skip to main content
10.1145/2909827.2930786acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer

Published:20 June 2016Publication History

ABSTRACT

When creating a forgery, a forger can modify an image using many different image editing operations. Since a forensic examiner must test for each of these, significant interest has arisen in the development of universal forensic algorithms capable of detecting many different image editing operations and manipulations. In this paper, we propose a universal forensic approach to performing manipulation detection using deep learning. Specifically, we propose a new convolutional network architecture capable of automatically learning manipulation detection features directly from training data. In their current form, convolutional neural networks will learn features that capture an image's content as opposed to manipulation detection features. To overcome this issue, we develop a new form of convolutional layer that is specifically designed to suppress an image's content and adaptively learn manipulation detection features. Through a series of experiments, we demonstrate that our proposed approach can automatically learn how to detect multiple image manipulations without relying on pre-selected features or any preprocessing. The results of these experiments show that our proposed approach can automatically detect several different manipulations with an average accuracy of 99.10%.

References

  1. C. Chen and M. C. Stamm. Camera model identification framework using an ensemble of demosaicing features. In Information Forensics and Security (WIFS), 2015 IEEE International Workshop on, pages 1--6. IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. Chen, X. Kang, Y. Liu, and Z. J. Wang. Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters, 22(11):1849--1853, Nov. 2015.Google ScholarGoogle ScholarCross RefCross Ref
  3. W. Fan, K. Wang, and F. Cayre. General-purpose image forensics using patch likelihood under image statistical models. In IEEE International Workshop on Information Forensics and Security (WIFS), pages 1--6, Nov. 2015.Google ScholarGoogle ScholarCross RefCross Ref
  4. J. Fridrich and J. Kodovskỳ. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3):868--882, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, and R. R. Salakhutdinov. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580, 2012.Google ScholarGoogle Scholar
  6. Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093, 2014.Google ScholarGoogle Scholar
  7. X. Kang, M. C. Stamm, A. Peng, and K. J. R. Liu. Robust median filtering forensics using an autoregressive model. IEEE Transactions on Information Forensics and Security, 8(9):1456--1468, Sept. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Kirchner. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In Proceedings of the 10th ACM Workshop on Multimedia and Security, MM&Sec '08, pages 11--20, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Kirchner and J. Fridrich. On detection of median filtering in digital images. In IS&T/SPIE Electronic Imaging, pages 754110--754110. International Society for Optics and Photonics, 2010.Google ScholarGoogle Scholar
  10. A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097--1105, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. B. Le Cun, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, and L. D. Jackel. Handwritten digit recognition with a back-propagation network. In Advances in neural information processing systems. Citeseer, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y. LeCun and Y. Bengio. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, 3361(10):1995, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, and L. D. Jackel. Backpropagation applied to handwritten zip code recognition. Neural computation, 1(4):541--551, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Y. A. LeCun, L. Bottou, G. B. Orr, and K.-R. Müller. Efficient backprop. In Neural networks: Tricks of the trade, pages 9--48. Springer, 2012. Google ScholarGoogle Scholar
  15. V. Nair and G. E. Hinton. Rectified linear units improve restricted boltzmann machines. In International Conference on Machine Learning, pages 807--814, 2010.Google ScholarGoogle Scholar
  16. T. Pevny, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix.IEEE Transactions on Information Forensics and Security, 5(2):215--224, June 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. C. Popescu and H. Farid. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing, 53(2):758--767, Feb. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. Qiu, H. Li, W. Luo, and J. Huang. A universal image forensic strategy based on steganalytic model. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pages 165--170. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. C. Stamm and K. J. R. Liu. Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans. on Information Forensics and Security, 5(3):492--506, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. C. Stamm, M. Wu, and K. J. R. Liu. Information forensics: An overview of the first decade. IEEE Access, 1:167--200, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  21. C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1--9, 2015.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
      June 2016
      200 pages
      ISBN:9781450342902
      DOI:10.1145/2909827

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 June 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      IH&MMSec '16 Paper Acceptance Rate21of61submissions,34%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader