Contrast Enhancement Forensics Based on Modified Convolutional Neural Network
Received date: 2017-01-19
Revised date: 2017-03-30
Online published: 2017-11-30
Contrast enhancement forensics has drawn much attention in image forensics recently. This paper proposes a modified convolutional neural network (MCNN). The first layer in the MCNN is a preprocessing layer, which converts an input image to a binary gray-level co-occurrence matrix (BGLCM). The other layers are the same with conventional CNN, which learn features from BGLCM for classification. Compared with previous methods, feature extraction and classification can be optimized simultaneously, making the extracted features more suitable for contrast enhancement detection. Experimental results show that the proposed method can detect contrast enhanced images produced by conventional contrast enhancement and two anti-forensic techniques. It can also distinguish parameters used in the contrast enhancement.
DONG Wei, WANG Jian-jun . Contrast Enhancement Forensics Based on Modified Convolutional Neural Network[J]. Journal of Applied Sciences, 2017 , 35(6) : 745 -753 . DOI: 10.3969/j.issn.0255-8297.2017.06.008
[1] De Rosa A, Fontani M, Massai M, Piva A, Barni M. Second-order statistics analysis to cope with contrast enhancement counter-forensics[J]. IEEE Signal Processing Letters, 2015, 22(8):1132-1136.
[2] Stamm M, Liu K J R. Blind forensics of contrast enhancement in digital images[C]//200815th IEEE International Conference on Image Processing, 2008:3112-3115.
[3] Cao G, Zhao Y, Ni R, Forensic estimation of gamma correction in digital images[C]//IEEE International Conference on Image Processing, 2010:2097-2100.
[4] Lin X, Li C T, Hu Y. Exposing image forgery through the detection of contrast enhancement[C]//2013 IEEE International Conference on Image Processing, 2013:4467-4471.
[5] Cao G, Zhao Y, Ni R, Li X. Contrast enhancement-based forensics in digital images[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(3):515-525.
[6] Fan Z, De Queiroz R L. Identification of bitmap compression history:JPEG detection and quantizer estimation[J]. IEEE Transactions on Image Processing, 2003, 12(2):230-235.
[7] Luo W, Qu Z, Huang J, Qiu G. A novel method for detecting cropped and recompressed image block[C]//2007 IEEE International Conference on Acoustics, Speech and Signal Processing-ICASSP'07, 2007(2):Ⅱ-217-Ⅱ-220.
[8] Farid H. Exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(1):154-160.
[9] Huang F, Huang J, Shi Y Q. Detecting double JPEG compression with the same quantization matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):848-856.
[10] Luo W, Huang J, Qiu G. JPEG error analysis and its applications to digital image forensics[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3):480-491.
[11] Kirchner M, Fridrich J. On detection of median filtering in digital images[C]//SPIE Proceeding of Electronic Imaging, Media Forensics and Security Ⅱ, 2010, 7541(1):1-12.
[12] Chen C, Ni J, Huang R, Huang J. Blind median filtering detection using statistics in difference domain[C]//International Workshop on Information Hiding. Springer Berlin Heidelberg, 2012:1-15.
[13] Kang X, Stamm M C, Peng A, Liu K R. Robust median filtering forensics using an autoregressive model[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(9):1456-1468.
[14] Zhang Y, Li S, Wang S, Shi Y Q. Revealing the traces of median filtering using high-order local ternary patterns[J]. IEEE Signal Processing Letters, 2014, 21(3):275-279.
[15] Chen J, Kang X, Liu Y, Wang Z J. Median filtering forensics based on convolutional neural networks[J]. IEEE Signal Processing Letters, 2015, 22(11):1849-1853.
[16] Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling[J]. IEEE Transactions on Signal Processing, 2005, 53(2):758-767.
[17] Barni M, Fontani M, Tondi B. A universal attack against histogram-based image forensics[J]. International Journal of Digital Crime and Forensics (IJDCF), 2013, 5(3):35-52.
[18] Ravi H, Subramanyam A V, Emmanuel S. ACE-an effective anti-forensic contrast enhancement technique[J]. IEEE Signal Processing Letters, 2016, 23(2):212-216.
[19] Lecun Y, Bottou L, Bengio Y, Haffner P. Gradient-based learning applied to document recognition[J]. Proceedings of the IEEE, 1998, 86(11):2278-2324.
[20] Lawrence S, Giles C L, Tsoi A C, Back A D. Face recognition:a convolutional neural-network approach[J]. IEEE Transactions on Neural Networks, 1997, 8(1):98-113.
[21] Wang P, Xu J, Xu B, Liu C L, Zhang H, Wang F, Hao H. Semantic clustering and convolutional neural network for short text categorization[C]//Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing. 2015(2):352-357.
[22] Hinton G E, Srivastava N, Krizhevsky A, Sutskever I, Salakhutdinov R R. Improving neural networks by preventing co-adaptation of feature detectors[J]. Computer Science, 2012, 3(4):212-223.
[23] Bas P, Filler T, Pevný T. "Break our steganographic system":the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding. Springer Berlin Heidelberg, 2011:59-70.
[24] Code[Online]. Available:http://iapp.dinfo.unifi.it/index.php?page=source-codeen.
[25] Jia Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick R, Darrell T. Caffe:convolutional architecture for fast feature embedding[C]//Proceedings of the 22nd ACM International Conference on Multimedia. ACM, 2014:675-678.
/
| 〈 |
|
〉 |