2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021
DOI: 10.1109/iccv48922.2021.01392
|View full text |Cite
|
Sign up to set email alerts
|

Image Manipulation Detection by Multi-View Multi-Scale Supervision

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
49
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 147 publications
(49 citation statements)
references
References 20 publications
0
49
0
Order By: Relevance
“…Moreover, most forgery detection methods focus on identifying a specific tampering type, such as copy‐move 18,22 and splicing 23,24 . To solve these problems, some general works 25–29 begin to study the suppression of image content. Image content suppression means that the network can learn the discrepancy between tampered and non‐tampered regions based on obtaining appropriate semantic information, and then precisely locate the manipulated regions to prevent false localization of candidate regions.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, most forgery detection methods focus on identifying a specific tampering type, such as copy‐move 18,22 and splicing 23,24 . To solve these problems, some general works 25–29 begin to study the suppression of image content. Image content suppression means that the network can learn the discrepancy between tampered and non‐tampered regions based on obtaining appropriate semantic information, and then precisely locate the manipulated regions to prevent false localization of candidate regions.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, GSR‐Net 35 proposes a boundary branch to reconstruct the edges of the region. MVSS‐Net 28 adopts a combination of the boundary branch and a noise view to localize the tamper regions. However, these methods pre‐localize the manipulated regions with the entire image or a bounding box, that inevitably comprises authentic regions hence causes false alarms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A preliminary version of this work was published at ICCV 2021 [27]. The journal article improves over the conference paper in multiple aspects.…”
Section: Introductionmentioning
confidence: 99%
“…The journal article improves over the conference paper in multiple aspects. First, for converting pixel-level manipulation detection to an image-level prediction, we propose ConvGeM to replace global max pooling (GMP) used in [27]. The new module effectively overcomes two downsides of GMP, i.e.…”
Section: Introductionmentioning
confidence: 99%