Literature DB >> 30703026

Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries.

Jawadul H Bappy, Cody Simons, Lakshmanan Nataraj, B S Manjunath, Amit K Roy-Chowdhury.   

Abstract

With advanced image journaling tools, one can easily alter the semantic meaning of an image by exploiting certain manipulation techniques such as copy clone, object splicing, and removal, which mislead the viewers. In contrast, the identification of these manipulations becomes a very challenging task as manipulated regions are not visually apparent. This paper proposes a high-confidence manipulation localization architecture that utilizes resampling features, long short-term memory (LSTM) cells, and an encoder-decoder network to segment out manipulated regions from non-manipulated ones. Resampling features are used to capture artifacts, such as JPEG quality loss, upsampling, downsampling, rotation, and shearing. The proposed network exploits larger receptive fields (spatial maps) and frequency-domain correlation to analyze the discriminative characteristics between the manipulated and non-manipulated regions by incorporating the encoder and LSTM network. Finally, the decoder network learns the mapping from low-resolution feature maps to pixel-wise predictions for image tamper localization. With the predicted mask provided by the final layer (softmax) of the proposed architecture, end-to-end training is performed to learn the network parameters through back-propagation using the ground-truth masks. Furthermore, a large image splicing dataset is introduced to guide the training process. The proposed method is capable of localizing image manipulations at the pixel level with high precision, which is demonstrated through rigorous experimentation on three diverse datasets.

Year:  2019        PMID: 30703026     DOI: 10.1109/TIP.2019.2895466

Source DB:  PubMed          Journal:  IEEE Trans Image Process        ISSN: 1057-7149            Impact factor:   10.856


  5 in total

1.  Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation.

Authors:  Preeti Sharma; Manoj Kumar; Hitesh Sharma
Journal:  Multimed Tools Appl       Date:  2022-10-01       Impact factor: 2.577

2.  Optimization of College English Classroom Teaching Efficiency by Deep Learning SDD Algorithm.

Authors:  Wei Zhang; Qian Xu
Journal:  Comput Intell Neurosci       Date:  2022-01-21

3.  An Algorithm for Time Prediction Signal Interference Detection Based on the LSTM-SVM Model.

Authors:  Ningbo Xiao; Zuxun Song
Journal:  Comput Intell Neurosci       Date:  2022-03-11

4.  Image copy-move forgery detection and localization based on super-BPD segmentation and DCNN.

Authors:  Qianwen Li; Chengyou Wang; Xiao Zhou; Zhiliang Qin
Journal:  Sci Rep       Date:  2022-09-02       Impact factor: 4.996

5.  ALICE: a hybrid AI paradigm with enhanced connectivity and cybersecurity for a serendipitous encounter with circulating hybrid cells.

Authors:  Kok Suen Cheng; Rongbin Pan; Huaping Pan; Binglin Li; Stephene Shadrack Meena; Huan Xing; Ying Jing Ng; Kaili Qin; Xuan Liao; Benson Kiprono Kosgei; Zhipeng Wang; Ray P S Han
Journal:  Theranostics       Date:  2020-09-02       Impact factor: 11.556

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.