期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
DDT-Net:Deep Detail Tracking Network for Image Tampering Detection
1
作者 Jim Wong Zhaoxiang Zang 《Computers, Materials & Continua》 2025年第5期3451-3469,共19页
In the field of image forensics,image tampering detection is a critical and challenging task.Traditional methods based on manually designed feature extraction typically focus on a specific type of tampering operation,... In the field of image forensics,image tampering detection is a critical and challenging task.Traditional methods based on manually designed feature extraction typically focus on a specific type of tampering operation,which limits their effectiveness in complex scenarios involving multiple forms of tampering.Although deep learningbasedmethods offer the advantage of automatic feature learning,current approaches still require further improvements in terms of detection accuracy and computational efficiency.To address these challenges,this study applies the UNet 3+model to image tampering detection and proposes a hybrid framework,referred to as DDT-Net(Deep Detail Tracking Network),which integrates deep learning with traditional detection techniques.In contrast to traditional additive methods,this approach innovatively applies amultiplicative fusion technique during downsampling,effectively combining the deep learning feature maps at each layer with those generated by the Bayar noise stream.This design enables noise residual features to guide the learning of semantic features more precisely and efficiently,thus facilitating comprehensive feature-level interaction.Furthermore,by leveraging the complementary strengths of deep networks in capturing large-scale semantic manipulations and traditional algorithms’proficiency in detecting fine-grained local traces,the method significantly enhances the accuracy and robustness of tampered region detection.Compared with other approaches,the proposed method achieves an F1 score improvement exceeding 30% on the DEFACTO and DIS25k datasets.In addition,it has been extensively validated on other datasets,including CASIA and DIS25k.Experimental results demonstrate that this method achieves outstanding performance across various types of image tampering detection tasks. 展开更多
关键词 image forensics image tampering detection image manipulation detection noise flow Bayar
在线阅读 下载PDF
Image Tampering Detection Method Based on Hybrid Attention Mechanism
2
作者 Xinqi Yu Weimin Wei +1 位作者 Renying Pei Xingchao Zhou 《国际计算机前沿大会会议论文集》 2024年第3期244-253,共10页
Aiming at the problems of current image tampering detectionmethods,such as inaccurate localization or poor robustness.We propose a novel network model structure leveraging a hybrid attentionmechanism.The model incorpo... Aiming at the problems of current image tampering detectionmethods,such as inaccurate localization or poor robustness.We propose a novel network model structure leveraging a hybrid attentionmechanism.The model incorporates two parallel branches:the main branch is dedicated to extracting features from RGB images,emphasizing the identification of visual artifacts like unnatural tampering boundaries and strong contrast differences,while the secondary branch,employing constrained convolution and the spatial rich model(SRM)filter,is focused on extracting features associated with noise.To enhance image representation,we introduce a hybrid attention mechanism module within the dual stream.This module includes a positional attention mechanism and a window-based selfattention mechanism.Additionally,we employ atrous spatial pyramid pooling to effectively fuse the features from the dual streams.The experimental results showcase the efficiency of the suggested approach,outclassing several advanced techniques in both detection and localization assignments. 展开更多
关键词 Deep Learning image tampering detection Hybrid Attention Mechanism Dual-Stream Features
原文传递
Deep Learning Based Image Forgery Detection Methods
3
作者 Liang Xiu-jian Sun He 《Journal of Cyber Security》 2022年第2期119-133,共15页
Increasingly advanced image processing technology has made digital image editing easier and easier.With image processing software at one’s fingertips,one can easily alter the content of an image,and the altered image... Increasingly advanced image processing technology has made digital image editing easier and easier.With image processing software at one’s fingertips,one can easily alter the content of an image,and the altered image is so realistic that it is illegible to the naked eye.These tampered images have posed a serious threat to personal privacy,social order,and national security.Therefore,detecting and locating tampered areas in images has important practical significance,and has become an important research topic in the field of multimedia information security.In recent years,deep learning technology has been widely used in image tampering localization,and the achieved performance has significantly surpassed traditional tampering forensics methods.This paper mainly sorts out the relevant knowledge and latest methods in the field of image tampering detection based on deep learning.According to the two types of tampering detection based on deep learning,the detection tasks of the method are detailed separately,and the problems and future prospects in this field are discussed.It is quite different from the existing work:(1)This paper mainly focuses on the problem of image tampering detection,so it does not elaborate on various forensic methods.(2)This paper focuses on the detectionmethod of image tampering based on deep learning.(3)This paper is driven by the needs of tampering targets,so it pays more attention to sorting out methods for different tampering detection tasks. 展开更多
关键词 Digital image forensics image tampering detection deep learning image splicing detection copy-move detection
在线阅读 下载PDF
An Overview of Image Tamper Detection
4
作者 Xingyu Chen 《Journal of Information Hiding and Privacy Protection》 2022年第2期103-113,共11页
With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software,the threshold of digital image editing becomes lower and lower.Thismakes it easy to t... With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software,the threshold of digital image editing becomes lower and lower.Thismakes it easy to trick the human visual system with professionally altered images.These tampered images have brought serious threats to many fields,including personal privacy,news communication,judicial evidence collection,information security and so on.Therefore,the security and reliability of digital information has been increasingly concerned by the international community.In this paper,digital image tamper detection methods are classified according to the clues that they rely on,detection methods based on image content and detection methods based on double JPEG compression traces.This paper analyzes and discusses the important algorithms in several classification methods,and summarizes the problems existing in various methods.Finally,this paper predicts the future development trend of tamper detection. 展开更多
关键词 image forensics image tampering traces image tampering detection
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部