Optoelectronics Letters, Volume. 20, Issue 5, 307(2024)
Double-branch forgery image detection based on multi-scale feature fusion
[1] [1] RAO Y, NI J. A deep learning approach to detection of splicing and copy-move forgeries in images[C]//2016 IEEE International Workshop on Information Forensics and Security (WIFS), December 5-7, 2016, Abu Dhabi, United Arab Emirates. New York: IEEE, 2016: 1-6.
[2] [2] ZHOU P, HAN X, MORARIU V I, et al. Learning rich features for image manipulation detec- tion[C]//Proceedings of the IEEE Conference on Com- puter Vision and Pattern Recognition, June 18-22, 2018, Salt Lake City, USA. New York: IEEE, 2018: 1053-1061.
[3] [3] WANG C, LI Y, WU G. Image splicing tamper detection based on deep learning and attention mechanism[C]// 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP), July 9-11, 2021, Nanjing, China. New York: IEEE, 2021: 267-271.
[4] [4] CHEN X, DONG C, JI J, et al. Image manipulation detection by multi-view multi-scale supervision[C]// Proceedings of the IEEE/CVF International Conferenceon Computer Vision, October 10-17, 2021, Montreal, Canada. New York: IEEE, 2021: 14185-14193.
[5] [5] JIANG X Y, LIU C X. Edge and region inconsis- tency-guided image splicing tamper detection net- work[J]. Journal of image and graphics, 2021, 26(10): 2411-2420. (in Chinese)
[6] [6] BI X L, WEI Y, XIAO B, et al. Image tamper detection algorithm based on cascaded convolutional neural net- work[J]. Journal of electronics & information technol- ogy, 2019, 41(12): 2987-2994. (in Chinese)
[7] [7] CHEN L C, ZHU Y, PAPANDREOU G, et al. En- coder-decoder with atrous separable convolution for semantic image segmentation[C]//Proceedings of the European Conference on Computer Vision (ECCV), September 8-14, 2018, Munich, Germany. New York: IEEE, 2018: 801-818.
[8] [8] ZHU H Y, SUN J, CHEN Q D. Multi-task algorithm for image splicing forgery detection based on deepLab v3+[J]. Computer engineering, 2022, 48(1): 253-259. (in Chinese)
[9] [9] SANDLER M, HOWARD A, ZHU M, et al. Mobile- netv2: inverted residuals and linear bottlenecks[C]// Proceedings of the IEEE Conference on Computer Vi- sion and Pattern Recognition, June 18-22, 2018, Salt Lake City, USA. New York: IEEE, 2018: 4510-4520.
[10] [10] HU J, SHEN L, SUN G. Squeeze-and-excitation net- works[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, June 18-22, 2018, Salt Lake City, USA. New York: IEEE, 2018: 7132-7141.
[11] [11] DONG J, WANG W, TAN T. Casia image tampering detection evaluation database[C]//2013 IEEE China Summit and International Conference on Signal and In- formation Processing, July 6-10, 2013, Beijing, China. New York: IEEE, 2013: 422-426.
[12] [12] BAPPY J H, SIMONS C, NATARAJ L, et al. Hybrid LSTM and encoder-decoder architecture for detection of image forgeries[J]. IEEE transactions on image processing, 2019, 28(7): 3286-3300.
[13] [13] HE K, GKIOXARI G, DOLLAR P, et al. Mask R-CNN[C]//Proceedings of the IEEE International Conference on Computer Vision, October 24-27, 2017, Venice, Italy. New York: IEEE, 2017: 2961-2969.
[14] [14] WEI X Y, ZUO X L, DAN Z P, et al. FCR-CNN model to improve the performance of image tamper detection region selection[J]. Journal of computer-aided design & computer graphics, 2021, 33(4): 560-568. (in Chinese)
Get Citation
Copy Citation Text
ZHANG Hongying, GUO Chunxing, and WANG Xuyong. Double-branch forgery image detection based on multi-scale feature fusion[J]. Optoelectronics Letters, 2024, 20(5): 307
Received: Aug. 1, 2023
Accepted: Oct. 27, 2023
Published Online: Aug. 23, 2024
The Author Email: Hongying ZHANG (carole_zhang@vip.163.com)