Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security 2017
DOI: 10.1145/3082031.3083247
|View full text |Cite
|
Sign up to set email alerts
|

Recasting Residual-based Local Descriptors as Convolutional Neural Networks

Abstract: Local descriptors based on the image noise residual have proven extremely effective for a number of forensic applications, like forgery detection and localization. Nonetheless, motivated by promising results in computer vision, the focus of the research community is now shifting on deep learning. In this paper we show that a class of residual-based descriptors can be actually regarded as a simple constrained convolutional neural network (CNN). Then, by relaxing the constraints, and fine-tuning the net on a rel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
167
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 322 publications
(168 citation statements)
references
References 28 publications
0
167
0
1
Order By: Relevance
“…In particular, for the network proposed in Cozzolino at al. [17] the used learning-rate is 10 −5 with batch-size 16. For the proposal of Bayar and Stamm [10], we use a learning-rate equal to 10 −5 with a batch-size of 64.…”
Section: D2 Classification Methodsmentioning
confidence: 99%
“…In particular, for the network proposed in Cozzolino at al. [17] the used learning-rate is 10 −5 with batch-size 16. For the proposal of Bayar and Stamm [10], we use a learning-rate equal to 10 −5 with a batch-size of 64.…”
Section: D2 Classification Methodsmentioning
confidence: 99%
“…While recent state-of-the-art visual forensics techniques demonstrate impressive results for detecting fake visual media [16,53,27,13,22,11,35,67,68,26], they have only focused on semantic, physical, or statistical inconsistency of specific forgery scenarios, e.g., copy-move manipulations [16,26] or face swapping [67]. Forensics on GAN-generated images [44,47,59] shows good accuracy, but each method operates on only one GAN architecture by identifying its unique artifacts and results deteriorate when the GAN architecture is changed.…”
Section: Introductionmentioning
confidence: 99%
“…To detect GAN images, we compute co-occurrence matrices on the RGB channels of an image. Co-occurrence matrices have been previously used in steganalysis to identify images that have data hidden in them [5,6,7,8] and in image forensics to detect or localize tampered images [50,9]. In prior works, cooccurrence matrices are usually computed on image residuals by passing the image through many filters and then obtaining the difference.…”
Section: Methodsmentioning
confidence: 99%
“…Here the authors compare various existing methods to identify cycleGAN images from normal ones. The top results they obtained using a combination of residual features [50,9] and deep learning [51]. Similar to [36], the authors in [38] compute the residuals of high pass filtered images and then extract co-occurrence matrices on these residuals, which are then concatenated to form a feature vector that can distinguish real from fake GAN images.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation