Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
167 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A New Benchmark and Model for Challenging Image Manipulation Detection (2311.14218v2)

Published 23 Nov 2023 in cs.CV

Abstract: The ability to detect manipulation in multimedia data is vital in digital forensics. Existing Image Manipulation Detection (IMD) methods are mainly based on detecting anomalous features arisen from image editing or double compression artifacts. All existing IMD techniques encounter challenges when it comes to detecting small tampered regions from a large image. Moreover, compression-based IMD approaches face difficulties in cases of double compression of identical quality factors. To investigate the State-of-The-Art (SoTA) IMD methods in those challenging conditions, we introduce a new Challenging Image Manipulation Detection (CIMD) benchmark dataset, which consists of two subsets, for evaluating editing-based and compression-based IMD methods, respectively. The dataset images were manually taken and tampered with high-quality annotations. In addition, we propose a new two-branch network model based on HRNet that can better detect both the image-editing and compression artifacts in those challenging conditions. Extensive experiments on the CIMD benchmark show that our model significantly outperforms SoTA IMD methods on CIMD.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (42)
  1. A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE transactions on information forensics and security.
  2. Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection. IEEE Transactions on Information Forensics and Security, 13(11): 2691–2706.
  3. RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection. In IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.
  4. Rethinking atrous convolution for semantic image segmentation. arXiv preprint arXiv:1706.05587.
  5. Image manipulation detection by multi-view multiscale supervision. In IEEE/CVF International Conference on Computer Vision, 14185–14193.
  6. Higherhrnet: Scale-aware representation learning for bottom-up human pose estimation. In IEEE/CVF conference on computer vision and pattern recognition, 5386–5395.
  7. Splicebuster: A new blind image splicing detector. In IEEE International Workshop on Information Forensics and Security (WIFS), 1–6. IEEE.
  8. Noiseprint: A CNNBased Camera Model Fingerprint. IEEE Transactions on Information Forensics and Security, 15: 144–159.
  9. A smarter exemplar-based inpainting algorithm using local and global heuristics for more geometric coherence. In IEEE International Conference on Image Processing (ICIP), 4622–4626. IEEE.
  10. Casia image tampering detection evaluation database. In 2013 IEEE China summit and international conference on signal and information processing, 422–426. IEEE.
  11. Casia image tampering detection evaluation database. In IEEE China summit and international conference on signal and information processing, 422–426. IEEE.
  12. MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation. In IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 63–72. IEEE.
  13. Hierarchical fine-grained image forgery detection and localization. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 3155–3165.
  14. Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network. IEEE Transactions on Circuits and Systems for Video Technology, 32(3): 1089–1102.
  15. Squeeze-and-excitation networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, 7132–7141.
  16. SPAN: Spatial pyramid attention network for image manipulation localization. In European Conference on Computer Vision (ECCV),, 312–328. Springer.
  17. Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Transactions on Information Forensics and Security, 5(4): 848–856.
  18. Fighting fake news: Image splice detection via learned self-consistency. In European conference on computer vision (ECCV), 101–117.
  19. Learning jpeg compression artifacts for image manipulation detection and localization. International Journal of Computer Vision, 1875–1895.
  20. Localization of deep inpainting using high-pass fully convolutional network. In IEEE/CVF international conference on computer vision, 8301–8310.
  21. Pscc-net: Progressive spatio-channel correlation network for image manipulation detection and localization. IEEE Transactions on Circuits and Systems for Video Technology, 32(11): 7505–7517.
  22. DEFACTO: image and face manipulation dataset. In 2019 27Th european signal processing conference (EUSIPCO). IEEE.
  23. Comprint: Image Forgery Detection and Localization using Compression Fingerprints. In International Conference on Pattern Recognition (ICPR).
  24. A full-image full-resolution end-to-end-trainable CNN framework for image forgery detection. IEEE Access, 8: 133488–133502.
  25. Columbia image splicing detection evaluation dataset. DVMM lab. Columbia Univ CalPhotos Digit Libr.
  26. Detection of Double JPEG Compression With the Same Quantization Matrix via Convergence Analysis. IEEE Transactions on Circuits and Systems for Video Technology, 32(5): 3279–3290.
  27. IMD2020: A large-scale annotated dataset tailored for detecting manipulated images. In IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 71–80.
  28. Double JPEG Detection in Mixed JPEG Quality Factors using Deep Convolutional Neural Network. In European conference on computer vision (ECCV), 636–652.
  29. Double JPEG detection in mixed JPEG quality factors using deep convolutional neural network. In European conference on computer vision (ECCV), 636–652.
  30. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32.
  31. Detection of Double JPEG Compression with the Same Quantization Matrix Based on Convolutional Neural Networks. In Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 717–721. IEEE.
  32. Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 64: 131–148.
  33. Attention is all you need. Advances in neural information processing systems.
  34. Deep high-resolution representation learning for visual recognition. IEEE transactions on pattern analysis and machine intelligence, 43(10): 3349–3364.
  35. ObjectFormer for Image Manipulation Detection and Localization. In IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2364–2373.
  36. COVERAGE – A NOVEL DATABASE FOR COPY-MOVE FORGERY DETECTION. In IEEE International Conference on Image processing (ICIP).
  37. Robust image forgery detection over online social network shared images. In IEEE/CVF Conference on Computer Vision and Pattern Recognition, 13440–13449.
  38. ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features. In IEEE/CVF Conference on Computer Vision and Pattern Recognition, 9543–9552.
  39. Constrained R-CNN: A General Image Manipulation Detection Model. In IEEE International Conference on Multimedia and Expo (ICME), 1–6. IEEE.
  40. An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Transactions on Information Forensics and Security, 9(11): 1933–1942.
  41. DOLG: Single-Stage Image Retrieval with Deep Orthogonal Fusion of Local and Global Features. In IEEE/CVF International conference on Computer Vision, 11772–11781.
  42. An intriguing struggle of cnns in jpeg steganalysis and the onehot solution. IEEE Signal Processing Letters, 27: 830–834.
Citations (3)

Summary

We haven't generated a summary for this paper yet.