2019
DOI: 10.1145/3301274
|View full text |Cite
|
Sign up to set email alerts
|

Deep Multi-scale Discriminative Networks for Double JPEG Compression Forensics

Abstract: As JPEG is the most widely used image format, the importance of tampering detection for JPEG images in blind forensics is self-evident. In this area, extracting effective statistical characteristics from a JPEG image for classification remains a challenge. Effective features are designed manually in traditional methods, suggesting that extensive labor-consuming research and derivation is required. In this paper, we propose a novel image tampering detection method based on deep multi-scale discriminative networ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…More recently, a new class of CNN-based methods have been proposed. They are able to improve the spatial resolution of DJPEG localization and then can be conveniently used for tampering localization, (see, for instance, [19], [20] -for both aligned and not-aligned DJPEG detection, and [4] -for the aligned DJPEG case). All the above methods focus on the SJPEG vs DJPEG scenario, that is, they work under the assumption that the tampered areas are double compressed while the background is single compressed.…”
Section: Prior Artmentioning
confidence: 99%
See 2 more Smart Citations
“…More recently, a new class of CNN-based methods have been proposed. They are able to improve the spatial resolution of DJPEG localization and then can be conveniently used for tampering localization, (see, for instance, [19], [20] -for both aligned and not-aligned DJPEG detection, and [4] -for the aligned DJPEG case). All the above methods focus on the SJPEG vs DJPEG scenario, that is, they work under the assumption that the tampered areas are double compressed while the background is single compressed.…”
Section: Prior Artmentioning
confidence: 99%
“…If any of the sums in brackets at the denominator is zero, the denominator is arbitrarily set to one. MCC is particularly helpfull in the case of unbalanced classed, like it is almost always the case for tampering localization 4 . The identification of spliced regions coming from different donor images is a new goal addressed in this paper, so no established metric exists to measure the performance with respect to this task.…”
Section: A Evaluation Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Approaches based on deep neural networks have also been used to investigate low-level image features. Methods that focus on low-level features mostly focus on detecting local inconsistencies or statistical features relating to the manipulated images [12][13][14][15][16].…”
Section: Image Forensicsmentioning
confidence: 99%
“…Generating photographic images from text descriptions (known as Text-to-Image Generation, T2I) is a challenging cross-modal generation technique that is a core component in many computer vision tasks such as Image Editing [28], [51], Story Visualization [53], and Multimedia Retrieval [19]. Compared with the image generation [26], [17], [22] and image processing [6], [5], [23] tasks between the same mode, it is difficult to build the heterogeneous semantic bridge between text and image [54], [48], [40]. Many state-of-the-art T2I algorithms [31], [25], [36], [9], [3], [42] first extract text features, then use Generative Adversarial Networks (GANs) [7] to generate the corresponding image.…”
Section: Introductionmentioning
confidence: 99%