Skip to main content
Top
Published in: Multimedia Systems 5/2023

26-02-2022 | Special Issue Paper

RB-Net: integrating region and boundary features for image manipulation localization

Authors: Dengyun Xu, Xuanjing Shen, Yongping Huang, Zenan Shi

Published in: Multimedia Systems | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Current research on image tampering localization focuses on finding region features that distinguish manipulated pixels from non-manipulated pixels. As tampering with a specific area of a given image inevitably leaves cues in the boundary between the tampered region and its surroundings, how to utilize sufficient region and boundary features also matters for image manipulation localization. In this paper, we propose a unified network (called RB-Net), which is a two-branch network (i.e., region module and boundary module) to learn region and boundary features separately. Then the fusion module is implemented to integrate the region features from the region module and the edge features from the boundary module, respectively. Particularly, to identify unnatural boundary traces, we propose edge gate components deployed on different layers of the region module to activate manipulated boundary information from the rich region features. Quantitative and qualitative experiments on four benchmark datasets demonstrate that RB-Net can accurately locate the tampered regions and achieve the best results relative to other state-of-the-art methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhang, J., Wang, M., Lin, L., Yang, X., Gao, J., Rui, Y.: Saliency detection on light field: a multi-cue approach. Trans. Multimed. Comput. Commun. Appl. 13(3), 1–22 (2017)CrossRef Zhang, J., Wang, M., Lin, L., Yang, X., Gao, J., Rui, Y.: Saliency detection on light field: a multi-cue approach. Trans. Multimed. Comput. Commun. Appl. 13(3), 1–22 (2017)CrossRef
2.
go back to reference Du, X., Yang, X., Qin, Z., Tang, J.: Progressive image enhancement under aesthetic guidance. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 349–353 (2019) Du, X., Yang, X., Qin, Z., Tang, J.: Progressive image enhancement under aesthetic guidance. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 349–353 (2019)
3.
go back to reference Liu, X., Yang, X., Wang, M., Hong, R.: Deep neighborhood component analysis for visual similarity modeling. ACM Trans. Intell. Syst. Technol. (TIST) 11(3), 1–15 (2020) Liu, X., Yang, X., Wang, M., Hong, R.: Deep neighborhood component analysis for visual similarity modeling. ACM Trans. Intell. Syst. Technol. (TIST) 11(3), 1–15 (2020)
4.
go back to reference Meng, L., Chen, L., Yang, X., Tao, D., Zhang, H., Miao, C., Chua, T-S.: Learning using privileged information for food recognition. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 557–565 (2019) Meng, L., Chen, L., Yang, X., Tao, D., Zhang, H., Miao, C., Chua, T-S.: Learning using privileged information for food recognition. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 557–565 (2019)
5.
go back to reference Yang, X., Zhou, P., Wang, M.: Person reidentification via structural deep metric learning. IEEE Trans. Neural Netw. Learn. Syst. 30(10), 2987–2998 (2019)CrossRef Yang, X., Zhou, P., Wang, M.: Person reidentification via structural deep metric learning. IEEE Trans. Neural Netw. Learn. Syst. 30(10), 2987–2998 (2019)CrossRef
6.
go back to reference Yang, X., Feng, F., Ji, W., Wang, M., Chua, T-S.: Deconfounded video moment retrieval with causal intervention. In: The 44th International Conference on Research and Development in Information Retrieval (SIGIR), pp. 1–10 (2021) Yang, X., Feng, F., Ji, W., Wang, M., Chua, T-S.: Deconfounded video moment retrieval with causal intervention. In: The 44th International Conference on Research and Development in Information Retrieval (SIGIR), pp. 1–10 (2021)
7.
go back to reference Ryu, S.-J., Lee, H.-K.: Estimation of linear transformation by analyzing the periodicity of interpolation. Pattern Recognit. Lett. 36(1), 89–99 (2014)CrossRef Ryu, S.-J., Lee, H.-K.: Estimation of linear transformation by analyzing the periodicity of interpolation. Pattern Recognit. Lett. 36(1), 89–99 (2014)CrossRef
8.
go back to reference Kwon, Y., Kim, K.I., Tompkin, J., Kim, J.H., Theobalt, C.: Efficient learning of image superresolution and compression artifact removal with semi-local Gaussian processes. IEEE Trans. Pattern Anal. Mach. Intell. 37(9), 1792–1805 (2015)CrossRef Kwon, Y., Kim, K.I., Tompkin, J., Kim, J.H., Theobalt, C.: Efficient learning of image superresolution and compression artifact removal with semi-local Gaussian processes. IEEE Trans. Pattern Anal. Mach. Intell. 37(9), 1792–1805 (2015)CrossRef
9.
go back to reference Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)CrossRef Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)CrossRef
10.
go back to reference Wu, Y., Abd-Almageed, W., Natarajan, P.: Busternet: Detecting copy-move image forgery with source/target localization. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 168–184 (2018) Wu, Y., Abd-Almageed, W., Natarajan, P.: Busternet: Detecting copy-move image forgery with source/target localization. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 168–184 (2018)
12.
go back to reference Manu, V., Mehtre, B.: Visual artifacts based image splicing detection in uncompressed images. In: IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS) (2015) Manu, V., Mehtre, B.: Visual artifacts based image splicing detection in uncompressed images. In: IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS) (2015)
13.
go back to reference Cun, X., Pun, C.-M.: Image splicing localization via semi-global network and fully connected conditional random fields. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 252–266 (2018) Cun, X., Pun, C.-M.: Image splicing localization via semi-global network and fully connected conditional random fields. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 252–266 (2018)
14.
go back to reference Liang, Z., Yang, G., Ding, X., Li, L.: An efficient forgery detection algorithm for object removal by exemplar-based image inpainting. J. Vis. Commun. Image Represent. 30, 75–85 (2015)CrossRef Liang, Z., Yang, G., Ding, X., Li, L.: An efficient forgery detection algorithm for object removal by exemplar-based image inpainting. J. Vis. Commun. Image Represent. 30, 75–85 (2015)CrossRef
16.
go back to reference Shi, Z., Shen, X., Kang, H., Lyu, Y.: Image manipulation detection and localization based on the dual-domain convolutional neural networks. IEEE J. Transl. Eng. Health Med. 6, 76437–76453 (2018) Shi, Z., Shen, X., Kang, H., Lyu, Y.: Image manipulation detection and localization based on the dual-domain convolutional neural networks. IEEE J. Transl. Eng. Health Med. 6, 76437–76453 (2018)
18.
go back to reference Chen, H., Chang, C., Shi, Z., Lyu, Y.: Hybrid features and semantic reinforcement network for image forgery detection. Multimed. Syst. 11, 1–12 (2021) Chen, H., Chang, C., Shi, Z., Lyu, Y.: Hybrid features and semantic reinforcement network for image forgery detection. Multimed. Syst. 11, 1–12 (2021)
20.
go back to reference Wu, Y., AbdAlmageed, W., Natarajan, P.: Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9543–9552 (2019).https://doi.org/10.1109/CVPR.2019.00977 Wu, Y., AbdAlmageed, W., Natarajan, P.: Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9543–9552 (2019).https://​doi.​org/​10.​1109/​CVPR.​2019.​00977
21.
go back to reference Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: Spatial pyramid attention network for image manipulation localization. In: Proceedings of the European Conference on Computer Vision (ECCV) (2020) Hu, X., Zhang, Z., Jiang, Z., Chaudhuri, S., Yang, Z., Nevatia, R.: SPAN: Spatial pyramid attention network for image manipulation localization. In: Proceedings of the European Conference on Computer Vision (ECCV) (2020)
23.
go back to reference Mazaheri, G., Mithun, N.C., Bappy, J.H., Roy-Chowdhury, A.K.: A skip connection architecture for localization of image manipulations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 119-129 (2019) Mazaheri, G., Mithun, N.C., Bappy, J.H., Roy-Chowdhury, A.K.: A skip connection architecture for localization of image manipulations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 119-129 (2019)
25.
go back to reference Zhou, P., Chen, B., Han, X., Najibi, M., Davis, L.: Generate, segment, and refine: towards generic manipulation segmentation. In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), vol. 34 (7), pp. 13058–13065 (2020) Zhou, P., Chen, B., Han, X., Najibi, M., Davis, L.: Generate, segment, and refine: towards generic manipulation segmentation. In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), vol. 34 (7), pp. 13058–13065 (2020)
26.
go back to reference Salloum, R., Ren, Y., Kuo, C.-C.J.: Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201–209 (2017)CrossRef Salloum, R., Ren, Y., Kuo, C.-C.J.: Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51, 201–209 (2017)CrossRef
29.
go back to reference Liu, B., Pun, C.-M.: Deep fusion network for splicing forgery localization. In: Proceedings of the European Conference on Computer Vision (ECCV) (2018) Liu, B., Pun, C.-M.: Deep fusion network for splicing forgery localization. In: Proceedings of the European Conference on Computer Vision (ECCV) (2018)
31.
go back to reference Zhong, J., Pun, C.: An end-to-end dense-InceptionNet for image copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 15, 2134–2146 (2020)CrossRef Zhong, J., Pun, C.: An end-to-end dense-InceptionNet for image copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 15, 2134–2146 (2020)CrossRef
33.
go back to reference Liu, Y., Zhu, X., Zhao, X., Cao, Y.: Adversarial learning for constrained image splicing detection and localization based on atrous convolution. IEEE Trans. Inf. Forensics Secur. 14(10), 2551–2566 (2019)CrossRef Liu, Y., Zhu, X., Zhao, X., Cao, Y.: Adversarial learning for constrained image splicing detection and localization based on atrous convolution. IEEE Trans. Inf. Forensics Secur. 14(10), 2551–2566 (2019)CrossRef
35.
go back to reference Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7132–7141 (2018) Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7132–7141 (2018)
36.
go back to reference Du, X.-Y., Yang, Y., Yang, L., Shen, F.-M., Qin, Z.-G., Tang, J.-H.: Captioning videos using large-scale image corpus. J. Comput. Sci. Technol. 32(3), 480–493 (2017)CrossRef Du, X.-Y., Yang, Y., Yang, L., Shen, F.-M., Qin, Z.-G., Tang, J.-H.: Captioning videos using large-scale image corpus. J. Comput. Sci. Technol. 32(3), 480–493 (2017)CrossRef
37.
go back to reference Zhang, D., Zhang, H., Tang, J., Wang, M., Hua, X., Sun, Q.: Feature pyramid transformer. In: European Conference on Computer Vision (ECCV), pp. 323–339 (2020) Zhang, D., Zhang, H., Tang, J., Wang, M., Hua, X., Sun, Q.: Feature pyramid transformer. In: European Conference on Computer Vision (ECCV), pp. 323–339 (2020)
38.
go back to reference Tan, Y., Hao, Y., He, X., Wei, Y., Yang, X.: Selective dependency aggregation for action classification. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 592–601 (2021) Tan, Y., Hao, Y., He, X., Wei, Y., Yang, X.: Selective dependency aggregation for action classification. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 592–601 (2021)
39.
go back to reference Yang, X., Liu, X., Jian, M., Gao, X., Wang, M.: Weakly-supervised video object grounding by exploring spatio-temporal contexts. In: The 28th ACM International Conference on Multimedia (ACM), pp. 1939–1947 (2020) Yang, X., Liu, X., Jian, M., Gao, X., Wang, M.: Weakly-supervised video object grounding by exploring spatio-temporal contexts. In: The 28th ACM International Conference on Multimedia (ACM), pp. 1939–1947 (2020)
40.
go back to reference Woo, S., Park, J., Lee, J.Y., Kweon, I.S.: CBAM: convolutional block attention module. Proc. Eur. Conf. Comput. Vis. (ECCV) 7, 3–19 (2018) Woo, S., Park, J., Lee, J.Y., Kweon, I.S.: CBAM: convolutional block attention module. Proc. Eur. Conf. Comput. Vis. (ECCV) 7, 3–19 (2018)
42.
go back to reference Zagoruyko, S., Komodakis, N.: Wide residual networks. In: 27th British Machine Vision Conference (BMVC) (2016) Zagoruyko, S., Komodakis, N.: Wide residual networks. In: 27th British Machine Vision Conference (BMVC) (2016)
43.
go back to reference Chen, L.-C., Zhu, Y., Papandreou, G., Schroff, F., Adam, H.: Encoder–decoder with atrous separable convolution for semantic image segmentation. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 801–818 (2018) Chen, L.-C., Zhu, Y., Papandreou, G., Schroff, F., Adam, H.: Encoder–decoder with atrous separable convolution for semantic image segmentation. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 801–818 (2018)
44.
go back to reference Zimmermann, R., Siems, J.: Faster training of Mask R-CNN by focusing on instance boundaries. Comput. Vis. Image Underst. 188, 102795 (2019)CrossRef Zimmermann, R., Siems, J.: Faster training of Mask R-CNN by focusing on instance boundaries. Comput. Vis. Image Underst. 188, 102795 (2019)CrossRef
48.
go back to reference de Carvalho, T.J., Riess, C., Angelopoulou, E., Pedrini, H., Rocha, A.D.: Exposing digital image forgeries by illumination color classification. IEEE Trans. Inf. Forensics Secur. 8(7), 1182–1194 (2013)CrossRef de Carvalho, T.J., Riess, C., Angelopoulou, E., Pedrini, H., Rocha, A.D.: Exposing digital image forgeries by illumination color classification. IEEE Trans. Inf. Forensics Secur. 8(7), 1182–1194 (2013)CrossRef
49.
go back to reference Paszke, A., Gross, S., Chintala, S., et al.: Automatic differentiation in pytorch (2017) Paszke, A., Gross, S., Chintala, S., et al.: Automatic differentiation in pytorch (2017)
50.
go back to reference Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980, 273–297 (2014) Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:​1412.​6980, 273–297 (2014)
51.
go back to reference Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497–1503 (2009)CrossRef Mahdian, B., Saic, S.: Using noise inconsistencies for blind image forensics. Image Vis. Comput. 27(10), 1497–1503 (2009)CrossRef
52.
go back to reference Ferrara, P., Bianchi, T., Rosa, A.D., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566–1577 (2012)CrossRef Ferrara, P., Bianchi, T., Rosa, A.D., Piva, A.: Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forensics Secur. 7(5), 1566–1577 (2012)CrossRef
53.
go back to reference Krawetz, N., Solutions, H.F.: A picture’s worth. Hacker Factor Solut. 6(2), 1–2 (2007) Krawetz, N., Solutions, H.F.: A picture’s worth. Hacker Factor Solut. 6(2), 1–2 (2007)
Metadata
Title
RB-Net: integrating region and boundary features for image manipulation localization
Authors
Dengyun Xu
Xuanjing Shen
Yongping Huang
Zenan Shi
Publication date
26-02-2022
Publisher
Springer Berlin Heidelberg
Published in
Multimedia Systems / Issue 5/2023
Print ISSN: 0942-4962
Electronic ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-022-00903-z

Other articles of this Issue 5/2023

Multimedia Systems 5/2023 Go to the issue