müller. Efficient backprop. In Neural networks: Tricks of the trade, pages 9--48. Springer, 2012. Google Scholar
- V. Nair and G. E. Hinton. Rectified linear units improve restricted boltzmann machines. In International Conference on Machine Learning, pages 807--814, 2010.Google Scholar
- T. Pevny, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix.IEEE Transactions on Information Forensics and Security, 5(2):215--224, June 2010. Google ScholarDigital Library
- A. C. Popescu and H. Farid. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing, 53(2):758--767, Feb. 2005. Google ScholarDigital Library
- X. Qiu, H. Li, W. Luo, and J. Huang. A universal image forensic strategy based on steganalytic model. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pages 165--170. ACM, 2014. Google ScholarDigital Library
- M. C. Stamm and K. J. R. Liu. Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. on Information Forensics and Security, 5(3):492--506, 2010. Google ScholarDigital Library
- M. C. Stamm, M. Wu, and K. J. R. Liu. Information forensics: An overview of the first decade. IEEE Access, 1:167--200, 2013.Google ScholarCross Ref
- C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1--9, 2015.Google ScholarCross Ref
Index Terms
- A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
Recommendations
Detection of Image Manipulations Using Siamese Convolutional Neural Networks
Pattern Recognition and Machine IntelligenceAbstractThe processing history of an image can reveal the application of different types of image editing/manipulation operations applied to images and also can expose forgeries. This paper proposes a novel deep learning-based manipulation detection ...
Copy-Move Forgery Detection Using DyWT
In this paper, we proposed a passive method for copy-move region duplication detection using dyadic wavelet transform DyWT. DyWT is better than discrete wavelet transform DWT for data analysis as it is shift invariant. Initially we decompose the input ...
Improved Manipulation Detection with Convolutional Neural Network for JPEG Images
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityJPEG images are ubiquitously used in most real-world online and mobile applications, where uncompressed images are not available from the very beginning when digital images are generated by digital camera or smartphone. In this paper, an improved ...
Comments