Skip to main content

Xception-Based General Forensic Method on Small-Size Images

  • Conference paper
  • First Online:
Advances in Intelligent Information Hiding and Multimedia Signal Processing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 157))

Abstract

Developing universal forensic methods that can simultaneously identify multiple image operations to identify the authenticity and processing history of an image has attracted more and more attention. Although numerous forensics tools and methods emerge to detect the traces left by various image operations, the accuracy with current techniques still decreased significantly as the size of the investigated images reduced. To overcome this issue, especially for small-size or highly compressed images, we propose a method using Xception-based convolution neural network. While CNNs-based methods are able to learn features directly from data for classification task, they are not well suited for forensic problems directly in their original form. Hence, we have added magnified layer in the preprocessing layer. The input images are magnified by the nearest neighbor interpolation algorithm in the magnified layer, which can preserve the property of image operations better than other magnified tools, and then input them into the CNN model for classification. Finally, we get adaptive average pooling function from global average pooling to adapt to any size of input pictures. We evaluate the proposed strategy on six typical image processing operations. Through a series of experiments, we show that this approach can significantly improve classification accuracy to 97.71% when the images are of size 64 × 64. More importantly, it outperforms all the existing general purpose manipulation forensic methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stamm, M.C., Wu, M., Liu, K.J.R.: Information forensics: an overview of the first decade. IEEE Access 1, 167–200 (2013)

    Article  Google Scholar 

  2. Li, H., Luo, W., Qiu, X., Huang, J.: Identification of various image operations using residual-based features. IEEE Trans. Circuits Syst. Video Technol. 1–1 (2016)

    Google Scholar 

  3. Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2011)

    Article  Google Scholar 

  4. Bayar, B., Stamm, M.C.: Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans. Inf. Forensics Secur. 1–1 (2018)

    Google Scholar 

  5. Tang, H., Ni, R., Zhao, Y., Li, X.: Detection of various image operations based on CNN. In: Asia-Pacific Signal and Information Processing Association Summit and Conference, pp. 1479–1485 (2017)

    Google Scholar 

  6. Chen, X., Peng, X., Li, J., Peng, Y.: Overview of deep kernel learning based techniques and applications. J. Netw. Intell. 1(3), 83–98 (2016)

    Google Scholar 

  7. Xia, Y., Hu, R.: Fuzzy neural network based energy efficiencies control in the heating energy supply system responding to the changes of user demands. J. Netw. Intell. 2(2), 186–194 (2017)

    MathSciNet  Google Scholar 

  8. Chollet, F.: Xception: Deep Learning with Depthwise Separable Convolutions, pp. 1800–1807 (2016)

    Google Scholar 

  9. Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700–4708 (2017)

    Google Scholar 

  10. He, K., Zhang, X., Ren, S., Sun, J.: Deep Residual Learning for Image Recognition (2015)

    Google Scholar 

  11. Xie, S., Girshick, R., Dollár, P., Tu, Z., He, K.: Aggregated residual transformations for deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1492–1500 (2017)

    Google Scholar 

  12. Tang, H., Ni, R., Zhao, Y., Li, X.: Median filtering detection of small-size image based on CNN. J. Vis. Commun. Image Represent. 51, 162–168 (2018)

    Article  Google Scholar 

  13. Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: International Workshop on Information Hiding, pp. 59–70. Springer, Berlin, Heidelberg (2011)

    Chapter  Google Scholar 

  14. Schaefer, G., Stich, M.: UCID: an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472–481. International Society for Optics and Photonics (2004)

    Google Scholar 

  15. http://photogallery.nrcs.usda.gov

  16. Luo, W., Huang, J., Qiu, G.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3), 480–491 (2010)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Key Research and Development of China (2018YFC0807306), National NSF of China (61672090, 61532005), and Fundamental Research Funds for the Central Universities (2018JBZ001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rongrong Ni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, L., Yang, P., Ni, R., Zhao, Y. (2020). Xception-Based General Forensic Method on Small-Size Images. In: Pan, JS., Li, J., Tsai, PW., Jain, L. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 157. Springer, Singapore. https://doi.org/10.1007/978-981-13-9710-3_38

Download citation

Publish with us

Policies and ethics