Title: Image tampering detection based on feature consistency attention

Authors: Junlin Gu; Yihan Xu; Juan Sun; Weiwei Liu

Addresses: College of Computer, Jiangsu Vocational College of Electronics and Information, Huai'an 223003, China ' College of Computer, Jiangsu Vocational College of Electronics and Information, Huai'an 223003, China ' College of Computer, Jiangsu Vocational College of Electronics and Information, Huai'an 223003, China ' College of Computer, Jiangsu Vocational College of Electronics and Information, Huai'an 223003, China

Abstract: Recently, the development of computer image technology makes image tampering more and more convenient, causing a large number of image tampering accidents. The existing scheme uses manual features and depth features to analyse the forgery traces, and has achieved good results. However, the existing schemes lack the analysis of essential traces and have defects in generalisation performance. In this paper, an image tampering detection scheme based on feature consistency attention is proposed. The inconsistency between the real region and the background region is used to improve the detection ability of the algorithm for unknown images. The scheme uses the feature extraction module to extract the deep semantic features of the image, and then calculates the feature correlation between the tampered region and the background region to maximise the correlation within the region and minimise the correlation between the background region and the tampered region. The scheme can learn the common traces of tampering process, which is expected to achieve better generalisation effect. Experimental results show that the proposed scheme is superior to several existing schemes in detecting tampered images.

Keywords: image tampering detection? deep neural network? feature consistency.

DOI: 10.1504/IJICS.2024.136704

International Journal of Information and Computer Security, 2024 Vol.23 No.1, pp.1 - 15

Received: 05 Sep 2022
Accepted: 22 Dec 2022

Published online: 19 Feb 2024 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article