Image Forgery Detection Based on Deep Transfer Learning
##plugins.themes.bootstrap3.article.main##
The recent digital revolution has sparked a growing interest in applying convolutional neural networks (CNNs) and deep learning to the field of image forensics. The proposed methods aim to train algorithms for solving a range of predetermined tasks. However, training a model that has been randomly initialized requires extensive time for computation as well as an enormous pool of training data to draw from. Moreover, such a model needs to be developed and redeveloped from the ground up if there are any alterations to the feature-space distribution. In addressing these problems, the present paper proposes a novel approach to training image forgery detection models. The method applies prior knowledge that has been transferred to the new model from previous steganalysis models. Additionally, because CNN models generally perform badly when transferred to other databases, transfer learning accomplished through knowledge transfer allows the model to be easily trained for other databases. The various models are then evaluated using image forgery techniques such as shearing, rotating, and scaling images. The experimental results, which show an image manipulation detection has validation accuracy of over 94.89%, indicate that the proposed transfer learning approach successfully accelerates CNN model convergence but does not improve image quality.
Downloads
References
-
R. T. C. Dipanjan Sarkar, Hands On Transfer Learning With Python, Packt, 2018.
Google Scholar
1
-
D. Iter, "Image Classification using Transfer Learning from Siamese Networks based on Text Metadata Similarity," Stanford University, pp. 1 - 13, 2016.
Google Scholar
2
-
R. V. G. B. Soares, " Inductive Transfer," In: Sammut C., Webb G.I.(eds) Encyclopedia of Machine Learning. Springer, Boston, MA, 2011.
Google Scholar
3
-
D. Sarkar, "A Comprehensive Hands-on Guide to Transfer Learning with Real-World Applications in Deep Learning," Midum, 14 Nov. 2018.
Google Scholar
4
-
W. H. Z. Jing, "Exposing digital forgeries by detecting traces of image splicing," in 8th International Conference on Signal Processing. IEEE, vol. 2, 2006.
Google Scholar
5
-
A. V. A. Mahendran, "Visualizing deep convolutional neural networks using natural pre-images," International Journal of Computer Vision, vol. 12, no. 3, pp. 233-255, 2016.
Google Scholar
6
-
K. Z. and He, "Identity mappings in deep residual networks," arXiv preprint arXiv, no. 1611.05431, 2016.
Google Scholar
7
-
R. A. James P., "http://robots.ox.ac.uk/~vgg/data/oxbuildings/," [Online]. [Accessed 8 Aug. 2019].
Google Scholar
8
-
Y. Z. B. Wen, "COVERAGE - A Novel Database for Copy-Move Forgery Detection," in Proc. IEEE Int. Conf. Image Processing (ICIP), pp. 1-19, 2016.
Google Scholar
9
-
T. A. B. X. Han, " MatchNet: Unifying Feature and Metric Learning for Patch-Based Matching.," Proceedings of Computer Vision and Pattern Recognition, 2015.
Google Scholar
10
-
M. T. Lin, "Microsoft COCO: Common Objects in Context," in ECCV, 2014.
Google Scholar
11
-
D. A. B. Thomee, "The New Data and New Challenges in Multimedia Research," arXiv , 2015.
Google Scholar
12
-
E. S. Y. Jia, "Caffe: Convolutional Architecture for Fast Feature Embedding," arXiv , 2014.
Google Scholar
13