信号与信息处理

改进的卷积神经网络用于对比度增强取证

展开
  • 复旦大学 电子工程系, 上海 200433
王建军,副教授,研究方向:多媒体信息安全、图像处理,E-mail:wangjj@fudan.edu.cn

收稿日期: 2017-01-19

  修回日期: 2017-03-30

  网络出版日期: 2017-11-30

基金资助

国家自然科学基金(No.61170207)资助

Contrast Enhancement Forensics Based on Modified Convolutional Neural Network

Expand
  • Department of Electronic Engineering, Fudan University, Shanghai 200433, China

Received date: 2017-01-19

  Revised date: 2017-03-30

  Online published: 2017-11-30

摘要

提出一种改进的卷积神经网络(modified convolutional neural network,MCNN)用于图像的对比度增强取证.其中MCNN第1层是预处理层,这一层将输入图像转化为二值灰度共生矩阵(binary gray-level co-occurrence matrix,BGLCM),其余各层与传统的卷积神经网络相同,这些层可从BGLCM上学习特征并以此进行分类.该方法的特征提取和分类可同时进行优化,使提取到的特征更适合对比度增强检测.实验表明,所提方法不仅可检测传统的对比度增强技术和两种反取证技术产生的对比度增强图像,还可区分对比度增强时所采用的参数.

本文引用格式

董伟, 王建军 . 改进的卷积神经网络用于对比度增强取证[J]. 应用科学学报, 2017 , 35(6) : 745 -753 . DOI: 10.3969/j.issn.0255-8297.2017.06.008

Abstract

Contrast enhancement forensics has drawn much attention in image forensics recently. This paper proposes a modified convolutional neural network (MCNN). The first layer in the MCNN is a preprocessing layer, which converts an input image to a binary gray-level co-occurrence matrix (BGLCM). The other layers are the same with conventional CNN, which learn features from BGLCM for classification. Compared with previous methods, feature extraction and classification can be optimized simultaneously, making the extracted features more suitable for contrast enhancement detection. Experimental results show that the proposed method can detect contrast enhanced images produced by conventional contrast enhancement and two anti-forensic techniques. It can also distinguish parameters used in the contrast enhancement.

参考文献

[1] De Rosa A, Fontani M, Massai M, Piva A, Barni M. Second-order statistics analysis to cope with contrast enhancement counter-forensics[J]. IEEE Signal Processing Letters, 2015, 22(8):1132-1136.
[2] Stamm M, Liu K J R. Blind forensics of contrast enhancement in digital images[C]//200815th IEEE International Conference on Image Processing, 2008:3112-3115.
[3] Cao G, Zhao Y, Ni R, Forensic estimation of gamma correction in digital images[C]//IEEE International Conference on Image Processing, 2010:2097-2100.
[4] Lin X, Li C T, Hu Y. Exposing image forgery through the detection of contrast enhancement[C]//2013 IEEE International Conference on Image Processing, 2013:4467-4471.
[5] Cao G, Zhao Y, Ni R, Li X. Contrast enhancement-based forensics in digital images[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(3):515-525.
[6] Fan Z, De Queiroz R L. Identification of bitmap compression history:JPEG detection and quantizer estimation[J]. IEEE Transactions on Image Processing, 2003, 12(2):230-235.
[7] Luo W, Qu Z, Huang J, Qiu G. A novel method for detecting cropped and recompressed image block[C]//2007 IEEE International Conference on Acoustics, Speech and Signal Processing-ICASSP'07, 2007(2):Ⅱ-217-Ⅱ-220.
[8] Farid H. Exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(1):154-160.
[9] Huang F, Huang J, Shi Y Q. Detecting double JPEG compression with the same quantization matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):848-856.
[10] Luo W, Huang J, Qiu G. JPEG error analysis and its applications to digital image forensics[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3):480-491.
[11] Kirchner M, Fridrich J. On detection of median filtering in digital images[C]//SPIE Proceeding of Electronic Imaging, Media Forensics and Security Ⅱ, 2010, 7541(1):1-12.
[12] Chen C, Ni J, Huang R, Huang J. Blind median filtering detection using statistics in difference domain[C]//International Workshop on Information Hiding. Springer Berlin Heidelberg, 2012:1-15.
[13] Kang X, Stamm M C, Peng A, Liu K R. Robust median filtering forensics using an autoregressive model[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(9):1456-1468.
[14] Zhang Y, Li S, Wang S, Shi Y Q. Revealing the traces of median filtering using high-order local ternary patterns[J]. IEEE Signal Processing Letters, 2014, 21(3):275-279.
[15] Chen J, Kang X, Liu Y, Wang Z J. Median filtering forensics based on convolutional neural networks[J]. IEEE Signal Processing Letters, 2015, 22(11):1849-1853.
[16] Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling[J]. IEEE Transactions on Signal Processing, 2005, 53(2):758-767.
[17] Barni M, Fontani M, Tondi B. A universal attack against histogram-based image forensics[J]. International Journal of Digital Crime and Forensics (IJDCF), 2013, 5(3):35-52.
[18] Ravi H, Subramanyam A V, Emmanuel S. ACE-an effective anti-forensic contrast enhancement technique[J]. IEEE Signal Processing Letters, 2016, 23(2):212-216.
[19] Lecun Y, Bottou L, Bengio Y, Haffner P. Gradient-based learning applied to document recognition[J]. Proceedings of the IEEE, 1998, 86(11):2278-2324.
[20] Lawrence S, Giles C L, Tsoi A C, Back A D. Face recognition:a convolutional neural-network approach[J]. IEEE Transactions on Neural Networks, 1997, 8(1):98-113.
[21] Wang P, Xu J, Xu B, Liu C L, Zhang H, Wang F, Hao H. Semantic clustering and convolutional neural network for short text categorization[C]//Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing. 2015(2):352-357.
[22] Hinton G E, Srivastava N, Krizhevsky A, Sutskever I, Salakhutdinov R R. Improving neural networks by preventing co-adaptation of feature detectors[J]. Computer Science, 2012, 3(4):212-223.
[23] Bas P, Filler T, Pevný T. "Break our steganographic system":the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding. Springer Berlin Heidelberg, 2011:59-70.
[24] Code[Online]. Available:http://iapp.dinfo.unifi.it/index.php?page=source-codeen.
[25] Jia Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick R, Darrell T. Caffe:convolutional architecture for fast feature embedding[C]//Proceedings of the 22nd ACM International Conference on Multimedia. ACM, 2014:675-678.

文章导航

/