• Laser & Optoelectronics Progress
  • Vol. 58, Issue 22, 2211003 (2021)
Haoyue Liu*, Wenwei Ma, Xiao Fu, Chengxiu Shen, and Yaling Wang
Author Affiliations
  • Internet Finance Laboratory, TK.CN Insurance Co., Ltd., Wuhan, Hubei 430014, China
  • show less
    DOI: 10.3788/LOP202158.2211003 Cite this Article Set citation alerts
    Haoyue Liu, Wenwei Ma, Xiao Fu, Chengxiu Shen, Yaling Wang. Image Manipulation Detection Algorithm Based on Improved RGB-N[J]. Laser & Optoelectronics Progress, 2021, 58(22): 2211003 Copy Citation Text show less
    References

    [1] Wang J, Zhang Y C, Huo Z Q et al. Image tampering detection method based on approximate nearest neighbor search[J]. Laser & Optoelectronics Progress, 57, 101102(2020).

    [2] Liu T T, Zhang Y J, Wu F et al. Diffusion-based image inpainting forensics via gradient domain guided filtering enhancement[J]. Laser & Optoelectronics Progress, 57, 081003(2020).

    [3] Guo J C, Wei H W, He Y H et al. Enhancing image steganographic security using daubechies wavelet[J]. Laser & Optoelectronics Progress, 56, 031004(2019).

    [4] Fridrich J, Soukal D, Jan Lukáš. Detection of copy-move forgery in digital images[EB/OL]. [2020-12-25]. .https://ia.binghamton.edu/publication/FridrichPDF/copymove.pdf.

    [5] Ng T T, Chang S F, Sun Q B. Blind detection of photomontage using higher order statistics[C]. //2004 IEEE International Symposium on Circuits and Systems, May 23-26, 2004, Vancouver, BC, Canada., V-688-V-691(2004).

    [6] Fu D D, Shi Y Q, Su W. Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition[M]. //Shi Y Q, Jeon B. Digital watermarking. Lecture notes in computer science, 4283, 177-187(2006).

    [7] Bianchi T, Piva A. Image forgery localization via block-grained analysis of JPEG artifacts[J]. IEEE Transactions on Information Forensics and Security, 7, 1003-1017(2012).

    [8] Bianchi T, Piva A. Detection of nonaligned double JPEG compression based on integer periodicity maps[J]. IEEE Transactions on Information Forensics and Security, 7, 842-848(2012).

    [9] Fan Z G, de Queiroz R L. Identification of bitmap compression history: JPEG detection and quantizer estimation[J]. IEEE Transactions on Image Processing, 12, 230-235(2003).

    [10] Johnson M K, Farid H. Exposing digital forgeries through chromatic aberration[C]. //Proceeding of the 8th workshop on Multimedia and security-MM & Sec’06, September 26-27, 2006, Geneva, Switzerland., 48-55(2006).

    [11] Swaminathan A, Wu M, Liu K J R. Nonintrusive component forensics of visual sensors using output images[J]. IEEE Transactions on Information Forensics and Security, 2, 91-106(2007).

    [12] Chen M, Fridrich J, Goljan M et al. Determining image origin and integrity using sensor noise[J]. IEEE Transactions on Information Forensics and Security, 3, 74-90(2008).

    [13] Ren S Q, He K M, Girshick R et al. Faster R-CNN: towards real-time object detection with region proposal networks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 39, 1137-1149(2017).

    [14] Redmon J, Divvala S, Girshick R et al. You only look once: unified, real-time object detection[C]. //2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 27-30, 2016, Las Vegas, NV, USA, 779-788(2016).

    [15] Liu W, Anguelov D, Erhan D et al. SSD:single shot MultiBox detector[M]. //Leibe B, Matas J, Sebe N, et al. Computer vision-ECCV 2016. Lecture notes in computer science, 9905, 21-37(2016).

    [16] Zhou P, Han X T, Morariu V I et al. Learning rich features for image manipulation detection[C]. //2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, June 18-23, 2018, Salt Lake City, UT, USA., 1053-1061(2018).

    [17] Bappy J H, Simons C, Nataraj L et al. Hybrid LSTM and encoder-decoder architecture for detection of image forgeries[J]. IEEE Transactions on Image Processing, 28, 3286-3300(2019).

    [18] Huh M, Liu A, Owens A et al. Fighting fake news: image splice detection via learned self-consistency[M]. //Ferrari V, Hebert M, Sminchisescu C, et al. Computer vision-ECCV 2018. Lecture notes in computer science, 9905, 21-37(2018).

    [19] Lin T Y, Dollár P, Girshick R et al. Feature pyramid networks for object detection[C]. //2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 21-26, 2017, Honolulu, HI, USA., 936-944(2017).

    [20] Pang J M, Chen K, Shi J P et al. Libra R-CNN: Towards balanced learning for object detection[C]. //2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 15-20, 2019, Long Beach, CA, USA, 821-830(2019).

    [21] Wang X L, Girshick R, Gupta A et al. Non-local neural networks[C]. //2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, June 18-23, 2018, Salt Lake City, UT, USA., 7794-7803(2018).

    [22] Hu J, Shen L, Albanie S et al. Squeeze-and-excitation networks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42, 2011-2023(2020).

    [23] Milletari F, Navab N, Ahmadi S A. V-net: fully convolutional neural networks for volumetric medical image segmentation[C]. //2016 Fourth International Conference on 3D Vision (3DV), October 25-28, 2016, Stanford, CA, USA, 565-571(2016).

    [24] Nazeri K, Ng E, Joseph T et al. EdgeConnect: generative image inpainting with adversarial edge learning[EB/OL]. (2019-01-01)[2020-12-25]. https://arxiv.org/abs/1901.00212

    [25] Salloum R, Ren Y Z. Jay Kuo C C. Image splicing localization using a multi-task fully convolutional network (MFCN)[J]. Journal of Visual Communication and Image Representation, 51, 201-209(2018).

    [26] Krawetz N, Solutions H F. A picture’s worth[J]. Hacker Factor Solutions, 6, 2-31(2007).

    [27] Mahdian B, Saic S. Using noise inconsistencies for blind image forensics[J]. Image and Vision Computing, 27, 1497-1503(2009).

    Haoyue Liu, Wenwei Ma, Xiao Fu, Chengxiu Shen, Yaling Wang. Image Manipulation Detection Algorithm Based on Improved RGB-N[J]. Laser & Optoelectronics Progress, 2021, 58(22): 2211003
    Download Citation