Dual-decoding branch contrastive augmentation for image manipulation localization

IF 7.2 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Qiang Zeng, Hongxia Wang, Yang Zhou, Rui Zhang
{"title":"Dual-decoding branch contrastive augmentation for image manipulation localization","authors":"Qiang Zeng,&nbsp;Hongxia Wang,&nbsp;Yang Zhou,&nbsp;Rui Zhang","doi":"10.1016/j.knosys.2024.112776","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid development of image editing techniques, forensic analysis to detect malicious image manipulation has become an important research topic. The current image manipulation detection and localization methods can accommodate diverse forms of tampering. However, their approach to handling various tampering detection types is limited to a uniform regression pathway. This approach fails to recognize the unique characteristics of copy-move tampering, which is significantly different from other tampering types. Employing a generic detection methodology indiscriminately poses the risk of confusing the training regression trajectory of the deep learning models. To mitigate this challenge, this paper introduces a novel framework featuring a dual-decoding branch structure specifically designed to augment features pertinent to copy-move tampering types. Moreover, it facilitates the detection of tampered regions, irrespective of the tampering type, within the main branch. To achieve this goal, we first introduce a contrastive augmentation module in the encoder, which maximizes the feature space distance between the manipulation regions and pristine regions. Next, we design a parallel attention module to extract more diverse multiscale features. Moreover, we introduce a constrained shifted-window dual attention module to extract tampering noise features. In the decoder, we design a dual-decoding branch to capture both the homologous and tampering features, and we employ contrastive learning to minimize the feature space distance of the homologous regions for copy-move manipulation detection. Finally, we design a category normalization loss function to balance the model’s attention across each category. Extensive experiments demonstrate that the proposed approach achieves state-of-the-art performance on various benchmark datasets.</div></div>","PeriodicalId":49939,"journal":{"name":"Knowledge-Based Systems","volume":"309 ","pages":"Article 112776"},"PeriodicalIF":7.2000,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Knowledge-Based Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0950705124014102","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

With the rapid development of image editing techniques, forensic analysis to detect malicious image manipulation has become an important research topic. The current image manipulation detection and localization methods can accommodate diverse forms of tampering. However, their approach to handling various tampering detection types is limited to a uniform regression pathway. This approach fails to recognize the unique characteristics of copy-move tampering, which is significantly different from other tampering types. Employing a generic detection methodology indiscriminately poses the risk of confusing the training regression trajectory of the deep learning models. To mitigate this challenge, this paper introduces a novel framework featuring a dual-decoding branch structure specifically designed to augment features pertinent to copy-move tampering types. Moreover, it facilitates the detection of tampered regions, irrespective of the tampering type, within the main branch. To achieve this goal, we first introduce a contrastive augmentation module in the encoder, which maximizes the feature space distance between the manipulation regions and pristine regions. Next, we design a parallel attention module to extract more diverse multiscale features. Moreover, we introduce a constrained shifted-window dual attention module to extract tampering noise features. In the decoder, we design a dual-decoding branch to capture both the homologous and tampering features, and we employ contrastive learning to minimize the feature space distance of the homologous regions for copy-move manipulation detection. Finally, we design a category normalization loss function to balance the model’s attention across each category. Extensive experiments demonstrate that the proposed approach achieves state-of-the-art performance on various benchmark datasets.
求助全文
约1分钟内获得全文 求助全文
来源期刊
Knowledge-Based Systems
Knowledge-Based Systems 工程技术-计算机:人工智能
CiteScore
14.80
自引率
12.50%
发文量
1245
审稿时长
7.8 months
期刊介绍: Knowledge-Based Systems, an international and interdisciplinary journal in artificial intelligence, publishes original, innovative, and creative research results in the field. It focuses on knowledge-based and other artificial intelligence techniques-based systems. The journal aims to support human prediction and decision-making through data science and computation techniques, provide a balanced coverage of theory and practical study, and encourage the development and implementation of knowledge-based intelligence models, methods, systems, and software tools. Applications in business, government, education, engineering, and healthcare are emphasized.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信