Image tampering localization model for intensive post-processing scenarios

Addressing the challenges of blurred or destroyed tampering traces presented by lossy operations such as image compression and scaling on images within social platforms like WeChat and Weibo, an adversarial image tampering localization model was introduced. Utilizing the pyramid vision transformer,...

Full description

Saved in:
Bibliographic Details
Main Authors: TAN Shunquan, LIAO Guiying, PENG Rongxuan, HUANG Jiwu
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024079/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539198839947264
author TAN Shunquan
LIAO Guiying
PENG Rongxuan
HUANG Jiwu
author_facet TAN Shunquan
LIAO Guiying
PENG Rongxuan
HUANG Jiwu
author_sort TAN Shunquan
collection DOAJ
description Addressing the challenges of blurred or destroyed tampering traces presented by lossy operations such as image compression and scaling on images within social platforms like WeChat and Weibo, an adversarial image tampering localization model was introduced. Utilizing the pyramid vision transformer, which was built upon the Transformer architecture, as an encoder for extracting tampering features from images. Simultaneously, an end-to-end encoder-decoder structure, reminiscent of the UNet architecture, was formulated. The pyramid structure and attention mechanisms inherented to the pyramid vision transformer afforded a flexible examination of diverse image regions. When integrated with the UNet-like architecture, it facilitated multiscale contextual information extraction, thereby fortifying the model's resilience to intense post-processing effects. Empirical results illustrate that the proposed model exhibits a substantial performance advantage over conventional tampering localization models, particularly in scenarios involving prevalent post-processing techniques such as JPEG compression and Gaussian blur. Notably, the model demonstrates exceptional robustness in assessments conducted with datasets representing diverse social media dissemination scenarios.
format Article
id doaj-art-654a53d47da547d3b2226181703020c0
institution Kabale University
issn 1000-436X
language zho
publishDate 2024-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-654a53d47da547d3b2226181703020c02025-01-14T07:24:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-04-014514615959254675Image tampering localization model for intensive post-processing scenariosTAN ShunquanLIAO GuiyingPENG RongxuanHUANG JiwuAddressing the challenges of blurred or destroyed tampering traces presented by lossy operations such as image compression and scaling on images within social platforms like WeChat and Weibo, an adversarial image tampering localization model was introduced. Utilizing the pyramid vision transformer, which was built upon the Transformer architecture, as an encoder for extracting tampering features from images. Simultaneously, an end-to-end encoder-decoder structure, reminiscent of the UNet architecture, was formulated. The pyramid structure and attention mechanisms inherented to the pyramid vision transformer afforded a flexible examination of diverse image regions. When integrated with the UNet-like architecture, it facilitated multiscale contextual information extraction, thereby fortifying the model's resilience to intense post-processing effects. Empirical results illustrate that the proposed model exhibits a substantial performance advantage over conventional tampering localization models, particularly in scenarios involving prevalent post-processing techniques such as JPEG compression and Gaussian blur. Notably, the model demonstrates exceptional robustness in assessments conducted with datasets representing diverse social media dissemination scenarios.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024079/intensive post-processing scenarioimage tampering localizationrobustnesspyramid vision transformer
spellingShingle TAN Shunquan
LIAO Guiying
PENG Rongxuan
HUANG Jiwu
Image tampering localization model for intensive post-processing scenarios
Tongxin xuebao
intensive post-processing scenario
image tampering localization
robustness
pyramid vision transformer
title Image tampering localization model for intensive post-processing scenarios
title_full Image tampering localization model for intensive post-processing scenarios
title_fullStr Image tampering localization model for intensive post-processing scenarios
title_full_unstemmed Image tampering localization model for intensive post-processing scenarios
title_short Image tampering localization model for intensive post-processing scenarios
title_sort image tampering localization model for intensive post processing scenarios
topic intensive post-processing scenario
image tampering localization
robustness
pyramid vision transformer
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024079/
work_keys_str_mv AT tanshunquan imagetamperinglocalizationmodelforintensivepostprocessingscenarios
AT liaoguiying imagetamperinglocalizationmodelforintensivepostprocessingscenarios
AT pengrongxuan imagetamperinglocalizationmodelforintensivepostprocessingscenarios
AT huangjiwu imagetamperinglocalizationmodelforintensivepostprocessingscenarios