Image tampering localization model for intensive post-processing scenarios
Addressing the challenges of blurred or destroyed tampering traces presented by lossy operations such as image compression and scaling on images within social platforms like WeChat and Weibo, an adversarial image tampering localization model was introduced. Utilizing the pyramid vision transformer,...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024079/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539198839947264 |
---|---|
author | TAN Shunquan LIAO Guiying PENG Rongxuan HUANG Jiwu |
author_facet | TAN Shunquan LIAO Guiying PENG Rongxuan HUANG Jiwu |
author_sort | TAN Shunquan |
collection | DOAJ |
description | Addressing the challenges of blurred or destroyed tampering traces presented by lossy operations such as image compression and scaling on images within social platforms like WeChat and Weibo, an adversarial image tampering localization model was introduced. Utilizing the pyramid vision transformer, which was built upon the Transformer architecture, as an encoder for extracting tampering features from images. Simultaneously, an end-to-end encoder-decoder structure, reminiscent of the UNet architecture, was formulated. The pyramid structure and attention mechanisms inherented to the pyramid vision transformer afforded a flexible examination of diverse image regions. When integrated with the UNet-like architecture, it facilitated multiscale contextual information extraction, thereby fortifying the model's resilience to intense post-processing effects. Empirical results illustrate that the proposed model exhibits a substantial performance advantage over conventional tampering localization models, particularly in scenarios involving prevalent post-processing techniques such as JPEG compression and Gaussian blur. Notably, the model demonstrates exceptional robustness in assessments conducted with datasets representing diverse social media dissemination scenarios. |
format | Article |
id | doaj-art-654a53d47da547d3b2226181703020c0 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2024-04-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-654a53d47da547d3b2226181703020c02025-01-14T07:24:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-04-014514615959254675Image tampering localization model for intensive post-processing scenariosTAN ShunquanLIAO GuiyingPENG RongxuanHUANG JiwuAddressing the challenges of blurred or destroyed tampering traces presented by lossy operations such as image compression and scaling on images within social platforms like WeChat and Weibo, an adversarial image tampering localization model was introduced. Utilizing the pyramid vision transformer, which was built upon the Transformer architecture, as an encoder for extracting tampering features from images. Simultaneously, an end-to-end encoder-decoder structure, reminiscent of the UNet architecture, was formulated. The pyramid structure and attention mechanisms inherented to the pyramid vision transformer afforded a flexible examination of diverse image regions. When integrated with the UNet-like architecture, it facilitated multiscale contextual information extraction, thereby fortifying the model's resilience to intense post-processing effects. Empirical results illustrate that the proposed model exhibits a substantial performance advantage over conventional tampering localization models, particularly in scenarios involving prevalent post-processing techniques such as JPEG compression and Gaussian blur. Notably, the model demonstrates exceptional robustness in assessments conducted with datasets representing diverse social media dissemination scenarios.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024079/intensive post-processing scenarioimage tampering localizationrobustnesspyramid vision transformer |
spellingShingle | TAN Shunquan LIAO Guiying PENG Rongxuan HUANG Jiwu Image tampering localization model for intensive post-processing scenarios Tongxin xuebao intensive post-processing scenario image tampering localization robustness pyramid vision transformer |
title | Image tampering localization model for intensive post-processing scenarios |
title_full | Image tampering localization model for intensive post-processing scenarios |
title_fullStr | Image tampering localization model for intensive post-processing scenarios |
title_full_unstemmed | Image tampering localization model for intensive post-processing scenarios |
title_short | Image tampering localization model for intensive post-processing scenarios |
title_sort | image tampering localization model for intensive post processing scenarios |
topic | intensive post-processing scenario image tampering localization robustness pyramid vision transformer |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024079/ |
work_keys_str_mv | AT tanshunquan imagetamperinglocalizationmodelforintensivepostprocessingscenarios AT liaoguiying imagetamperinglocalizationmodelforintensivepostprocessingscenarios AT pengrongxuan imagetamperinglocalizationmodelforintensivepostprocessingscenarios AT huangjiwu imagetamperinglocalizationmodelforintensivepostprocessingscenarios |