Localization of JPEG double compression through multi-domain convolutional neural networks

被引:69
作者
Amerini, Irene [1 ]
Uricchio, Tiberio [1 ]
Ballan, Lamberto [1 ,2 ]
Caldelli, Roberto [1 ,3 ]
机构
[1] Univ Florence, Media Integrat & Commun Ctr, Florence, Italy
[2] Univ Padua, Dept Math Tullio Levi Civita, Padua, Italy
[3] Natl Interuniv Consortium Telecommun CNIT, Parma, Italy
来源
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) | 2017年
关键词
D O I
10.1109/CVPRW.2017.233
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When an attacker wants to falsify an image, in most of cases she/he will perform a JPEG recompression. Different techniques have been developed based on diverse theoretical assumptions but very effective solutions have not been developed yet. Recently, machine learning based approaches have been started to appear in the field of image forensics to solve diverse tasks such as acquisition source identification and forgery detection. In this last case, the aim ahead would be to get a trained neural network able, given a to-be-checked image, to reliably localize the forged areas. With this in mind, our paper proposes a step forward in this direction by analyzing how a single or double JPEG compression can be revealed and localized using convolutional neural networks (CNNs). Different kinds of input to the CNN have been taken into consideration, and various experiments have been carried out trying also to evidence potential issues to be further investigated.
引用
收藏
页码:1865 / 1871
页数:7
相关论文
共 25 条
  • [1] Copy-move forgery detection and localization by means of robust clustering with J-Linkage
    Amerini, Irene
    Ballan, Lamberto
    Caldelli, Roberto
    Del Bimbo, Alberto
    Del Tongo, Luca
    Serra, Giuseppe
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (06) : 659 - 669
  • [2] Amerini I, 2014, IEEE INT WORKS INFOR, P143, DOI 10.1109/WIFS.2014.7084318
  • [3] [Anonymous], CORR
  • [4] Bayar B., 2016, P 4 ACM WORKSH INF H, P5, DOI DOI 10.1145/2909827.2930786
  • [5] Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
    Bianchi, Tiziano
    Piva, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1003 - 1017
  • [6] An Evaluation of Popular Copy-Move Forgery Detection Approaches
    Christlein, Vincent
    Riess, Christian
    Jordan, Johannes
    Riess, Corinna
    Angelopoulou, Elli
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1841 - 1854
  • [7] Cozza D., 2015, 2015 IEEE 42nd Photovoltaic Specialist Conference (PVSC). Proceedings, P1, DOI 10.1109/PVSC.2015.7355795
  • [8] Girshick R., 2014, IEEE C COMP VIS PATT, DOI [DOI 10.1109/CVPR.2014.81, 10.1109/CVPR.2014.81]
  • [9] Johnson Justin, 2015, P IEEE INT C COMP VI, P2
  • [10] Exposing Photo Manipulation with Inconsistent Shadows
    Kee, Eric
    O'Brien, James
    Farid, Hany
    [J]. ACM TRANSACTIONS ON GRAPHICS, 2013, 32 (03):