网络与信息安全学报 ›› 2024, Vol. 10 ›› Issue (1): 33-47.doi: 10.11959/j.issn.2096-109x.2024010

• 学术论文 • 上一篇    

基于强化样本的伪孪生网络图像篡改定位模型

王金伟1,2,3,4, 张子荷1,2,3, 罗向阳4,5, 马宾6   

  1. 1 南京信息工程大学数字取证教育部工程研究中心,江苏 南京210044
    2 南京信息工程大学计算机学院,江苏 南京210044
    3 南京信息工程大学网络空间安全学院,江苏 南京210044
    4 数字工程与先进计算国家重点实验室,河南 郑州450001
    5 信息工程大学,河南 郑州 450001
    6 齐鲁工业大学网络空间安全学院,山东 济南 250353
  • 修回日期:2023-11-08 出版日期:2024-02-01 发布日期:2024-02-01
  • 作者简介:王金伟(1978− ),男,内蒙古呼伦贝尔人,南京信息工程大学教授、博士生导师,主要研究方向为人工智能安全、多媒体取证和信息隐藏
    张子荷(1999− ),女,河北廊坊人,南京信息工程大学硕士生,主要研究方向为信息安全、多媒体取证
    罗向阳(1978− ),男,湖北荆门人,信息工程大学教授、博士生导师,主要研究方向为图像隐写、隐写分析技术
    马宾(1973− ),男,山东济宁人,齐鲁工业大学教授、博士生导师,主要研究方向为可逆信息隐藏、多媒体取证、隐写与隐写分析
  • 基金资助:
    国家自然科学基金(62072250);国家自然科学基金(62172435);国家自然科学基金(U1804263);国家自然科学基金(U20B2065)

Pseudo-siamese network image tampering localization model based on reinforced samples

Jinwei WANG1,2,3,4, Zihe ZHANG1,2,3, Xiangyang LUO4,5, Bin MA6   

  1. 1 Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
    2 Department of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China
    3 Department of Cyberspace Security, Nanjing University of Information Science and Technology, Nanjing 210044, China
    4 State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
    5 Force Information Engineering University, Zhengzhou 450001, China
    6 School of Cyberspace Security, Qilu University of Technology, Jinan 250353, China
  • Revised:2023-11-08 Online:2024-02-01 Published:2024-02-01
  • Supported by:
    The National Natural Science Foundation of China(62072250);The National Natural Science Foundation of China(62172435);The National Natural Science Foundation of China(U1804263);The National Natural Science Foundation of China(U20B2065)

摘要:

随着互联网不断发展,网络上的篡改图像越来越多,掩盖篡改痕迹的手段越来越丰富。而现在大多数检测模型没有考虑到图像后处理操作对篡改检测算法的影响,限制了其在实际生活中的应用。为了解决上述问题,提出了一种通用的基于强化样本的伪孪生网络图像篡改定位模型。所提模型利用伪孪生网络,一方面学习真实图像中的篡改特征;另一方面通过约束卷积,抑制图像内容,从而能够更加关注篡改残留的痕迹信息。网络的两分支结构可以达到充分利用图像特征信息的目的。模型利用强化样本,可以自适应地生成当前最需要学习的篡改类型图片,实现对模型有针对性地训练,使得模型在各个方向上学习收敛,最终得到全局最优模型。利用数据增强思路,自动生成丰富的篡改图像以及其对应的掩膜,这很好地解决了篡改数据集有限的问题。在 4 个数据集上的大量实验证明了所提模型在像素级操作检测方面的可行性和有效性。尤其是在Columbia数据集上,算法的F1值提高了33.5%,Matthews correlation coefficirnt(MCC)得分提高了 23.3%,说明所提模型利用深度学习模型的优点,显著提高了篡改定位的检测效果。

关键词: 强化样本, 篡改定位, 伪孪生网络, 数据增强, 篡改图像

Abstract:

With the continuous development of the internet, an increasing number of images have been tampered with on the network, accompanied by a growing range of techniques to cover up tampering traces.However, most current detection models neglect the impact of image post-processing on tamper detection algorithms, limiting their real-life applications.To address these issues, a general image tampering location model based on enhanced samples and the pseudo-twin network was proposed.The pseudo-twin network enabled the model to learn tampering features in real images.On one hand, by applying convolution constraints, the image content was suppressed, allowing the model to focus more on residual trace information of tampering.The two-branch structure of the network facilitated the comprehensive utilization of image feature information.By utilizing enhanced samples, the model could dynamically generate the most crucial pictures for learning tamper types, enabling targeted training of the model.This approach ensured that the model converged in all directions, ultimately obtaining the global optimal model.The idea of data enhancement was employed to automatically generate abundant tampered images and corresponding masks, effectively resolving the limited tampering dataset issue.Extensive experiments were conducted on four datasets, demonstrating the feasibility and effectiveness of the proposed model in pixel-level tamper detection.Particularly on the Columbia dataset, the algorithm achieves a 33.5% increase in F1 score and a 23.3% increase in MCC score.These results indicate that the proposed model harnesses the advantages of deep learning models and significantly improves the effectiveness of tamper location detection.

Key words: enhanced sample, tampering positioning, pseudo-siamese network, data augmentation, tampering image

中图分类号: 

No Suggested Reading articles found!