2018
DOI: 10.1007/978-3-030-01252-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Fighting Fake News: Image Splice Detection via Learned Self-Consistency

Abstract: Fig. 1: Our algorithm learns to detect and localize image manipulations (splices), despite being trained only on unmanipulated images. The two input images above might look plausible, but our model correctly determined that they have been manipulated because they lack self-consistency: the visual information within the predicted splice region was found to be inconsistent with the rest of the image. IMAGE CREDITS: automatically created splice from Hays and Efros [1] (top), manual splice from Reddit user /u/Name… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
266
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 330 publications
(266 citation statements)
references
References 48 publications
0
266
0
Order By: Relevance
“…(1) FaceForensics++ [31]: A network trained on face swapping and reenactment data; we use the Xception [12] model trained on raw video frames. (2) Selfconsistency [15]: A network trained to spot low-level inconsistencies within an image.…”
Section: Baselinesmentioning
confidence: 99%
“…(1) FaceForensics++ [31]: A network trained on face swapping and reenactment data; we use the Xception [12] model trained on raw video frames. (2) Selfconsistency [15]: A network trained to spot low-level inconsistencies within an image.…”
Section: Baselinesmentioning
confidence: 99%
“…We propose to verify the inconsistency of P i and P j by means of a Siamese neural network [9]. Siamese neural networks have been recently exploited for applications in multimedia forensics [10]- [12]. This network architecture consists of two identical sub-networks f θ , followed by a non-linear classifier g γ that outputs an inconsistency score z ij whose standard logistic activation is defined as:…”
Section: Proposed Methodsmentioning
confidence: 99%
“…It is typical to assume that the forged region is relatively small compared to the background, thus majority of I k (k refers to patches on the pristine region) exposes inconsistencies with the forged region, while remaining maps expose inconsistencies with the pristine region, as shown in Figure 3. In order to fuse inconsistency maps of majority patches belonging to the pristine region to obtain a unique map I ∈ R N H ×N W , we follow the approach in [12], computingĪ by mean shift algorithm [17], which iteratively finds mean of majority (mode). Eventually,Ī is a subsampled heatmap which potentially highlights malicious region.…”
Section: A Detection and Localizationmentioning
confidence: 99%
“…A common manipulation is splicing, i.e., cropping and stitching together parts of the same image or multiple different images. We explored an approach that looks for the lack of self-consistency in images and outputs clusters of the predicted image parts using two algorithms: MeanShift and DBSCAN (Huh et al, 2018). An illustration on how it works is shown in Figure 7.…”
Section: What Did Not Workmentioning
confidence: 99%