期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Multi-scale Image Tampering Detection Using Inception-UNet Network
1
作者 Xingchao Zhou Weimin Wei +1 位作者 Xinqi Yu Renying Pei 《国际计算机前沿大会会议论文集》 2024年第3期306-315,共10页
Image tampering detection techniques are being needed in many fields.For example,in the field of forensic evidence,there is a lack of reliable techniques for verifying the authenticity of digital image evidence.In the... Image tampering detection techniques are being needed in many fields.For example,in the field of forensic evidence,there is a lack of reliable techniques for verifying the authenticity of digital image evidence.In the academic field,qualified detection techniques are also required to determine the authenticity of images in research papers.Therefore,image tampering detection techniques can significantly reduce human resource consumption.In this work,a network using a combination of the Inception module and U-Net is proposed,which extracts the multi-scale features of the image for tampering detection.This method extracts the multi-scale features of the image for tampering detection using Inception module.The feature information is processed through theU-network and residual structure,and the detection result of the image is output after up-sampling step by step.The method also extracts image noise using constrained convolution operation.Invalid features are suppressed through the attentionmechanism,which ultimately leads to good prediction of image tampering.It is experimentally verified that our method has good prediction performance for tampered images. 展开更多
关键词 MULTI-SCALE circular residual mechanism constrained convolution attention mechanism
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部