Aiming at the problems of traditional image manipulation detection methods, such as fuzzy boundaries, single scale of extracted features, and ignoring background information, this paper proposes an image manipulation detection method based on multi-scale context-aware and boundary-guided. First, spatial details and base features of manipulated images are extracted using an improved pyramid vision transformer. Second, information related to the edge of the falsified region is explored by an edge context-aware module to generate an edge prediction map. Again, the edge guidance module is utilized to highlight the key channels in the extracted features and reduce the interference of redundant channels. Then, the rich contextual information of the manipulated region is learned from multiple sensory fields through the multi-scale context-aware module. Finally, the feature fusion module is utilized to accurately segment the manipulated region by focusing alternately on the foreground and background of the manipulated images. Comparing this paper's method quantitatively and qualitatively on five commonly used public image manipulation detection datasets, the experimental results show that this paper's method can effectively detect manipulated regions and outperforms other methods.
ShiZ, ChenH, ZhangD. Transformer-auxiliary neural networks for image manipulation localization by operator inductions[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(9): 4907-4920.
ZhongHui, KangHeng, Ying-daLyu, et al. Image manipulation localization algorithm based on channel attention convolutional neural networks[J]. Journal of Jilin University (Engineering and Technology Edition), 2021, 51(5): 1838-1844.
ShiZe-nan, ChenHai-peng, ZhangDong, et al. Pretraining-driven multimodal boundary-aware vision transformer[J]. Journal of Software, 2023, 34(5): 2051-2067.
[6]
XuD, ShenX, LyuY, et al. MC-Net: Learning mutually complementary features for image manipulation localization[J]. International Journal of Intelligent Systems, 2022, 37(5): 3072-3089.
[7]
MahdianB, SaicS. Using noise inconsistencies for blind image forensics[J]. Image and Vision Computing, 2009, 27(10): 1497-1503.
[8]
LinZ, HeJ, TangX, et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis[J]. Pattern Recognition, 2009, 42(11): 2492-2501.
[9]
PopescuA C, FaridH. Exposing digital forgeries in color filter array interpolated images[J]. IEEE Transactions on Signal Processing, 2005, 53(10): 3948-3959.
[10]
ZhouP, ChenB C, HanX, et al. Generate, segment, and refine: towards generic manipulation segmentation[C]//Proceedings of the AAAI Conference on Artificial Intelligence, New York, USA, 2020: 13058-13065.
[11]
WangJ, WuZ, ChenJ, et al. Objectformer for image manipulation detection and localization[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, New Orleans, USA, 2022: 2364-2373.
[12]
LinX, WangS, DengJ, et al. Image manipulationdetection by multiple tampering traces and edge artifact enhancement[J]. Pattern Recognition, 2023, 133:109026-109036.
[13]
WangW, XieE, LiX, et al. PVT v2: improved baselines with pyramid vision transformer[J]. Computational Visual Media, 2022, 8(3): 415-424.
HuLin-hui, ChenBao-ying, TanShun-quan, et al. Convnext-Upernet based deep-learning model for image forgery detection and localization[J/OL]. [2023-09-10].
[16]
DongJ, WangW, TanT. Casia image tampering detection evaluation database[C]∥2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China, 2013: 422-426.
[17]
GuanH, KozakM, RobertsonE, et al. MFC datasets: Large-scale benchmark datasets for media for ensic challenge evaluation[C]∥2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), Waikoloa, USA, 2019: 63-72.
[18]
HsuY F, ChangS F. Detecting image splicing usinggeometry invariants and camera characteristics consistency[C]∥2006 IEEE International Conference on Multimedia and Expo, Toronto, Canada, 2006: 549-552.
[19]
WenB, ZhuY, SubramanianR, et al. COVERAGE: a novel database for copy-move forgery detection[C]∥2016 IEEE International Conference on Image Processing (ICIP), Phoenix, USA, 2016: 161-165.
[20]
NovozamskyA, MahdianB, SaicS. IMD2020: a large-scale annotated dataset tailored for detecting manipulated images[C]∥Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, Snowmass Village, USA, 2020: 71-80.
[21]
WuY, AbdAlmageedW, NatarajanP. Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, USA, 2019: 9543-9552.
[22]
HuX, ZhangZ, JiangZ, et al. SPAN: spatial pyramid attention network for image manipulation localization[C]∥Proceedings of the European Conference on Computer Vision (ECCV), Glasgow, UK, 2020: 312-328.
[23]
ChenX, DongC, JiJ, et al. Image manipulation detection by multi-view multi-scale supervision[C]∥Proceedings of the IEEE/CVF International Conference on Computer Vision, Montreal, Canada, 2021: 14165-14173.
[24]
ZhuangP, LiH, TanS, et al. Image tampering localization using a dense fully convolutional network[J].IEEE Transactions on Information Forensics and Security, 2021, 16: 2986-2999.
[25]
ZhuoL, TanS, LiB, et al. Self-adversarial training incorporating forgery attention for image forgery localization[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 819-834.