In accordance with regulations and requirements, the editorial department's website domain has been changed to arocmag.cn. The original domain (arocmag.com) will be discontinued after Dec. 31st, 2024.
Technology of Information Security
|
3791-3796

Feature fusion-oriented image multi-tampering detection and localization algorithm

Lan Ping
Li Yan
School of Cyberspace Security, Gansu University of Political Science & Law, Lanzhou 730070, China

Abstract

Most of the existing image tampering detection methods are only for a certain tampering method, and there is a problem that the detection accuracy of the tampered area boundary is not high. In this regard, this paper proposed a U-shaped network based on dual-stream encoder-decoder architecture for image tampering. Firstly, the method used the skip connection between the encoder and the decoder to fuse the low-level and high-level features in the tampered image, and used the atrous convolution and CBAM attention mechanism to fuse the features output by the encoder, so that the network had better localization performance for tampered regions of different scales. Secondly, in order to improve the network's detection accuracy of the boundary of the tampered area, this algorithm used the image morphological method to make a tampered boundary dataset. Finally, it used multiple loss functions to optimize the performance of the network simultaneously, namely it used cross-entropy and root-mean-square loss functions to measure the tampered region loss and tampered boundary loss of the prediction graph respectively. The experimental results on four public datasets, such as CASIA, Columbia, NIST16, Coverage show that the proposed method can effectively detect the tampering area of the fake image with splicing and copy-paste tampering methods, and output pixel-level tampering region location map. Compared with other mainstream tampering detection methods, the proposed method achieves the highest AUC values on the CASIA and Columbia dataset and the highest F1 value on the Columbia dataset.

Foundation Support

甘肃省自然科学基金资助项目(20JR10RA334,21JR7RA570)
2021年陇原青年创新创业人才项目(2021LQGR20)
甘肃政法大学校级创新项目(GZF2020XZD18,jbzxyb2018-01)

Publish Information

DOI: 10.19734/j.issn.1001-3695.2022.04.0216
Publish at: Application Research of Computers Printed Article, Vol. 39, 2022 No. 12
Section: Technology of Information Security
Pages: 3791-3796
Serial Number: 1001-3695(2022)12-043-3791-06

Publish History

[2022-07-18] Accepted Paper
[2022-12-05] Printed Article

Cite This Article

兰萍, 李燕. 面向特征融合的图像多窜改检测与定位算法 [J]. 计算机应用研究, 2022, 39 (12): 3791-3796. (Lan Ping, Li Yan. Feature fusion-oriented image multi-tampering detection and localization algorithm [J]. Application Research of Computers, 2022, 39 (12): 3791-3796. )

About the Journal

  • Application Research of Computers Monthly Journal
  • Journal ID ISSN 1001-3695
    CN  51-1196/TP

Application Research of Computers, founded in 1984, is an academic journal of computing technology sponsored by Sichuan Institute of Computer Sciences under the Science and Technology Department of Sichuan Province.

Aiming at the urgently needed cutting-edge technology in this discipline, Application Research of Computers reflects the mainstream technology, hot technology and the latest development trend of computer application research at home and abroad in a timely manner. The main contents of the journal include high-level academic papers in this discipline, the latest scientific research results and major application results. The contents of the columns involve new theories of computer discipline, basic computer theory, algorithm theory research, algorithm design and analysis, blockchain technology, system software and software engineering technology, pattern recognition and artificial intelligence, architecture, advanced computing, parallel processing, database technology, computer network and communication technology, information security technology, computer image graphics and its latest hot application technology.

Application Research of Computers has many high-level readers and authors, and its readers are mainly senior and middle-level researchers and engineers engaged in the field of computer science, as well as teachers and students majoring in computer science and related majors in colleges and universities. Over the years, the total citation frequency and Web download rate of Application Research of Computers have been ranked among the top of similar academic journals in this discipline, and the academic papers published are highly popular among the readers for their novelty, academics, foresight, orientation and practicality.


Indexed & Evaluation

  • The Second National Periodical Award 100 Key Journals
  • Double Effect Journal of China Journal Formation
  • the Core Journal of China (Peking University 2023 Edition)
  • the Core Journal for Science
  • Chinese Science Citation Database (CSCD) Source Journals
  • RCCSE Chinese Core Academic Journals
  • Journal of China Computer Federation
  • 2020-2022 The World Journal Clout Index (WJCI) Report of Scientific and Technological Periodicals
  • Full-text Source Journal of China Science and Technology Periodicals Database
  • Source Journal of China Academic Journals Comprehensive Evaluation Database
  • Source Journals of China Academic Journals (CD-ROM Version), China Journal Network
  • 2017-2019 China Outstanding Academic Journals with International Influence (Natural Science and Engineering Technology)
  • Source Journal of Top Academic Papers (F5000) Program of China's Excellent Science and Technology Journals
  • Source Journal of China Engineering Technology Electronic Information Network and Electronic Technology Literature Database
  • Source Journal of British Science Digest (INSPEC)
  • Japan Science and Technology Agency (JST) Source Journal
  • Russian Journal of Abstracts (AJ, VINITI) Source Journals
  • Full-text Journal of EBSCO, USA
  • Cambridge Scientific Abstracts (Natural Sciences) (CSA(NS)) core journals
  • Poland Copernicus Index (IC)
  • Ulrichsweb (USA)