[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

ESRNet: Efficient Search and Recognition Network for Image Manipulation Detection

Published: 04 March 2022 Publication History

Abstract

With the widespread use of smartphones and the rise of intelligent software, we can manipulate captured photos anytime and anywhere, so the fake photos finally obtained look “Real.” If these intelligent operation methods are maliciously applied to our daily life, then fake news, fake photos, rumors, slander, fraud, threats, and other information security issues around us can happen all the time. Today’s intelligent retouching software can make various modifications to photos, some of which do not change the content that the photos themselves want to express, such as retouching, contrast improvement, and so on. In this article, we mainly study the three operation modes of changing the authenticity of photo contents, which are Copy-move, Splicing, and Removal. Few scholars have done relevant research due to the lack of a corresponding dataset. To address this issue, we elaborately collect a novel dataset, called the multi-realistic scene manipulation dataset (MSM30K), which consists of 30,000 images, including three types of tampering methods, and covering 32 different tampering scenes in life. In addition, we propose a unified detection network: the efficient search and recognition network (ESRNet) for three tampering methods. It mainly includes four main modules: Efficient feature pyramid network (EFPN), Residual receptive field block with attention (RFBA), Hierarchical decoding identification (HDI), and Cascaded group-reversal attention (GRA) blocks. On these three datasets, ESRNet can reach 0.81 on the S-measure, 0.72 on the F-measure, and 0.85 on the E-measure. The inference speed is ~53 fps on a single GPU without I/O time. ESRNet outperforms various state-of-the-art manipulation detection baselines on three image manipulation datasets.

References

[1]
Sebastiano Battiato, Sabu Emmanuel, Adrian Ulges, and Marcel Worring (Eds.). 2010. In Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence. ACM.
[2]
Liangyu Chen, Xin Lu, Jie Zhang, Xiaojie Chu, and Chengpeng Chen. 2021. HINet: Half instance normalization network for image restoration. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 182–192.
[3]
Andrea Costanzo, Irene Amerini, Roberto Caldelli, and Mauro Barni. 2014. Forensic analysis of SIFT keypoint removal and injection. IEEE Trans. Inf. Forens. Secur. 9, 9 (2014), 1450–1464.
[4]
Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva. 2015. Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forens. Secur. 10, 11 (2015), 2284–2297.
[5]
Jing Dong, Wei Wang, and Tieniu Tan. 2013. CASIA image tampering detection evaluation database. In Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing. IEEE, 422–426.
[6]
Deng-Ping Fan, Ge-Peng Ji, Ming-Ming Cheng, and Ling Shao. 2021. Concealed object detection. CoRR abs/2102.10274 (2021).
[7]
Deng-Ping Fan, Ge-Peng Ji, Guolei Sun, Ming-Ming Cheng, Jianbing Shen, and Ling Shao. 2020. Camouflaged object detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. IEEE, 2774–2784.
[8]
Deng-Ping Fan, Zheng Lin, Zhao Zhang, Menglong Zhu, and Ming-Ming Cheng. 2021. Rethinking RGB-D salient object detection: Models, data sets, and large-scale benchmarks. IEEE Trans. Neural Netw. Learn. Syst. 32, 5 (2021), 2075–2089.
[9]
D. P. Fan, G. P. Ji, T. Zhou, G. Chen, H. Fu, J. Shen, and L. Shao. 2020. PraNet: Parallel reverse attention network for polyp segmentation. In Medical Image Computing and Computer Assisted Intervention – MICCAI (MICCAI’20). Lecture Notes in Computer Science, vol. 12266. Springer, Cham.
[10]
Andrew C. Gallagher and Tsuhan Chen. 2008. Image authentication by detecting traces of demosaicing. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 1–8.
[11]
Kaiming He, Georgia Gkioxari, Piotr Dollár, and Ross B. Girshick. 2017. Mask R-CNN. In Proceedings of the IEEE International Conference on Computer Vision. IEEE Computer Society, 2980–2988.
[12]
D. Y. Huang, C. N. Huang, W. C. Hu, and C. H. Chou. 2017. Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed. Tools Applic. 76, 1 (2017), 1509–1530.
[13]
Ashraful Islam, Chengjiang Long, Arslan Basharat, and Anthony Hoogs. 2020. DOA-GAN: Dual-order attentive generative adversarial network for image copy-move forgery detection and localization. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. IEEE, 4675–4684.
[14]
Pawel Korus and Jiwu Huang. 2016. Evaluation of random field models in multi-modal unsupervised tampering localization. In Proceedings of the IEEE International Workshop on Information Forensics and Security. IEEE, 1–6.
[15]
Xiang Li, Wenhai Wang, Xiaolin Hu, and Jian Yang. 2019. Selective kernel networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Computer Vision Foundation/IEEE, 510–519.
[16]
Tsung-Yi Lin, Piotr Dollár, Ross B. Girshick, Kaiming He, Bharath Hariharan, and Serge J. Belongie. 2017. Feature pyramid networks for object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 936–944.
[17]
Nian Liu, Junwei Han, and Ming-Hsuan Yang. 2018. PiCANet: Learning pixel-wise contextual attention for saliency detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 3089–3098.
[18]
Zhaojin Huang, Lichao Huang, Yongchao Gong, Chang Huang, and Xinggang Wang. 2019. Mask scoring R-CNN. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR’19).
[19]
Songtao Liu, Di Huang, and Yunhong Wang. 2018. Receptive field block net for accurate and fast object detection. In Computer Vision - ECCV 2018-15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part XI(Lecture Notes in Computer Science, Vol. 11215), Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss (Eds.). Springer, 404–419.
[20]
Yaqi Liu, Xiaobin Zhu, Xianfeng Zhao, and Yun Cao. 2019. Adversarial learning for constrained image splicing detection and localization based on atrous convolution. IEEE Trans. Inf. Forens. Secur. 14, 10 (2019), 2551–2566.
[21]
B. Mahdian and S. Saic. 2007. Detection of copy-move forgery using a method based on blur moment invariants. Forens. Sci. Int. 171, 2–3 (2007), 180–189.
[22]
Gaël Mahfoudi, Badr Tajini, Florent Retraint, Frédéric Morain-Nicolier, Jean-Luc Dugelay, and Marc Pic. 2019. DEFACTO: Image and face manipulation dataset. In Proceedings of the 27th European Signal Processing Conference. IEEE, 1–5.
[23]
T. Mahmood, T. Nawaz, A. Irtaza, R. Ashraf, M. Shah, and M. T. Mahmood. 2016. Copy-move forgery detection technique for forensic analysis in digital images. Math. Prob. Eng. 2016, pt.5 (2016), 1–13.
[24]
Adam Novozámský, Babak Mahdian, and Stanislav Saic. 2020. IMD2020: A large-scale annotated dataset tailored for detecting manipulated images. In Proceedings of the IEEE Winter Applications of Computer Vision Workshops. IEEE, 71–80.
[25]
Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-Net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015-18th International Conference Munich, Germany, October 5–9, 2015, Proceedings, Part III(Lecture Notes in Computer Science, Vol. 9351), Nassir Navab, Joachim Hornegger, William M. Wells III, and Alejandro F. Frangi (Eds.). Springer, 234–241.
[26]
Cuihua Shen, Mona Kasra, Wenjing Pan, Grace A. Bassett, Yining Malloch, and James F. O’Brien. 2019. Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online. New Media Soc. 21, 2 (2019).
[27]
Zhenjun Tang, Lv Chen, Xianquan Zhang, and Shichao Zhang. 2019. Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31, 3 (2019), 549–560.
[28]
Zhenjun Tang, Xianquan Zhang, Xianxian Li, and Shichao Zhang. 2016. Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forens. Secur. 11, 1 (2016), 200–214.
[29]
Zhenjun Tang, Xianquan Zhang, and Shichao Zhang. 2014. Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 26, 3 (2014), 711–724.
[30]
V. T. Manu and Babu M. Mehtre. 2015. Detection of copy-move forgery in images using segmentation and SURF. In Advances in Signal Processing and Intelligent Recognition Systems Proceedings of Second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’15), December 16–19, 2015, Trivandrum, India, Sabu M. Thampi, Sanghamitra Bandyopadhyay, Sri Krishnan, Kuan-Ching Li, Sergey G. Mosin, and Maode Ma (Eds.), Vol. 425. Springer, 645–654. DOI:
[31]
Shaohua Wan, Renhao Gu, Tariq Umer, Khaled Salah, and Xiaolong Xu. 2021. Toward offloading internet of vehicles applications in 5G networks. IEEE Trans. Intell. Transport. Syst. 22, 7 (2021), 4151–4159.
[32]
S. Wan, X. Li, Y. Xue, W. Lin, and X. Xu. 2019. Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks. J. Supercomput.4 (2019).
[33]
Shaohua Wan, Yu Xia, Lianyong Qi, Yee-Hong Yang, and Mohammed Atiquzzaman. 2020. Automated colorization of a grayscale image with seed points propagation. IEEE Trans. Multim. 22, 7 (2020), 1756–1768.
[34]
Yang Wei, Zhuzhu Wang, Bin Xiao, Ximeng Liu, Zheng Yan, and Jianfeng Ma. 2021. Controlling neural learning network with multiple scales for image splicing forgery detection. ACM Trans. Multim. Comput. Commun. Appl. 16, 4 (2021), 124:1–124:22.
[35]
Bihan Wen, Ye Zhu, Ramanathan Subramanian, Tian-Tsong Ng, Xuanjing Shen, and Stefan Winkler. 2016. COVERAGE—A novel database for copy-move forgery detection. In Proceedings of the IEEE International Conference on Image Processing. IEEE, 161–165.
[36]
Yue Wu, Wael Abd-Almageed, and Prem Natarajan. 2017. Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. In Proceedings of the 2017 ACM on Multimedia Conference, (MM’17), Mountain View, CA, USA, October 23-27, 2017, Qiong Liu, Rainer Lienhart, Haohong Wang, Sheng–Wei “Kuan–Ta” Chen, Susanne Boll, Yi–Ping Phoebe Chen, Gerald Friedland, Jia Li, and Shuicheng Yan (Eds.). ACM, 1480–1502. DOI:
[37]
Yue Wu, Wael Abd-Almageed, and Prem Natarajan. 2018. BusterNet: Detecting copy-move image forgery with source/target localization. In Computer Vision - ECCV 2018-15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part VI(Lecture Notes in Computer Science, Vol. 11210), Vittorio Ferrari, Martial Hebert, Cristian Sminchisescu, and Yair Weiss (Eds.). Springer, 170–186.
[38]
Y. Wu, W. Abdalmageed, and P. Natarajan. 2019. ManTra-Net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[39]
Zhe Wu, Li Su, and Qingming Huang. 2019. Stacked cross refinement network for edge-aware salient object detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, 7263–7272.
[40]
Ruikang Xu, Zeyu Xiao, Jie Huang, Yueyi Zhang, and Zhiwei Xiong. 2021. EDPN: Enhanced deep pyramid network for blurry image restoration. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 414–423.
[41]
A. N. Yates, H. Guan, Y. Lee, A. P. Delgado, D. F. Zhou, and J. G. Fiscus. [n.d.]. Nimble challenge 2017 evaluation data and tool. ([n. d.]).
[42]
Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming-Hsuan Yang, and Ling Shao. 2021. Multi-stage progressive image restoration. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 14821–14831.
[43]
M. Zampoglou, S. Papadopoulos, and Y. Kompatsiaris. 2017. Large-scale evaluation of splicing localization algorithms for web images. Multim. Tools & Applic. 76, 4 (2017), 1–34.
[44]
Ying Zhang, Jonathan Goh, Lei Lei Win, and Vrizlynn L. L. Thing. 2016. Image region forgery detection: A deep learning approach. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14–15, 2016(Cryptology and Information Security Series, Vol. 14), Aditya Mathur and Abhik Roychoudhury (Eds.). IOS Press, 1–11.
[45]
Hengshuang Zhao, Jianping Shi, Xiaojuan Qi, Xiaogang Wang, and Jiaya Jia. 2017. Pyramid scene parsing network. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 6230–6239.
[46]
Jiaxing Zhao, Jiangjiang Liu, Deng-Ping Fan, Yang Cao, Jufeng Yang, and Ming-Ming Cheng. 2019. EGNet: Edge guidance network for salient object detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, 8778–8787.
[47]
Peng Zhou, Xintong Han, Vlad I. Morariu, and Larry S. Davis. 2018. Learning rich features for image manipulation detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society, 1053–1061.

Cited By

View all
  • (2024)Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field NetworkACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367888320:10(1-23)Online publication date: 18-Jul-2024
  • (2024)DAG-YOLO: A Context-Feature Adaptive fusion Rotating Detection Network in Remote Sensing ImagesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367497820:10(1-24)Online publication date: 27-Jun-2024
  • (2024)Cascaded Adaptive Graph Representation Learning for Image Copy-Move Forgery DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3669905Online publication date: 29-May-2024
  • Show More Cited By

Index Terms

  1. ESRNet: Efficient Search and Recognition Network for Image Manipulation Detection

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 4
      November 2022
      497 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3514185
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 March 2022
      Accepted: 01 December 2021
      Revised: 01 November 2021
      Received: 01 August 2021
      Published in TOMM Volume 18, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Information security
      2. image manipulation
      3. novel dataset
      4. unified detection network

      Qualifiers

      • Research-article
      • Refereed

      Funding Sources

      • National Natural Science Foundation of China
      • Joint Funds of the National Natural Science Foundation of China

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)144
      • Downloads (Last 6 weeks)19
      Reflects downloads up to 11 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field NetworkACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367888320:10(1-23)Online publication date: 18-Jul-2024
      • (2024)DAG-YOLO: A Context-Feature Adaptive fusion Rotating Detection Network in Remote Sensing ImagesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367497820:10(1-24)Online publication date: 27-Jun-2024
      • (2024)Cascaded Adaptive Graph Representation Learning for Image Copy-Move Forgery DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3669905Online publication date: 29-May-2024
      • (2024)A Federated Convolution Transformer for Fake News DetectionIEEE Transactions on Big Data10.1109/TBDATA.2023.332574610:3(214-225)Online publication date: Jun-2024
      • (2024)Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future DirectionsAdvanced Research in Technologies, Information, Innovation and Sustainability10.1007/978-3-031-48855-9_17(220-233)Online publication date: 3-Jan-2024
      • (2023)Review of Image Forensic Techniques Based on Deep LearningMathematics10.3390/math1114313411:14(3134)Online publication date: 16-Jul-2023
      • (2023)Detection of Recolored Image by Texture Features in Chrominance ComponentsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357107619:3(1-23)Online publication date: 25-Feb-2023
      • (2023)MFI-Net: Multi-Feature Fusion Identification Networks for Artificial Intelligence ManipulationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2023.328917134:2(1266-1280)Online publication date: 26-Jun-2023

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media